Skip to main content
Healthcare

Identity Security for NHS Trusts & Healthcare Providers

DSP Toolkit compliance, CQC inspection readiness, and NHS Digital standards demand robust identity governance. IdentityFirst delivers the evidence — read-only, without touching clinical systems.

Book a Demo View a Sample Report
NHS Trust Clients DSP Toolkit Aligned CQC Readiness Read-Only Architecture No Clinical System Access
The Challenge

Why Healthcare Has an Identity Problem

NHS trusts and healthcare providers operate some of the most complex identity estates in any sector — and face adversaries who know it.

Clinical Systems Sprawl

EPR systems (EMIS, SystmOne, TPP, Lorenzo), PACS, pharmacy systems, and diagnostic platforms each maintain separate identity stores. Locum and agency accounts accumulate across these systems without consistent leaver processes, creating persistent access long after contracts end.

DSP Toolkit Requires Evidence

DSPT Standard 7 (Staff Responsibilities) and Standard 9 (IT Protection) require documented access control evidence — not assertions. Manual sampling by spreadsheet fails audit scrutiny. IdentityFirst produces structured, submission-ready evidence mapped to each DSPT assertion.

NHS Is a Primary Ransomware Target

WannaCry and subsequent attacks exploited Active Directory misconfigurations and stale accounts that had never been reviewed. Identity is the initial access vector in the majority of NHS cyber incidents. Organisations that cannot enumerate their own access risk cannot prioritise remediation.

Compliance Obligations

DSP Toolkit Obligations IdentityFirst Addresses

IdentityFirst produces structured identity governance evidence mapped to the specific DSPT assertions, CQC domains, and NHS Digital standards your organisation must meet.

DSPT Standard 9 — IT Protection

  • Access control evidence for DSPT 9.1 assertion requirements
  • Privileged account inventory and periodic review documentation
  • Active Directory configuration audit against NHS Digital baseline
  • Service account inventory with SPN, delegation, and password age analysis

DSPT Standard 7 — Staff Responsibilities

  • Leaver process evidence: accounts still active post-departure
  • Stale account report: users inactive beyond defined thresholds
  • Locum and agency account lifecycle audit
  • Departed employee access termination gap analysis

CQC Well-Led Domain

  • Information governance control evidence for CQC inspection
  • Access management maturity assessment for well-led evidence
  • Board-ready findings report with executive risk summary
  • Remediation roadmap with prioritised actions and ownership

NHS Digital Data Security Standards

  • Standard 1 — People: access control and staff identity lifecycle
  • Standard 6 — Cyber Attacks: identity configuration hardening
  • Standard 7 — Continuity: privileged access resilience posture
  • Standard 10 — Accountable Suppliers: third-party identity exposure review
Example Findings

What IdentityFirst Finds in Healthcare Environments

These are representative examples drawn from NHS trust and healthcare provider assessments — the categories of risk that appear consistently and are invisible to manual review.

Critical

Locum Accounts Active 6+ Months After Contract End

34 locum accounts remain enabled with no recorded last logon in the active period. 8 retain clinical system group memberships — including EPR access groups — despite contractor departure dates recorded in HR over six months prior.

DSPT Standard 7 gap — leaver process evidence absent for these accounts.

High

Shared Service Account for EPR Integration

svc_emis_integration password unchanged for 1,240 days. Account is used by multiple ward-facing systems and holds broad read permissions across the EPR integration layer. No rotation schedule is documented and no owner is assigned.

DSPT Standard 9 gap — service account lifecycle process not evidenced.

Critical

Domain Admin Accounts Used for Daily Clinical Administration

3 consultant accounts hold permanent Domain Admin membership and are used as primary daily login accounts. No just-in-time elevation is in place. Any workstation these accounts touch becomes a Domain Admin pivot point.

Blast Radius: Critical — full domain compromise reachable from any workstation login.

High

Agency Staff AD Accounts in Permanent OU

Agency staff accounts are provisioned in the same OU as permanent employees with no expiry date set and no contractor lifecycle flag in Active Directory. No automated review or expiry process is triggered when agency contracts end.

DSPT Standard 7 gap — no documented contractor access termination process.

