User account management is one of those IT disciplines that rarely gets the attention it deserves — until something goes wrong. A disgruntled former employee accessing company data weeks after leaving, a junior team member accidentally deleting a critical shared folder, or a compromised account being used to send phishing emails to your clients — these are all consequences of poor user account and permissions management.
For UK businesses, the stakes extend beyond operational disruption. Under GDPR, organisations are required to implement appropriate technical and organisational measures to protect personal data. The ICO has explicitly stated that access controls — ensuring only authorised individuals can access personal data relevant to their role — are a fundamental part of compliance. Failure to manage user accounts properly is not merely a technical oversight; it is a regulatory risk.
This guide provides a comprehensive framework for managing user accounts and permissions effectively, covering everything from the principle of least privilege through to automated lifecycle management and audit procedures.
The Principle of Least Privilege
The foundation of effective permissions management is the principle of least privilege: every user should have the minimum level of access necessary to perform their job function, and no more. This sounds straightforward in theory, but in practice it is one of the most commonly violated security principles in UK businesses.
The problem typically develops gradually. A new employee is set up with basic access, then requests additional permissions for a specific project. Those temporary permissions are never revoked. Over time, the user accumulates access to systems, folders, and applications far beyond what their role requires. Multiply this across an entire organisation and you have a sprawling, uncontrolled access landscape that would horrify any security auditor.
Implementing least privilege requires a deliberate, role-based approach to access management. Rather than granting permissions to individual users, you define roles — such as Sales Representative, Finance Manager, or Marketing Coordinator — and assign standardised permission sets to each role. When a new employee joins, they receive the permissions associated with their role. When they change roles, their old permissions are revoked and new ones are assigned. When they leave, all permissions are removed immediately.
The National Cyber Security Centre recommends that organisations implement role-based access control (RBAC) as a core security measure. Their guidance specifically highlights the importance of regular access reviews, prompt removal of access for leavers, and the separation of administrative and standard user accounts. These recommendations align directly with Cyber Essentials certification requirements, which many UK businesses pursue as a baseline security standard.
Active Directory and Entra ID: The Foundation
For most UK businesses using Microsoft technologies, user account management centres on Active Directory (for on-premises environments) or Microsoft Entra ID, formerly Azure Active Directory (for cloud and hybrid environments). These directory services provide centralised identity management, allowing you to create, modify, and disable user accounts from a single platform that controls access across your entire technology estate.
Organisational Unit Structure
A well-designed Active Directory structure mirrors your organisation. Organisational Units (OUs) typically reflect departments, locations, or a combination of both. This structure enables Group Policy Objects to be applied at the appropriate level, ensuring that security settings, software deployments, and access restrictions flow logically through the organisation.
Security Groups
Security groups are the mechanism through which permissions are assigned. Rather than granting a user direct access to a file share, application, or resource, you add the user to a security group that has been granted access. This approach scales efficiently and makes access auditing significantly easier. When someone asks who has access to the Finance folder, you can see at a glance which group has been granted access and who belongs to that group.
| Role | Security Groups | Microsoft 365 Licence | Access Level |
|---|---|---|---|
| Standard User | All Staff, Department Group | Business Basic | Email, Teams, department files |
| Team Leader | All Staff, Department Group, Management | Business Standard | Standard plus management reports |
| Finance Team | All Staff, Finance, Accounting Systems | Business Standard | Standard plus financial systems and data |
| IT Administrator | All Staff, IT Team, Server Admins | E3 or E5 | Full administrative access with audit logging |
| Director | All Staff, Management, Board, All Departments | Business Premium | Broad access with enhanced security controls |
The User Lifecycle: Joiners, Movers, and Leavers
Effective user management follows the complete lifecycle of an employee within your organisation. This lifecycle has three critical phases — joining, moving (changing role), and leaving — and each phase requires specific, documented procedures.
Joiners
When a new employee joins your organisation, their user account should be created following a standardised process. This includes creating the account with a strong temporary password, assigning the appropriate role-based security groups, provisioning the correct Microsoft 365 licence, setting up email and configuring any required distribution lists, granting access to relevant line-of-business applications, issuing and configuring hardware with all necessary software, and enrolling the user in multi-factor authentication before their first day.
