Skip to main content
Local Government

Identity Risk in Local Government Runs Deep. It’s Time You Saw It.

Councils face decades of accumulated identity risk — legacy Active Directory domains, contractor churn, shared service accounts, and a compliance landscape that now demands demonstrable control evidence.

Book a Demo View a Sample Report
NCSC CAF Aligned PSN Compliant Clients Cyber Essentials Certified Read-Only Evidence-Grade Findings
The Identity Problem

Why Local Government Has an Identity Problem

UK councils carry one of the most complex identity estates in the public sector — built up over decades, subject to constant workforce change, and increasingly scrutinised by NCSC, PSN, and the ICO.

Decades of Legacy AD Accumulation

Many councils operate Active Directory domains that predate modern identity governance practices. Stale accounts from staff who left years ago, service accounts with unknown owners, and Kerberos configurations from Windows Server 2003 migrations persist undetected and ungoverned.

Contractor Churn and Shared Services

Councils rely heavily on agency staff, contractors, and shared service arrangements. Each brings identity governance risk: accounts created for temporary workers that are never disabled, shared passwords for service desk tools, and cross-organisation access that outlasts the contract.

Compliance Obligations Are Converging

NCSC CAF, PSN Code of Connection, Cyber Essentials Plus grant conditions, and UK GDPR all converge on the same requirement: demonstrable, evidenced identity controls. Manual spreadsheet reviews no longer satisfy assessors and the ICO is increasingly active on data breach enforcement involving former employee access.

Regulatory Mapping

Regulatory Obligations IdentityFirst Addresses

Each assessment maps findings directly to the specific frameworks and obligations that council IT leads, DPOs, and PSN assessors will reference.

NCSC Cyber Assessment Framework (CAF)

Objective B2: Identity & Access Control. CNI-adjacent councils must demonstrate identity governance as part of CAF assessment. All admin accounts must be individually identified, MFA enforced, and access reviews evidenced. IdentityFirst supports evidence for each B2 sub-objective with named, timestamped findings.

  • B2.a: Individual admin account identification and enumeration
  • B2.b: MFA coverage gap analysis across privileged accounts
  • B2.c: Access review evidence and stale account documentation

Cyber Essentials Plus

Mandatory under many DLUHC/UKSPF grant conditions and PSN requirements. Access control (Requirement 4) failures on privileged accounts and MFA gaps are the leading cause of council CE+ failures. IdentityFirst identifies every Requirement 4 breach before the assessor does, with remediation evidence to address them.

  • Req. 4: Named admin account enumeration and shared account detection
  • MFA gap identification on all internet-facing privileged accounts
  • Privilege scope review — access limited to role requirements

PSN Code of Connection (CoCo)

Access to the Public Services Network requires demonstrable identity controls: no shared accounts, individual accountability, and leavers disabled within agreed SLA. PSN health checks regularly fail on stale Active Directory accounts. IdentityFirst surfaces every PSN CoCo identity gap before your annual health check.

  • Shared account detection and individual accountability audit
  • Leaver account SLA evidence — days-since-departure per account
  • Stale AD account enumeration with last-logon timestamps

UK GDPR / Data Protection Act 2018

Councils hold highly sensitive citizen data — benefits, social care, planning, and council tax records. ICO enforcement for data breaches caused by former employee account access is increasing. IdentityFirst provides the Article 5(1)(f) integrity and confidentiality evidence councils need to demonstrate access controls on sensitive data systems.

  • Former employee access residue — Article 5(1)(f) evidence
  • Data minimisation audit: access scope vs. role requirements
  • ICO-ready breach risk documentation and remediation evidence
Example Findings

What IdentityFirst Finds in Local Government Environments

Representative findings from a council identity assessment — the kind of accumulated risk that is invisible to manual review and routine to automated assessment.

Critical

Former Housing Benefits Officer Account

j.thornton@southfields-council.gov.uk

Account active 94 days post-resignation. Member of Housing_Benefits_Approvers group. Access to citizen financial records and Universal Credit case data retained. GDPR Article 5(1)(f) — integrity and confidentiality obligation breached.

Blast Radius: Critical — live access to citizen benefit records and payment authorisation workflow with no active user.

Critical

Kerberoastable Revenues Service Account

svc_revenues_portal — SPN: HTTP/revenues.southfields.local

RC4-HMAC encryption. Password last set 2018. Domain account with access to council tax database and benefit payment authorisation workflow. TGS ticket extractable from any domain-joined workstation and crackable offline with no domain security event generated.

Blast Radius: Critical — council tax and benefit payment systems accessible via offline credential attack against this service account.

High

Shared Planning Portal Admin Account

planning-admin (shared password known to 5 staff)

No individual accountability. PSN CoCo Section 4.3 violation. CE+ Requirement 4 breach — admin accounts must be individually named. Audit log attribution impossible: actions cannot be traced to a specific individual.

Compliance Gap: PSN CoCo, CE+ Requirement 4 — no individual accountability for planning portal administrative actions.

High

Councillor Account with IT Admin Rights

cllr.m.whitfield — Domain Admins via group nesting

Elected member account is a member of Domain Admins OU via inherited group nesting. Councillor accounts should have no privileged IT access. CAF B2.a gap — admin accounts must be individually identified and justified. Privilege was not intentionally assigned.

