Back to Articles

How to Manage User Accounts and Permissions Effectively

How to Manage User Accounts and Permissions Effectively

User account management is one of those IT disciplines that rarely gets the attention it deserves — until something goes wrong. A disgruntled former employee accessing company data weeks after leaving, a junior team member accidentally deleting a critical shared folder, or a compromised account being used to send phishing emails to your clients — these are all consequences of poor user account and permissions management.

For UK businesses, the stakes extend beyond operational disruption. Under GDPR, organisations are required to implement appropriate technical and organisational measures to protect personal data. The ICO has explicitly stated that access controls — ensuring only authorised individuals can access personal data relevant to their role — are a fundamental part of compliance. Failure to manage user accounts properly is not merely a technical oversight; it is a regulatory risk.

This guide provides a comprehensive framework for managing user accounts and permissions effectively, covering everything from the principle of least privilege through to automated lifecycle management and audit procedures.

41%
of UK data breaches involve compromised user credentials
34%
of UK businesses have orphaned accounts from former employees
£3,200
Average cost of a user account related security incident
72 Hrs
GDPR breach notification deadline to the ICO

The Hidden Risk of Account Sprawl

As businesses adopt more cloud services and SaaS applications, the number of user accounts that need to be managed has multiplied dramatically. A typical employee at a mid-sized UK firm might have accounts across Microsoft 365, a CRM system, an accounting package, a project management tool, a file-sharing platform, and several industry-specific applications. Each of these accounts represents a potential entry point for an attacker and a potential vector for data leakage. Managing this sprawl effectively requires a centralised approach to identity management, consistent policies applied across all systems, and visibility into who has access to what at any given time.

The challenge is compounded by the prevalence of shadow IT — applications and services that employees adopt without formal IT approval. A marketing team member signs up for a design tool using their company email. A sales representative uses a personal Dropbox account to share files with a client. Each of these unofficial accounts creates an unmanaged identity with potential access to company data, entirely outside the control of your IT team. Establishing governance over shadow IT is an essential part of comprehensive user account management, requiring both technical controls such as single sign-on enforcement and cultural measures such as clear acceptable use policies.

The Principle of Least Privilege

The foundation of effective permissions management is the principle of least privilege: every user should have the minimum level of access necessary to perform their job function, and no more. This sounds straightforward in theory, but in practice it is one of the most commonly violated security principles in UK businesses.

The problem typically develops gradually. A new employee is set up with basic access, then requests additional permissions for a specific project. Those temporary permissions are never revoked. Over time, the user accumulates access to systems, folders, and applications far beyond what their role requires. Multiply this across an entire organisation and you have a sprawling, uncontrolled access landscape that would horrify any security auditor.

Implementing least privilege requires a deliberate, role-based approach to access management. Rather than granting permissions to individual users, you define roles — such as Sales Representative, Finance Manager, or Marketing Coordinator — and assign standardised permission sets to each role. When a new employee joins, they receive the permissions associated with their role. When they change roles, their old permissions are revoked and new ones are assigned. When they leave, all permissions are removed immediately.

NCSC Guidance on Access Control

The National Cyber Security Centre recommends that organisations implement role-based access control (RBAC) as a core security measure. Their guidance specifically highlights the importance of regular access reviews, prompt removal of access for leavers, and the separation of administrative and standard user accounts. These recommendations align directly with Cyber Essentials certification requirements, which many UK businesses pursue as a baseline security standard.

Audit Trails and Accountability

The principle of least privilege is only effective if it is accompanied by robust audit trails. Every change to user permissions — who granted access, when, and why — should be logged and reviewable. In the event of a security incident, these audit trails are essential for determining how a breach occurred and which data may have been compromised. They are equally important for demonstrating compliance to regulators; the ICO expects organisations to be able to show who had access to personal data and why that access was appropriate.

Implementing proper audit logging does not require expensive tools. Microsoft Entra ID and Active Directory both provide built-in audit logs that record permission changes, sign-in activity, and administrative actions. The key is ensuring that these logs are actively monitored rather than simply accumulating unread in a dashboard. Automated alerts for high-risk events — such as a user being added to a privileged security group, or an account signing in from an unusual location — transform passive logging into active security monitoring. Many UK businesses also benefit from centralising their audit logs in a Security Information and Event Management (SIEM) platform, which correlates events across multiple systems to identify suspicious patterns that would be invisible when viewing each system in isolation.

Active Directory and Entra ID: The Foundation

For most UK businesses using Microsoft technologies, user account management centres on Active Directory (for on-premises environments) or Microsoft Entra ID, formerly Azure Active Directory (for cloud and hybrid environments). These directory services provide centralised identity management, allowing you to create, modify, and disable user accounts from a single platform that controls access across your entire technology estate.

