Skip to main content
Financial Services

Identity Security for FCA-Regulated Firms

DORA, SYSC 13, and NIS2 demand demonstrable identity governance. IdentityFirst delivers the evidence your auditors require — read-only, in 24 hours.

Book a Demo View a Sample Report
FCA Regulated Clients DORA Aligned SYSC 13 Coverage NIS2 Principles Read-Only Architecture
The Identity Problem

Why Financial Services Has an Identity Problem

FCA-regulated firms face a confluence of legacy infrastructure, accelerating regulatory demand, and a threat landscape that specifically targets the financial sector.

Complex, Inherited IAM Estates

Mergers and acquisitions leave stale accounts, orphaned service accounts, and legacy Active Directory trusts with unknown blast radius. The identities from the 2018 acquisition are still present — enabled, privileged, and ungoverned.

Regulatory Scrutiny Is Accelerating

FCA SYSC 9.1.4 requires evidenced access control. DORA mandates continuous ICT risk management. NIS2 applies to financial market infrastructure. These obligations converge on identity governance — and the expectation is demonstrable, documented evidence.

Attackers Target Finance First

Financial services sees 2× the average dwell time before detection. Service accounts and Kerberoastable SPNs are the primary lateral movement paths — and in financial environments they frequently have access to trading systems, regulatory reporting shares, and payment processing infrastructure.

Regulatory Mapping

Regulatory Obligations IdentityFirst Addresses

Each assessment maps findings directly to the specific articles and subsections that FCA supervisors and internal audit will reference.

DORA — Digital Operational Resilience Act

Article 9 ICT risk management requires financial entities to implement sound access control and privileged access governance. IdentityFirst provides continuous identity risk evidence, privileged access mapping, and blast radius quantification aligned to these obligations.

  • Article 9: ICT risk management & access control evidence
  • Privileged identity mapping and standing access detection
  • Continuous monitoring evidence for regulatory submissions

FCA SYSC 13 — Operational Risk: IT Systems

SYSC 13 requires firms to manage operational risk from IT systems and to implement appropriate access controls. IdentityFirst documents every access control gap, stale account, and privilege sprawl finding in a format suitable for operational risk registers.

  • Access control gap identification and documentation
  • Stale and orphaned account enumeration
  • Privilege sprawl mapped to operational risk categories

NIS2 Directive — Article 21 Cybersecurity Measures

NIS2 Article 21 mandates access management, MFA, and supply chain security for essential entities including financial market infrastructure. IdentityFirst maps MFA coverage gaps, access management failures, and supply chain identity risks across your estate.

  • MFA coverage analysis across privileged accounts
  • Access management gap identification
  • Supply chain identity risk mapping (third-party service accounts)

FCA SYSC 9.1.4 — Record Keeping Obligations

SYSC 9.1.4 requires firms to maintain records sufficient to evidence governance of access to systems. IdentityFirst produces a timestamped, immutable audit trail of who had access to what systems, their privilege level, and when the access was last reviewed.

  • Timestamped access inventory across all connected systems
  • Privilege level documentation per identity and system
  • Last-reviewed and last-accessed evidence for regulatory records
Example Findings

What IdentityFirst Finds in Financial Services Environments

Representative findings from a financial services assessment — the kind of risk that exists in most regulated firms and is invisible to manual review.

Critical

Kerberoastable Service Account: svc_charlesriver_ims

RC4-HMAC encryption. Password age: 847 days. SPN registered against the Charles River IMS trading integration. This account's TGS ticket can be extracted from any domain-joined workstation and cracked offline without generating a domain security event.

Blast Radius: Critical — svc_charlesriver_ims has local admin on 14 SQL servers backing regulatory reporting.

High

Departed Employee Active 109 Days Post-Departure

Account enabled. Last logon 3 days before departure. Still a member of Finance-Reporting-RW, VPN-Users, and SharePoint-FinanceTeam. HR system departure date: 109 days ago. No leaver process triggered in Active Directory or Entra ID.

Blast Radius: High — finance reporting share and VPN access to regulatory systems remain open.

Critical

Permanent Global Administrator: d.walsh

d.walsh holds permanent Global Administrator in Entra ID. No PIM or JIT elevation configured. Role never time-limited. Assigned 3 years ago. No MFA registration event in the last 180 days recorded against the account.

Blast Radius: Critical — unrestricted tenant-wide administrative access with no time or scope constraint.