Blast Radius: High — elected member account has effective domain administrator rights across the council IT estate.

Medium

Legacy Domain Trust to Waste Management Provider

Unconstrained forest trust — waste-mgmt.local

Unconstrained forest trust to waste-mgmt.local (third-party provider). Not reviewed in 3 years. Allows Kerberos ticket delegation across the trust boundary. No current contract reference found. Original commercial relationship may have ended.

Risk: Unconstrained trust allows Kerberos TGT delegation across forest boundary to an uncontrolled third-party domain.

View a complete IdentityMRI sample report →

What IdentityFirst Does NOT Access

IdentityFirst uses read-only connectors to identity stores only. At no point during the assessment does IdentityFirst access, read, query, or process any of the following council systems or data:

Citizen records or personal data
Benefits and Universal Credit systems
Housing management systems
Planning applications or case files
Council tax records or payment data
Social care or safeguarding systems

Read-only identity store connectors only: Active Directory, Entra ID, PAM tools. No agents installed. No production changes required. Full connector list available on request.

How It Works

From Connector to CAF Evidence in 48 Hours

A four-stage pipeline that requires no agents, no production changes, and no access to any citizen-facing system.

1

Connect

Read-only LDAP and API connectors attach to Active Directory, Entra ID, and PAM tools using a read-only service account. No agents installed. No citizen systems touched. No domain administrator credentials required.

2

Assess

IdentityMRI™ enumerates every identity, group membership, privilege assignment, and delegation scope across your council estate. 14+ connectors supported. 40+ risk checks applied. Nothing sampled.

3

Prioritise

Each finding is scored by blast radius and mapped to the specific CAF objective, PSN CoCo requirement, CE+ Requirement 4 sub-control, or UK GDPR article it evidences or breaches. First findings available within 24 hours.

4

Evidence

Board-ready PDF and assessor-ready evidence pack delivered within 48 hours. Named findings, timestamps, CAF B2 mapping, PSN CoCo gap analysis, and remediation playbooks structured for council governance boards and external assessors.

FAQ

Local Government — Common Questions

Straight answers to the questions council IT leads, DPOs, and security teams ask most often.

Does IdentityFirst require access to citizen data or council systems?

No. IdentityFirst uses read-only LDAP and API connectors to Active Directory and cloud identity systems only. It does not access, read, or process citizen records, benefits data, housing management systems, planning applications, council tax records, or social care data at any point during the assessment. The assessment is confined entirely to identity and access management infrastructure.

How does IdentityFirst support PSN Code of Connection compliance?

IdentityFirst provides documented evidence for PSN CoCo identity requirements including enumeration of stale and departed accounts, detection of shared accounts without individual attribution, leavers process gap analysis with days-since-departure per account, and individual accountability audit trails. Output is structured to evidence PSN health check requirements around account lifecycle, unique individual authentication, and access control governance.

PSN health checks regularly fail on stale Active Directory accounts from former employees and contractors. IdentityFirst surfaces every such account before the assessor visit, with sufficient detail to evidence remediation actions taken.

Can the report evidence CAF B2 identity and access controls?

Yes. IdentityFirst maps findings directly to NCSC CAF Objective B2 sub-objectives: B2.a (individual identification of all administrative accounts), B2.b (MFA enforcement on admin and remote access accounts), and B2.c (access reviews and leaver process evidence). Each finding includes the specific CAF objective it evidences or breaches.

The resulting evidence pack is designed to satisfy CAF assessor questions about identity governance: which admin accounts exist, who holds them, how they are governed, whether MFA is enforced, and when access was last reviewed. IdentityFirst supports evidence for CAF B2 — it does not perform the CAF assessment itself, which remains the role of an accredited CAF assessor.

Is IdentityFirst suitable for councils using Microsoft 365 GovCloud or SCCM?

Yes. IdentityFirst includes connectors for both Entra ID (Microsoft 365) and on-premises Active Directory, covering the hybrid environments common across UK local government. The Entra ID connector works across commercial and GovCloud tenancies. The Active Directory connector covers all domain-joined assets including those managed via SCCM, without requiring access to the SCCM infrastructure itself.

Councils operating shared service arrangements across multiple AD domains or federated Entra ID tenancies can assess the full estate in a single run, with cross-domain identity correlation surfacing accounts that span multiple environments.

What does Cyber Essentials Plus require for identity controls that IdentityFirst addresses?

Cyber Essentials Plus Requirement 4 (User Access Control) requires that administrative accounts are individually named, MFA is enforced on all internet-facing services, and access is limited to what is necessary for the role. These are the most common CE+ failure points for councils.

IdentityFirst enumerates every Requirement 4 breach before the assessor visit: shared admin accounts, MFA gaps on privileged accounts, excessive privilege assignments beyond role requirements, and stale accounts that should have been removed. Findings are mapped directly to CE+ Requirement 4 sub-controls, providing the remediation evidence needed to address failures prior to assessment.

Ready to Evidence Your CAF B2 Controls?

Book a live demo to see how IdentityFirst maps your council’s identity estate against CAF, PSN, and CE+ obligations — or explore a sample report now.

Book a Demo View a Sample Report

Read-only  •  No agents  •  Findings in 24 hours  •  UK-hosted & ICO registered