Organisational Unit Structure

A well-designed Active Directory structure mirrors your organisation. Organisational Units (OUs) typically reflect departments, locations, or a combination of both. This structure enables Group Policy Objects to be applied at the appropriate level, ensuring that security settings, software deployments, and access restrictions flow logically through the organisation.

Security Groups

Security groups are the mechanism through which permissions are assigned. Rather than granting a user direct access to a file share, application, or resource, you add the user to a security group that has been granted access. This approach scales efficiently and makes access auditing significantly easier. When someone asks who has access to the Finance folder, you can see at a glance which group has been granted access and who belongs to that group.

Role Security Groups Microsoft 365 Licence Access Level
Standard User All Staff, Department Group Business Basic Email, Teams, department files
Team Leader All Staff, Department Group, Management Business Standard Standard plus management reports
Finance Team All Staff, Finance, Accounting Systems Business Standard Standard plus financial systems and data
IT Administrator All Staff, IT Team, Server Admins E3 or E5 Full administrative access with audit logging
Director All Staff, Management, Board, All Departments Business Premium Broad access with enhanced security controls

Naming Conventions and Group Hygiene

A well-structured directory quickly becomes unmanageable without disciplined naming conventions. Security groups should follow a consistent pattern that makes their purpose immediately clear — for example, prefixing with the resource type and department: "FS-Finance-ReadWrite" for a file share group with read-write access to Finance files, or "App-CRM-Users" for users authorised to access the CRM application. Without such conventions, you end up with groups named "New Group 1", "Sales Access", and "John's Project" — names that tell you nothing about what access they grant or whether they are still relevant.

Nested groups — where one group contains another — can simplify administration but must be used carefully to avoid creating opaque permission chains. A user might be a member of a department group that is nested inside a project group that is itself nested inside a resource access group. When you try to determine why a particular user has access to a specific resource, you find yourself tracing a chain of group memberships three or four levels deep. Document your group nesting structure and review it regularly to ensure it remains logical and auditable. As a general rule, limit nesting to two levels at most, and ensure that every group membership chain can be explained in plain language to a non-technical auditor.

Stale security groups are another common problem. Over time, groups are created for projects, temporary teams, and one-off access requirements, and they are rarely cleaned up when no longer needed. These orphaned groups clutter your directory, create confusion during access reviews, and may inadvertently grant access to resources that should have been restricted. Include group lifecycle management in your regular access reviews, and assign an owner to every security group who is responsible for confirming its continued relevance.

The User Lifecycle: Joiners, Movers, and Leavers

Effective user management follows the complete lifecycle of an employee within your organisation. This lifecycle has three critical phases — joining, moving (changing role), and leaving — and each phase requires specific, documented procedures.

Joiners

When a new employee joins your organisation, their user account should be created following a standardised process. This includes creating the account with a strong temporary password, assigning the appropriate role-based security groups, provisioning the correct Microsoft 365 licence, setting up email and configuring any required distribution lists, granting access to relevant line-of-business applications, issuing and configuring hardware with all necessary software, and enrolling the user in multi-factor authentication before their first day.

The joiner process should be triggered by HR, not by the new employee or their manager submitting an ad hoc request. Integrating your HR system with your IT provisioning process ensures that accounts are created consistently and on time, ready for the employee on their first day.

Movers

When an employee changes role within the organisation, their permissions must be updated to reflect their new responsibilities. Crucially, this means removing permissions associated with the old role as well as adding permissions for the new role. In many organisations, the mover process is handled poorly — new permissions are added but old ones remain, gradually expanding the user's access footprint beyond what is appropriate.

Leavers

The leaver process is arguably the most critical phase from a security perspective. When an employee leaves your organisation, their account must be disabled immediately — ideally on their last working day, timed to coincide with the return of company equipment. Deleting the account should follow after a defined retention period, during which the account remains disabled but the mailbox and files are preserved for handover purposes.

Effective Leaver Process

  • Account disabled within one hour of departure
  • Password reset immediately upon notification
  • Mobile devices remotely wiped
  • Mailbox converted to shared for handover
  • Out-of-office reply configured
  • All security group memberships removed
  • VPN and remote access revoked
  • Third-party application access revoked

Common Leaver Failures

  • Account remains active for weeks or months
  • Password unchanged after departure
  • Company data remains on personal devices
  • Mailbox deleted, losing important correspondence
  • Emails bounce, alarming clients and contacts
  • Shared account passwords not changed
  • VPN access still functional remotely
  • Cloud application subscriptions still active and billing

Service Accounts and Shared Credentials

The user lifecycle framework applies cleanly to individual named user accounts, but most organisations also have service accounts and shared credentials that require separate management. Service accounts are used by applications and automated processes rather than by individual people. They often have elevated permissions — a backup service account, for example, needs access to every system it backs up. Because these accounts are not tied to a specific person, they are frequently overlooked in access reviews and can persist with excessive permissions indefinitely.