The joiner process should be triggered by HR, not by the new employee or their manager submitting an ad hoc request. Integrating your HR system with your IT provisioning process ensures that accounts are created consistently and on time, ready for the employee on their first day.
Movers
When an employee changes role within the organisation, their permissions must be updated to reflect their new responsibilities. Crucially, this means removing permissions associated with the old role as well as adding permissions for the new role. In many organisations, the mover process is handled poorly — new permissions are added but old ones remain, gradually expanding the user's access footprint beyond what is appropriate.
Leavers
The leaver process is arguably the most critical phase from a security perspective. When an employee leaves your organisation, their account must be disabled immediately — ideally on their last working day, timed to coincide with the return of company equipment. Deleting the account should follow after a defined retention period, during which the account remains disabled but the mailbox and files are preserved for handover purposes.
Effective Leaver Process
- Account disabled within one hour of departure
- Password reset immediately upon notification
- Mobile devices remotely wiped
- Mailbox converted to shared for handover
- Out-of-office reply configured
- All security group memberships removed
- VPN and remote access revoked
- Third-party application access revoked
Common Leaver Failures
- Account remains active for weeks or months
- Password unchanged after departure
- Company data remains on personal devices
- Mailbox deleted, losing important correspondence
- Emails bounce, alarming clients and contacts
- Shared account passwords not changed
- VPN access still functional remotely
- Cloud application subscriptions still active and billing
Multi-Factor Authentication: Non-Negotiable
No discussion of user account management is complete without emphasising multi-factor authentication (MFA). The NCSC considers MFA one of the most effective security controls available, and Cyber Essentials Plus certification requires it for all cloud services. Microsoft reports that MFA blocks 99.9 per cent of automated account compromise attacks.
Every user account in your organisation should be protected by MFA. This applies to Microsoft 365, VPN access, remote desktop connections, cloud applications, and any system accessible from outside your office network. The Microsoft Authenticator app provides a free, user-friendly MFA solution for Microsoft 365 environments, and most modern applications support similar authentication methods.
Regular Access Reviews
Even with robust joiner, mover, and leaver processes, permissions drift over time. Temporary access granted for a project is forgotten. A user moves teams but retains old permissions. An application grants broader access than intended. Regular access reviews catch and correct these issues before they become security incidents.
We recommend conducting a full access review quarterly. This involves generating reports from Active Directory and Entra ID showing all user accounts, their group memberships, and their last sign-in dates. Department managers should review the access lists for their teams and confirm that every permission is still appropriate. Any anomalies — orphaned accounts, excessive permissions, or accounts with no recent activity — should be investigated and remediated.
Privileged Account Management
Administrative accounts require special attention. These accounts have the power to create and delete users, modify security settings, access any data, and fundamentally alter your technology environment. Best practice dictates that administrators should have separate standard and administrative accounts, use their standard account for day-to-day work, and only elevate to the administrative account when performing specific tasks that require it.
Administrative accounts should be subject to enhanced monitoring, with alerts configured for unusual activity such as sign-ins from unexpected locations, access outside normal working hours, or bulk operations like mass file deletion or account modification.
Automation and Self-Service
As your organisation grows, manual user management becomes increasingly unsustainable. Automation tools — including Microsoft Entra ID lifecycle workflows, PowerShell scripts, and third-party identity governance platforms — can streamline account provisioning, deprovisioning, and permission management while reducing the risk of human error.
Self-service capabilities also reduce the burden on your IT team. Self-service password reset, for example, allows users to securely reset their own passwords without calling the help desk — a feature that Microsoft estimates saves organisations an average of £15 per password reset incident. Group-managed access requests, where users can request access to resources and have those requests approved by the appropriate manager through an automated workflow, further reduces administrative overhead while maintaining proper governance.
Effective user account and permissions management is not glamorous, but it is fundamental to both security and compliance. Implementing role-based access control, maintaining rigorous joiner, mover, and leaver processes, enforcing multi-factor authentication, and conducting regular access reviews will dramatically reduce your organisation's risk profile and ensure you meet your obligations under GDPR and Cyber Essentials.
Need Help Managing User Accounts and Permissions?
Cloudswitched helps UK businesses implement robust identity and access management using Microsoft Entra ID and Active Directory. From role-based access design to automated lifecycle management and quarterly access reviews, we ensure your user accounts are secure and compliant. Get in touch to discuss your requirements.
GET IN TOUCH
