Reports

Identity Security Readiness Checklist

May 19th, 2026

7 min read

Getting your Trinity Audio player ready...

Identity Security Readiness Checklist

Understanding, let alone maintaining, identity security posture across any large organization- with its diverse and always evolving application estate- is a constant challenge.

Remember, that estate includes applications created by different developers, at different times- when technology, regulations and cyber risk were different- and even by different organizations if acquisitions were part of the growth strategy.

Any approach, but especially an automated one, that provides a comprehensive and accurate view into the true state of identity, is hugely valuable to CISOs.  Especially when it can surface all of the identity flows coded in each application.  We know that many threat actors are adept at finding the alternate or forgotten ways into our organizations, and this report highlights the most common exposures we need to look out for (and address).

The insights shared here are instructive for every cyber security professional.

Oliver Newbury
Chief Strategy Officer
and former CISO
  • 48%

    Storage of hard coded, cleartext credentials or use weak hashing

  • 44%

    Authentication paths that bypass the corporate Identity Provider

  • 40%

    A lack of baseline controls like rate limiting, account lockout and password complexity

  • 37%

    Outdated or non-standard authentication protocols

  • 37%

    of applications failed to enforce access controls fully or at all

our analysis of applications shows
48%
of applications store credentials in cleartext.
our analysis of applications shows
44%
of applications have authentication paths that bypass the corporate Identity Provider (IdP).
our analysis of applications shows
40%
of applications lack of baseline controls like rate limiting, account lockout and password complexity
our analysis of applications shows
37%
of applications use outdated or non-standard authentication protocols
our analysis of applications shows
37%
of applications failed to enforce access controls consistently or at all.

Checklist to Identify the Top Missing Identity Controls

Download Checklist
  • Discovery and Gap Analysis: Continuous Visibility Beyond the Known

    Orchid delivers continuous, telemetry-driven visibility into identity implementations across all automatically discovered applications regardless of geography, technology stack, or existing compliance knowledge. This capability empowers organizations to uncover both commonly missed controls and hidden identity mechanisms that conventional audits and reviews often fail to detect.

  • No Prior Context or Manual Input Required

    Unlike traditional assessment and onboarding processes that rely on interviews, documentation, or involvement from app owners or developers, Orchid's analysis is entirely autonomous. It requires no prior data points, tribal knowledge, or manual onboarding, making it ideal for large, fast-changing environments.

  • Save Time, Save Money — Harness Your True Identity Landscape

    By eliminating the need for human-led discovery, context-gathering, or code walkthroughs, Orchid significantly reduces the time and cost of identity posture management. It accelerates both discovery, gap analysis and remediation cycles including onboarding, freeing up security teams and engineering resources to focus on higher-impact work while utilizing the organizational siloed identity tools.

  • Checklist, Fully Covered

    Our platform aligns directly with the Checklist to Identify the Top Missing Identity Controls and many more providing instant, actionable insights on where your applications stand and what needs attention.

  • January 2025

    PowerSchool Breach

    Cybercriminals reportedly used stolen credentials to access a support portal that lacked MFA, exposing sensitive student and parent data.

  • March 2025

    Jaguar Land Rover Incident

    A threat actor used stolen credentials to infiltrate the company’s Jira system, allegedly stealing over 700 internal documents.

  • April 2025

    Verizon Data Breach Investigations Report

    Verizon Identifies Stolen Credentials as Top Breach Entry Point In their latest report