Practical Identity Security
Resources
Checklists, guides, and templates for IT managers and security teams. No registration required — download what you need and use it immediately.
- No email required to download
- Based on real-world assessment findings
- Written by practitioners, not marketers
- Updated as the threat landscape evolves
- Used by 500+ IT and security teams
Downloads
Six resources covering the most common identity security challenges in mid-market organisations.
Active Directory Health-Check Checklist
47-point checklist covering privileged accounts, password policies, Kerberoastable SPNs, AdminSDHolder, and more. Designed for IT managers and security engineers who need a structured starting point.
- Privileged group membership review
- Stale and disabled account audit
- Password policy and fine-grained policies
- Kerberoastable SPN inventory
- AdminSDHolder and ACL anomalies
Entra ID Security Review Guide
Step-by-step guide to reviewing Entra ID security posture: conditional access coverage, PIM role assignments, external guest accounts, and MFA gaps. Includes PowerShell snippets for manual evidence collection.
- Conditional access policy coverage gaps
- PIM eligible vs active assignments
- Guest and B2B account review
- MFA registration and enforcement gaps
- Risky sign-in and user reports
Board-Level Identity Risk Briefing Template
A one-page executive template for summarising identity risk to a board or audit committee. Plain English, no jargon. Designed to translate technical findings into business risk language with quantified impact estimates.
- Executive risk summary (RAG format)
- Top three identity risk items with business impact
- Remediation timeline and resource ask
- Compliance framework alignment section
- Trend comparison from previous period
Identity Security Audit Preparation Pack
Preparation guide for ISO 27001 A.9, Cyber Essentials, and SOC 2 CC6 identity controls. Maps common audit evidence requests to the evidence IdentityFirst collects automatically, reducing audit prep from weeks to hours.
- ISO 27001 Annex A.9 control mapping
- Cyber Essentials access control checklist
- SOC 2 CC6 evidence inventory
- Auditor-ready evidence export guide
- Sample audit request response pack
Privileged Access Review Template
A structured spreadsheet template for conducting a quarterly privileged access review. Covers Active Directory, Entra ID, AWS IAM, and PAM vault accounts. Includes reviewer sign-off workflow.
- Privileged account inventory by system
- Last-logon and last-password-change columns
- Business justification and role owner fields
- Reviewer and approver signature columns
- Quarterly review cadence schedule
Identity Drift Detection: What to Look For
A concise guide to the most common identity drift patterns in mid-market organisations: shadow admin accounts, orphaned accounts after offboarding, SID history abuse, and group membership creep.
- Shadow admin detection signals
- Offboarding gaps and orphaned accounts
- SID history and migration artefacts
- Nested group membership explosion
- Service account password age and usage
Blog
Longer-form articles on identity security, coming soon.
Why 80% of AD Environments Have at Least One Shadow Admin
An analysis of findings from 200+ Active Directory assessments — the patterns we keep seeing and how to fix them.
The Case for Read-Only Security Tools
Why security assessment tools that can write to your directory are a liability — and what to look for when evaluating vendors.
Mapping Identity Findings to Cyber Essentials Plus
A practitioner's guide to evidence collection for Cyber Essentials Plus access control controls — what auditors actually want to see.
Subscribe to be notified when new articles are published.
No spam. Unsubscribe at any time.
Want Automated Evidence Collection?
IdentityFirst collects the evidence behind these checklists automatically — across Active Directory, Entra ID, AWS IAM, and more — and produces a board-ready report in minutes.