Medium

PACS Service Account Kerberoastable

svc_pacs_imaging registered with RC4-HMAC encryption and an SPN exposing the PACS system. The TGS ticket for this account can be extracted from any domain-joined workstation and cracked offline. The account scope includes read access to the imaging data store.

NCSC Cyber Essentials Plus gap — Kerberoastable SPN with data access scope.

View a complete sample IdentityMRI assessment report →

How It Works

Read-Only Assessment — No Clinical System Access

A four-stage pipeline from read-only connector to DSP Toolkit evidence pack — completed within 24–72 hours, with no agents installed and no production changes made.

1

Connect

A read-only LDAP bind account is provisioned by your IT team — minimum permissions only, approved by your IG team before setup. No Domain Admin rights. No clinical system connectors. No agents installed.

2

Assess

IdentityFirst enumerates every user, group, service account, SPN, and delegation setting across your AD environment. Locum, agency, and contractor accounts are identified and cross-referenced against last logon and HR data where available.

3

Prioritise

Every finding is scored by severity and blast radius — how far a compromised account can reach across your clinical and administrative systems. DSPT and CQC mapping applied automatically.

4

Report

Board-ready PDF with prioritised findings, DSPT evidence mapping for Standards 7 and 9, and step-by-step remediation playbooks. Delivered within 24 hours of scan completion. Full evidence pack in 48–72 hours.

No clinical system access. Ever.

IdentityFirst connectors bind to Active Directory and cloud identity systems (Entra ID, Okta) only. No EPR, no PACS, no pharmacy system, no clinical data of any kind is accessed or processed. Your IG team can review and approve the exact permission set before any connector is established.

FAQ

Healthcare Identity Security — Common Questions

Straight answers to the questions NHS trusts and healthcare providers ask before starting an assessment.

Does IdentityFirst access patient records or clinical systems?

No. IdentityFirst uses read-only LDAP and API connectors to Active Directory and cloud identity systems only. No clinical data, patient records, or EPR system data is ever accessed, read, or processed by any IdentityFirst connector.

The assessment is confined entirely to identity and access management infrastructure — who has access to what, not what that access allows them to see. Your IG team can review the exact permission set and verify it independently before any connector setup begins.

How does IdentityFirst help with DSP Toolkit submission?

IdentityFirst provides documented evidence for DSPT Standards 7 and 9, including:

  • Stale and departed account lists with last logon dates and group membership detail
  • Privileged access review findings covering Domain Admin, service accounts, and delegated rights
  • Leaver process gap analysis showing accounts still active after departure
  • Access control configuration evidence mapped to each DSPT assertion

Output is structured for DSPT submission, not just internal reporting. Your IG team receives a findings document formatted to address the specific wording of each relevant assertion.

Can IdentityFirst assess systems across multiple NHS sites or trusts?

Yes. IdentityFirst can assess federated Active Directory environments spanning multiple sites, OUs, and trust relationships in a single assessment run. Cross-site identity correlation surfaces accounts that exist in one domain but are not governed by another — a common gap in merged trusts and shared service arrangements.

If you operate across multiple sites with separate AD domains under a trust relationship, we scope the connector setup to cover all in-scope domains before the assessment begins.

How long does an NHS trust assessment take?

Initial Active Directory findings are delivered within 24 hours of connector setup. A full DSP Toolkit evidence pack — including privileged access review, stale account analysis, leaver process audit, and service account inventory — is typically completed within 48 to 72 hours.

Connector setup itself typically takes less than an hour once your IT team has provisioned the read-only service account. We provide the exact account specification and minimum permissions in advance.

Do we need to involve our IG team?

Your Information Governance team should approve the read-only service account we use before any connector setup begins. We provide the exact minimum permissions required — a standard read-only LDAP bind account with no write access and no access to clinical data — so your IG team can review and approve it well ahead of the assessment.

We are happy to join a call with your IG lead to walk through the permission set, the data flows, and the assessment boundary. Most trusts complete IG sign-off within one working day of receiving our specification document.

Ready for Your DSP Toolkit Review?

See what IdentityFirst finds in a real healthcare identity estate, or book a session to scope your DSP Toolkit evidence pack — read-only, IG-approved, no clinical system access.

Book a Demo View a Sample Report

Read-only  •  No clinical system access  •  IG-approved permission set  •  DSPT evidence in 48–72 hours