


Citadel Cloud Management
Privileged Access Management Blueprint
Cybersecurity FrameworksCreated by Kenny Ogunlowo
Product Description
Identity & Access Management Framework — Enterprise IAM Governance Toolkit
After managing identity architectures where a single over-provisioned service account could provide domain admin equivalent access to a threat actor, I built this framework because identity is the new perimeter — and 80% of breaches in 2025 involved compromised credentials or identity misconfigurations according to CrowdStrike's Global Threat Report.
The core gap: most organizations have 3-5x more privileged accounts than they need, service accounts with passwords that haven't rotated in years, and no automated access certification process. NIST SP 800-63 Rev 4 updated digital identity guidelines, but implementation guidance for enterprise environments with hybrid AD/cloud identity is sparse.
What You Get
- Identity Lifecycle Management Playbooks — Joiner/mover/leaver procedures for hybrid environments (Active Directory + Entra ID + AWS IAM + GCP IAM). Includes automated provisioning templates (SCIM configurations), role mining methodology, and orphaned account detection scripts.
- Privileged Access Management (PAM) — Architecture blueprints for tiered administration (Tier 0/1/2 model), just-in-time access configurations (Azure PIM, AWS SSO temporary credentials), emergency break-glass procedures, and privileged session recording requirements.
- Access Certification Framework — Quarterly access review templates, risk-based review scoping (certify high-risk access monthly, low-risk semi-annually), reviewer assignment methodology, and automated revocation workflows for non-certified access.
- Authentication Hardening — Phishing-resistant MFA deployment guides (FIDO2 security keys, Windows Hello for Business, passkeys), legacy protocol elimination playbooks (NTLM, basic auth, legacy TLS), and Conditional Access policy sets for Zero Trust authentication.
- Service Account Governance — Discovery scripts for all service accounts across AD, cloud platforms, and applications. Includes risk scoring, rotation procedures, managed identity migration guides (eliminate passwords entirely), and monitoring rules for service account abuse patterns.
Brownfield Implementation
Phase 1 (Weeks 1-3): Complete identity inventory — discover all accounts (human, service, shared) across all platforms. Phase 2 (Weeks 4-8): Implement PAM for Tier 0 (domain controllers, identity infrastructure) and enforce MFA on all admin access. Phase 3 (Weeks 9-14): Deploy access certification for all privileged access and begin service account remediation. Phase 4 (Weeks 15-20): Extend to standard user governance, implement Conditional Access policies, and automate joiner/mover/leaver.
Scope Limitations
Covers enterprise identity governance for Microsoft and AWS/GCP cloud environments. Does not cover customer identity (CIAM/B2C), biometric enrollment procedures, physical access control integration, or identity proofing for onboarding (covered by NIST SP 800-63A). Assumes Active Directory or Entra ID as the primary identity provider.
Audit Evidence
Satisfies NIST SP 800-53 AC-2 (Account Management), AC-6 (Least Privilege), IA-2 (Multi-Factor Authentication), and IA-5 (Authenticator Management). Generates: access certification records, privileged account inventory, MFA enrollment status, service account risk assessments, and joiner/mover/leaver process documentation required for SOC 2 CC6.1-CC6.3, HIPAA §164.312(d), and PCI DSS Req 7/8 evidence.
Written by Kenny Ogunlowo — Detection Engineer, U.S. Secret Clearance holder. Managed enterprise identity architectures at Lockheed Martin and Cigna Healthcare.