Best practice is to treat service accounts with even greater rigour than individual accounts. Each service account should have a documented owner — a named person responsible for its security and configuration. Service account passwords should be complex, unique, and rotated on a defined schedule. Where possible, use managed service accounts (in Active Directory) or workload identities (in Entra ID), which handle credential management automatically and eliminate the risk of a forgotten, never-rotated password.

Shared credentials — where multiple people use the same username and password to access a system — should be eliminated wherever possible. Shared accounts destroy accountability: when something goes wrong, you cannot determine which individual took the action. If a legacy system requires a shared account because it does not support individual logins, compensate with additional logging and controls, and include the shared account in your regular access reviews with a documented list of who knows the current password. When any member of the group leaves the organisation, the shared password must be changed immediately.

Multi-Factor Authentication: Non-Negotiable

No discussion of user account management is complete without emphasising multi-factor authentication (MFA). The NCSC considers MFA one of the most effective security controls available, and Cyber Essentials Plus certification requires it for all cloud services. Microsoft reports that MFA blocks 99.9 per cent of automated account compromise attacks.

Every user account in your organisation should be protected by MFA. This applies to Microsoft 365, VPN access, remote desktop connections, cloud applications, and any system accessible from outside your office network. The Microsoft Authenticator app provides a free, user-friendly MFA solution for Microsoft 365 environments, and most modern applications support similar authentication methods.

Password-only accounts compromised
80%
MFA-protected accounts compromised
<1%
UK businesses using MFA for all users
38%
UK businesses using MFA for admin accounts only
27%
UK businesses with no MFA at all
35%

Conditional Access Policies

Multi-factor authentication is most effective when deployed as part of a broader conditional access strategy. Conditional access policies in Microsoft Entra ID allow you to define rules that determine when additional verification is required based on factors such as the user's location, the device they are using, the application they are accessing, and the risk level of the sign-in. For example, you might allow a user to access email from a compliant company device on the corporate network without additional verification, but require MFA when they access the same email from a personal device or from an overseas location.

This risk-based approach to authentication balances security with usability. Requiring MFA for every single sign-in, regardless of context, can create friction that frustrates users and reduces productivity. Conditional access allows you to apply the strongest controls where the risk is highest — external access, privileged operations, sensitive applications — while maintaining a smoother experience for low-risk scenarios. The result is a security posture that is both stronger and more user-friendly than a blanket MFA requirement.

Rolling out MFA across an organisation requires careful planning and communication. Start with IT administrators and other privileged accounts, where the security benefit is greatest and the users are most technically capable. Then extend to all cloud-accessible services. Provide clear instructions, offer multiple authentication methods — authenticator app, phone call, hardware token — to accommodate different preferences and situations, and allow a reasonable transition period with support available for users who encounter difficulties. A well-communicated, phased rollout achieves near-complete adoption with minimal disruption; a sudden, poorly explained mandate generates helpdesk queues and resentment.

Regular Access Reviews

Even with robust joiner, mover, and leaver processes, permissions drift over time. Temporary access granted for a project is forgotten. A user moves teams but retains old permissions. An application grants broader access than intended. Regular access reviews catch and correct these issues before they become security incidents.

We recommend conducting a full access review quarterly. This involves generating reports from Active Directory and Entra ID showing all user accounts, their group memberships, and their last sign-in dates. Department managers should review the access lists for their teams and confirm that every permission is still appropriate. Any anomalies — orphaned accounts, excessive permissions, or accounts with no recent activity — should be investigated and remediated.

Privileged Account Management

Administrative accounts require special attention. These accounts have the power to create and delete users, modify security settings, access any data, and fundamentally alter your technology environment. Best practice dictates that administrators should have separate standard and administrative accounts, use their standard account for day-to-day work, and only elevate to the administrative account when performing specific tasks that require it.

Administrative accounts should be subject to enhanced monitoring, with alerts configured for unusual activity such as sign-ins from unexpected locations, access outside normal working hours, or bulk operations like mass file deletion or account modification.

Accounts with MFA enabledTarget: 100%
Orphaned accounts removedTarget: 100%
Role-based access implementedTarget: 100%
Quarterly access reviews completedTarget: 100%

Just-in-Time Access and Privileged Access Workstations

Traditional administrative access models grant permanent elevated permissions to IT staff, creating a persistent attack surface. If an administrator's account is compromised, the attacker immediately inherits full administrative privileges. Just-in-time (JIT) access addresses this risk by granting administrative permissions only when they are needed and only for the duration of the specific task. Microsoft Entra ID Privileged Identity Management (PIM) provides this capability natively, allowing administrators to request elevation of their permissions for a defined period, subject to approval workflows and additional verification.

