← Back to Blog

What UK Regulators Are Saying About Identity Security

By IdentityFirst Ltd | January 2026

UK regulators are paying increasing attention to identity security. From the Information Commissioner's Office (ICO) to the National Cyber Security Centre (NCSC), British organisations are receiving clear guidance on how to approach identity security. Here's what you need to know.

ICO guidance on identity data

The ICO has published extensive guidance on how GDPR applies to identity data:

Data minimisation

Under UK GDPR, organisations must collect only what's necessary. For identity data, this means:

Security requirements

The ICO expects appropriate technical measures:

Breach notification

When identity data is compromised, the ICO requires:

Accountability

Organisations must demonstrate compliance:

NCSC publications on identity

The National Cyber Security Centre has published guidance specifically relevant to identity security:

Zero Trust Architecture

The NCSC's Zero Trust publications emphasise:

For UK organisations, this translates to:

Identity and Access Management

The NCSC's IAM guidance covers:

Cloud security guidance

For organisations using cloud services:

FCA expectations for financial services

The Financial Conduct Authority expects financial services firms to:

Operational resilience

Third-party risk management

Governance

What the regulators are seeing

From ICO enforcement actions and NCSC publications, we can see regulators' concerns:

Common failures

Enforcement trends

The ICO has taken action against organisations for:

Guidance emphasis

Recent regulatory guidance emphasises:

How to align with regulatory expectations

For ICO compliance

  1. Map your identity data: Understand what identity data you hold, where it is, and why
  2. Implement access controls: Ensure only those who need identity data can access it
  3. Document your basis: Have clear legal bases for processing identity data
  4. Respond to requests: Have processes for handling data subject requests
  5. Report breaches: Have breach detection and notification procedures

For NCSC alignment

  1. Implement phishing-resistant MFA: Prioritise FIDO2 or authenticator app MFA
  2. Apply least privilege: Review access regularly, remove unnecessary permissions
  3. Verify continuously: Move beyond point-in-time checks to continuous verification
  4. Monitor for anomalies: Implement logging and alerting on identity anomalies

For FCA requirements (if applicable)

  1. Board reporting: Ensure identity security is a board-level topic
  2. Vendor due diligence: Apply due diligence to identity vendors
  3. Incident response: Include identity incidents in your response plans
  4. Testing: Regularly test identity security controls

The regulatory outlook

Regulatory focus on identity security is intensifying:

NIS2 implementation

The UK's implementation of NIS2 will add requirements for:

AI regulation

Upcoming AI regulation will create new obligations:

Cyber insurance alignment

Insurers are increasingly requiring evidence of:

Building regulatory confidence

Organisations that demonstrate strong identity security to regulators typically:

  1. Document everything: Policies, procedures, decisions, and reviews
  2. Test regularly: Penetration testing, access reviews, breach simulations
  3. Respond promptly: Fast, effective response to incidents and requests
  4. Show improvement: Evidence of continuous security enhancement
  5. Engage proactively: Work with regulators, report issues early

The regulators are offering guidance. The question is whether your organisation is listening—and acting.