The problem

Most organisations believe they have privileged access under control. They’ve deployed PIM. They enforce MFA. Conditional Access policies are in place.

But the reality is different. Admin credentials are still used from unmanaged devices. Tier 0 systems share networks with general workloads. Break glass accounts sit untested in spreadsheets. Operational processes assume trust where none should exist.

Controls are not enough. Isolation matters.

A different approach

The Privileged Path Framework is a practical, opinionated model for securing privileged access end-to-end. It doesn’t replace vendor documentation — it builds on real-world implementation experience to provide a coherent strategy that most organisations are missing.

This is not about ticking compliance boxes. It’s about building an environment where privileged access is:

  • Controlled — through just-in-time access, approval workflows, and least privilege
  • Isolated — through dedicated admin workstations, network segmentation, and boundary enforcement
  • Continuously validated — through monitoring, audit, and evidence-based assurance

What this covers

The framework applies across:

  • Entra ID and hybrid identity
  • Microsoft 365 and Azure administration
  • On-premises Active Directory
  • Cloud-native and hybrid infrastructure
  • Regulatory environments across UK, EU, US, and global standards

Who this is for

  • Security architects designing privileged access strategy
  • Identity engineers implementing tiered administration
  • IT leaders who need practical guidance beyond vendor defaults
  • Consultants and advisors working with regulated organisations

The Privileged Path Framework is maintained by Andy Kemp Consulting, drawing on direct implementation experience across enterprise and public sector environments.