Identity and Access Management for SMBs — A Practical Guide for 2026
Identity and access management (IAM) is the framework of policies and controls that determines who can access which systems and data in your organisation. For SMBs, effective IAM means: enforcing MFA on all internet-facing services, separating privileged accounts from standard user accounts, managing the full lifecycle of user credentials, and maintaining a clean Active Directory or cloud identity environment. Identity-based attacks — credential phishing, account takeover, business email compromise — are responsible for the majority of SMB breaches. IAM is the direct defence.
According to the Verizon Data Breach Investigations Report 2025, compromised credentials are involved in over 60% of breaches. For SMBs, the attack pattern is almost always the same: phishing email captures credentials, attacker logs in with those credentials (no MFA), and then moves laterally through the environment using tools and accounts that were never properly restricted.
The 4 Core IAM Areas for SMBs
Multi-Factor Authentication (MFA)
Implement firstMFA is the single highest-impact IAM control available to SMBs. Microsoft research found that MFA blocks over 99.9% of automated account compromise attacks. Every internet-facing service — Microsoft 365, Google Workspace, VPN, remote desktop, and cloud consoles — must require MFA for all users.
- →Enable MFA on Microsoft 365 / Google Workspace for all users
- →Require MFA for VPN and remote access — no exceptions
- →Use authenticator app (Microsoft Authenticator, Google Authenticator) rather than SMS
- →Disable legacy authentication protocols (SMTP AUTH, basic auth) that bypass MFA
- →Enable Conditional Access policies to block sign-ins from unexpected locations
Privileged Access Management
High priorityAdministrative accounts are the highest-value target for attackers. Domain admin, local admin, and cloud tenant admin credentials give an attacker complete control over your environment. Privileged access must be separated, controlled, and audited.
- →Each admin has two accounts: standard (daily use) and admin (admin tasks only)
- →Admin accounts never used for email, browsing, or non-admin activity
- →Domain admin accounts used only on dedicated admin workstations or via PAM solution
- →All admin account activity logged and retained
- →Local admin passwords unique per device (use LAPS for Windows environments)
Password Policy and Credential Management
FoundationalNCSC guidance moved away from regular forced password rotation — this practice leads to weak, predictable passwords (Password1!, Password2!). The current best practice is: long unique passphrases, no forced rotation except after suspected compromise, and a check against known breached password lists.
- →Minimum 12-character password policy (14+ for admin accounts)
- →Password complexity required — upper, lower, number, special character
- →No scheduled forced rotation unless compromise is suspected
- →Passwords checked against Have I Been Pwned breach database at creation
- →Organisation-wide password manager deployment (Bitwarden, 1Password) for unique passwords
User Lifecycle Management
Process disciplineStale accounts — former employees, contractors, and service accounts that are no longer needed — are a persistent risk. Any active account represents a potential entry point. Access rights accumulate over time (permission creep) without active cleanup.
- →Formal offboarding process: disable accounts on last working day, not after
- →Monthly audit of accounts inactive for 90+ days
- →Quarterly review of privileged access — does each admin still need that level?
- →Contractor and third-party access time-limited and revoked at contract end
- →Service accounts inventoried, documented, and reviewed annually
Active Directory Hygiene Checklist
Frequently Asked Questions
Check Your Identity & Access Security Score
The VP Audit free assessment includes a dedicated Identity & Access domain covering MFA, privileged access, and user account hygiene.
Start Free Assessment →