Skip to main content
Security & Governance

Built Secure.
Governed Responsibly.

We build identity security software. Our own house has to be in order first. Here is exactly how we govern our systems, protect your data, and operate with the transparency that security buyers deserve.

Cyber Essentials Certified
ISO 27001 ISMS In Progress
ICO Registered · ZC031428
UK GDPR Compliant
UK-Hosted Infrastructure

Security Governance

Certifications obtained or in progress. We only claim certification where an external body has actually granted it.

Certified
Cyber Essentials

NCSC-backed scheme covering firewalls, secure configuration, access control, malware protection, and patch management. Externally verified.

In Progress
ISO/IEC 27001 ISMS

Information Security Management System implementation underway, covering risk management, access control, vulnerability management, incident response, supplier assurance, and business continuity.

Planned
Cyber Essentials Plus

Independent technical verification of CE controls via external audit. Planned following ISO 27001 ISMS completion.

Security Framework Alignment

IdentityFirst's security architecture and internal governance practices are designed in alignment with these widely recognised frameworks. Alignment means our policies and architecture reasonably reflect each framework's principles — it does not imply external certification.

NIST Cybersecurity Framework

Identify, Protect, Detect, Respond, Recover — applied across platform architecture and internal security operations.

CIS Critical Security Controls

Prioritised control baseline covering asset inventory, access control, audit logging, and vulnerability management.

NIST Zero Trust Architecture (SP 800-207)

Verify explicitly, use least privilege, assume breach — principles reflected in platform design and IdentityFirst's own operational access model.

NIST Secure Software Development Framework

Secure development lifecycle practices embedded throughout platform engineering, including threat modelling and dependency management.

OWASP Secure Development Practices

OWASP Top 10 risks addressed in platform development and code review: injection prevention, authentication controls, input validation throughout.

Identity Security Standards

As an identity security platform, IdentityFirst is designed in alignment with the standards that govern digital identity assurance and authentication. These inform both platform architecture and how IdentityFirst helps customers meet their own obligations.

NIST SP 800-63 Digital Identity Guidelines

Identity assurance levels, authenticator types, and federation requirements inform IdentityFirst's risk assessment methodology and finding classification.

FIDO Authentication Standards

FIDO2/WebAuthn phishing-resistant authentication principles referenced in MFA coverage assessment and privileged account security recommendations.

Regulatory Alignment

IdentityFirst operates in accordance with applicable UK and EU regulations. References below describe regulatory alignment, not external certification unless specifically stated.

UK GDPR & Data Protection Act 2018

Data protection and privacy principles embedded throughout product design and operations. ICO registered · ZC031428. Privacy by design. Read-only by architecture.

NIS2 Directive

Security governance aligned with NIS2 cybersecurity risk management principles. IdentityFirst is designed to help customers evidence NIS2 identity governance and access control obligations.

Digital Operational Resilience Act (DORA)

Relevant to FCA-regulated customers. IdentityFirst supports DORA ICT risk management by surfacing identity risk, privilege exposure, and access control gaps.

UK NCSC Cyber Assessment Framework (CAF)

Security governance informed by CAF principles, particularly identity and access management objectives relevant to UK public sector and regulated industries.

AI Governance

IdentityFirst incorporates AI capabilities in its assessment and analysis pipeline. Governance of those capabilities is aligned with the following frameworks to ensure appropriate transparency, human oversight, and security.

EU Artificial Intelligence Act

AI governance aligned with EU AI Act risk classification and prohibited use principles. Human oversight is a design requirement, not an option.

NIST AI Risk Management Framework

Govern, Map, Measure, Manage — structured AI risk lifecycle applied across platform components using AI-assisted analysis or recommendations.

OWASP Top 10 for LLM Applications

Prompt injection, training data exposure, and insecure output handling addressed in the design and security testing of AI-assisted features.

Operational Governance

Operational risk management and resilience practices aligned with internationally recognised principles.

ISO 31000 Risk Management Principles

Risk identification, assessment, treatment, and monitoring practices applied across internal operations and platform risk governance.

ISO 22301 Resilience Principles

Business continuity and operational resilience principles inform incident response planning, recovery objectives, and service continuity commitments.

Cross-Framework Identity Governance Evidence

Most security tools align with one framework. IdentityFirst provides identity governance evidence across multiple regulatory frameworks simultaneously — from the same assessment, the same connectors, the same telemetry.

A single IdentityMRI™ assessment surfaces the privileged access, stale account, delegation, and MFA coverage evidence that auditors require across ISO 27001, NIS2, DORA, CIS Controls, NIST CSF, and Zero Trust simultaneously. One scan. Multiple evidence packs.

ISO 27001 NIST CSF NIS2 DORA CIS Controls Zero Trust Cyber Essentials NCSC CAF

Data Protection Practices

Architecture-level commitments that cannot be configured away.

Privacy by Design

Data minimisation and purpose limitation built into every connector and report output.

Read-Only by Architecture

All connectors operate in discovery mode. No writes to customer systems. An architectural constraint, not a configuration option.

UK-Hosted Infrastructure

All customer data processed and stored within UK jurisdiction.

ICO Registration

Registered with the Information Commissioner's Office. Reference: ZC031428.

The Read-Only Guarantee

During any assessment, demo, or POC, IdentityFirst never writes to your systems. All connectors operate in discovery mode only. This is not a configuration option — it is an architectural constraint enforced at the connector level. You see the findings. You decide what to act on.

See It in Action Talk to Us