About this resource

The Privileged Access Checklist provides a structured assessment of your organisation’s privileged access posture. It covers all five pillars of the Privileged Path Framework and helps identify gaps that need attention.

What’s included

  • Foundation checklist — identity hygiene, account separation, naming conventions, governance
  • Control checklist — PIM configuration, Conditional Access, MFA, least privilege
  • Isolation checklist — PAW deployment, device compliance, network segmentation, tiering
  • Operations checklist — break glass, rotation, lifecycle management, incident response
  • Validation checklist — monitoring, access reviews, compliance evidence, maturity assessment

How to use it

Work through each section with your identity and security teams. Score each item as implemented, partially implemented, or not implemented. Use the results to prioritise your privileged access roadmap.

Coming soon. This resource is being prepared for download. Check back for updates.