The benefit of JIT access extends beyond security. When administrators must explicitly request and justify elevated access for each task, it creates a natural audit trail of administrative activity. Rather than reviewing logs to determine what an always-privileged account did during a particular period, you have a clear record of when privileges were activated, why, and what was done during the elevated session. This accountability discourages casual use of administrative privileges and ensures that elevated access is used only when genuinely required.

For organisations with particularly sensitive environments, privileged access workstations (PAWs) add another layer of protection. A PAW is a dedicated, hardened device used exclusively for administrative tasks. It is isolated from the general network, has restricted internet access, and runs only the tools necessary for administration. By separating administrative work from day-to-day activities like email and web browsing, PAWs dramatically reduce the risk that an administrator's device is compromised through phishing or a malicious website, which then provides an attacker with a direct path to administrative tools and systems.

Automation and Self-Service

As your organisation grows, manual user management becomes increasingly unsustainable. Automation tools — including Microsoft Entra ID lifecycle workflows, PowerShell scripts, and third-party identity governance platforms — can streamline account provisioning, deprovisioning, and permission management while reducing the risk of human error.

Self-service capabilities also reduce the burden on your IT team. Self-service password reset, for example, allows users to securely reset their own passwords without calling the help desk — a feature that Microsoft estimates saves organisations an average of £15 per password reset incident. Group-managed access requests, where users can request access to resources and have those requests approved by the appropriate manager through an automated workflow, further reduces administrative overhead while maintaining proper governance.

Effective user account and permissions management is not glamorous, but it is fundamental to both security and compliance. Implementing role-based access control, maintaining rigorous joiner, mover, and leaver processes, enforcing multi-factor authentication, and conducting regular access reviews will dramatically reduce your organisation's risk profile and ensure you meet your obligations under GDPR and Cyber Essentials.

Aligning with Compliance Frameworks

Effective user account management is not merely a technical best practice — it is a requirement under multiple compliance frameworks that apply to UK businesses. Cyber Essentials, the government-backed certification scheme, explicitly requires organisations to control user access to data and services through well-managed accounts. Cyber Essentials Plus adds verified testing of these controls. ISO 27001, the international information security standard, includes detailed requirements for access control, user registration, privilege management, and regular access reviews. For businesses handling payment card data, PCI DSS mandates strict controls over user identification, authentication, and authorisation.

Even if your business is not currently pursuing formal certification, aligning your account management practices with these frameworks provides a structured, proven approach that will serve you well as your organisation grows. When the time comes to pursue Cyber Essentials certification, respond to a client's security questionnaire, or demonstrate GDPR compliance to the ICO, having well-established account management practices already in place transforms a potentially stressful audit into a straightforward evidence-gathering exercise.

The investment in proper user account and permissions management pays dividends across every aspect of your business. It reduces your exposure to data breaches and the associated regulatory penalties, financial losses, and reputational damage. It improves operational efficiency by ensuring that employees have the access they need from day one, without delays caused by ad hoc permission requests. It supports compliance with the regulatory frameworks that govern your industry. And it provides the foundation for more advanced security measures — such as zero-trust architecture and data loss prevention — that become increasingly important as your business grows and your data becomes more valuable.

Need Help Managing User Accounts and Permissions?

Cloudswitched helps UK businesses implement robust identity and access management using Microsoft Entra ID and Active Directory. From role-based access design to automated lifecycle management and quarterly access reviews, we ensure your user accounts are secure and compliant. Get in touch to discuss your requirements.

Explore Network Admin Services
Tags:Network Admin
CloudSwitched

London-based managed IT services provider offering support, cloud solutions and cybersecurity for SMEs.

CloudSwitched Service

Network Administration

Design, deployment and management of secure, high-performance business networks

Learn More
CloudSwitchedNetwork Administration
Explore Service

Technology Stack

Powered by industry-leading technologies including SolarWinds, Cloudflare, BitDefender, AWS, Microsoft Azure, and Cisco Meraki to deliver secure, scalable, and reliable IT solutions.

SolarWinds
Cloudflare
BitDefender
AWS
Hono
Opus
Office 365
Microsoft
Cisco Meraki
Microsoft Azure

Latest Articles

11
  • Web Development

What is a CDN and Does Your Business Website Need One?

11 Oct, 2025

Read more
17
  • Cloud Backup

How to Recover from a Corrupted Database

17 Feb, 2026

Read more
22
  • Virtual CIO

What is a Virtual CIO and Does Your Business Need One?

22 Jan, 2026

Read more

Enquiry Received!

Thank you for getting in touch. A member of our team will review your enquiry and get back to you within 24 hours.