High

4 Accounts with Unconstrained Kerberos Delegation

Four objects — including a file server with access to the regulatory reporting share — hold unconstrained Kerberos delegation. Any user authenticating to these systems will have their TGT cached on the host, extractable if the host is compromised.

Blast Radius: High — unconstrained delegation provides a credible path to Domain Admin via TGT abuse.

Medium

34% of Privileged Accounts MFA-Exempt

34% of accounts in privileged groups (Domain Admins, Finance-Reporting-RW, Azure-PIM-Eligible) are excluded from MFA enforcement via a legacy authentication exception in Conditional Access. The exception was created during a legacy ADFS migration and was never reviewed.

Compliance Gap: NIS2 Article 21, DORA Article 9, FCA SYSC 13 — MFA coverage gap across regulated system access.

View a complete financial services IdentityMRI report →

How It Works

From Connector to Compliance Evidence in 48 Hours

A four-stage pipeline that requires no agents, no production changes, and no trading system access.

1

Connect

Read-only API and LDAP connectors attach to Active Directory, Entra ID, PAM tools, and IGA platforms. No agents installed. No production changes. No trading system access required at any stage.

2

Assess

IdentityMRI™ enumerates every identity, group, privilege assignment, and delegation scope across your estate. 40+ risk checks applied. Nothing sampled.

3

Prioritise

Each finding is scored by ICR (Identity Coverage Ratio), blast radius, and compliance mapping. DORA Article 9, SYSC 13, and NIS2 Article 21 obligations are cross-referenced automatically.

4

Report

Board-ready PDF delivered within 48 hours. Named findings, timestamps, remediation playbooks, and dedicated DORA/SYSC evidence packs structured for FCA supervisory review and internal audit.

FAQ

Financial Services — Common Questions

Straight answers to the questions compliance and security teams at FCA-regulated firms ask most often.

Does IdentityFirst require access to trading systems or market data?

No. IdentityFirst connects exclusively via read-only LDAP queries and read-only API connectors to identity stores — Active Directory, Entra ID, and PAM tools. It does not require, request, or receive access to trading platforms, order management systems, market data feeds, or any front-office application at any point during the assessment.

How does IdentityFirst help with DORA Article 9 compliance?

DORA Article 9 requires financial entities to implement sound ICT risk management controls including governance of access rights and privileged access. IdentityFirst maps every privileged identity finding — stale accounts, Kerberoastable service accounts, standing Global Administrators, unconstrained delegation — directly to Article 9 obligations and produces remediation evidence suitable for regulatory submission.

The resulting evidence pack is structured to answer the specific Article 9 questions an FCA supervisor or DORA auditor is likely to raise: which privileged identities exist, what access they have, how they are governed, and what is being done about identified gaps.

Can the report be used as audit evidence for FCA supervisory review?

Yes. IdentityFirst produces a board-ready PDF containing named findings, timestamps, severity classifications, blast radius analysis, and compliance mapping cross-referenced to DORA, SYSC 13, and NIS2 controls. The report is structured to satisfy FCA supervisory requests for evidence of access control governance and operational risk management under SYSC 9.1.4.

Internal audit teams regularly use IdentityFirst reports as input to IT general control testing and access management control assessments.

How long does an assessment take for a typical asset manager?

Initial findings are available within 24 hours of connector setup. Full report generation, including compliance mapping to DORA, SYSC 13, and NIS2 controls, is completed within 48 hours. Connector setup for a typical asset manager with Active Directory and Entra ID takes under two hours and requires only a read-only service account — no domain administrator credentials.

Does IdentityFirst work alongside existing tools like CyberArk or SailPoint?

Yes. IdentityFirst ingests data from PAM tools including CyberArk PAS and BeyondTrust, and from IGA platforms including SailPoint IdentityNow and Saviynt, using read-only API connectors. Rather than replacing these tools, IdentityFirst surfaces gaps in their coverage — accounts that exist in Active Directory but are not governed by your PAM or IGA solution, and privileged access that has accumulated outside the formal provisioning process.

This gap analysis is frequently the most valuable output for firms that believe their existing tooling provides adequate coverage.

Ready to Evidence Your Identity Governance?

Book a live demo to see how IdentityFirst maps your own identity estate against DORA, SYSC 13, and NIS2 obligations — or explore a sample financial services report now.

Book a Demo View a Sample Report

Read-only  •  No agents  •  Findings in 24 hours  •  UK-hosted & ICO registered