Identity Directory Services
The Identity Directory Services requirement means you must run a centralized identity directory (or tightly governed set of directories) that acts as the source of truth for workforce identities, and you must keep every connected system and application synchronized to it. Operationally, this is about preventing orphan accounts, inconsistent attributes, and missed deprovisioning across EHR, cloud, SaaS, VPN, and administrative systems.
Key takeaways:
- One authoritative directory must drive identity lifecycle events (joiner/mover/leaver) across systems.
- Synchronization must be designed, monitored, and evidenced, not assumed.
- Auditors look for drift: mismatched accounts, stale access, and manual exceptions without control.
Centralized identity directory services sit underneath every access control you rely on: MFA, SSO, privileged access, EHR access, and third-party remote support. If the directory is fragmented, out of sync, or partially bypassed, you lose control over who exists in your environment, what attributes they carry (role, department, location), and whether access is removed when the relationship ends. That failure mode shows up as orphaned accounts, shared credentials, “mystery admins,” and inconsistent entitlements that are hard to detect until an incident or audit.
HICP Practice 6.2 sets a clear expectation: implement centralized identity directory services and keep them properly synchronized across all connected systems and applications (HICP 2023 - 405(d) Health Industry Cybersecurity Practices). For a Compliance Officer, CCO, or GRC lead, “operationalize” means you can point to a defined identity source of truth, documented integrations, monitored sync jobs, exception handling, and evidence that joiner/mover/leaver events propagate reliably.
This page gives requirement-level guidance: what the requirement means, who it applies to, how to implement it step-by-step, what artifacts to retain, and what auditors commonly challenge.
Regulatory text
Requirement (HICP Practice 6.2): “Implement centralized identity directory services with proper synchronization across all connected systems and applications.” (HICP 2023 - 405(d) Health Industry Cybersecurity Practices)
Operator interpretation:
You need an authoritative directory service for identities and attributes, and you need controlled, repeatable synchronization so connected systems consistently reflect the directory’s truth. The control fails if systems are manually managed “on the side,” sync is intermittent without detection, or identity attributes diverge across applications.
Plain-English interpretation (what this requires in practice)
A compliant implementation has these characteristics:
- A defined “source of truth” for workforce identities (employees, contractors, interns, volunteers, temps), typically backed by HR or an identity governance process.
- A centralized directory platform that stores identities and attributes used for access decisions (name, unique ID, email/UPN, role, department, manager, location, employment status).
- Synchronization to downstream systems (EHR, ERP, cloud consoles, VPN, endpoint management, ticketing, file shares, databases, SaaS apps) so accounts are created, updated, disabled, and removed based on directory lifecycle changes.
- Monitoring and exception handling for sync failures, connector errors, duplicate identities, and attribute conflicts.
Centralization can be a single directory or a hub-and-spoke model (for example, an on-prem directory synced to a cloud directory) as long as you can show governance, authoritative attributes, and reliable propagation.
Who it applies to (entity and operational context)
Entity types:
- Healthcare organizations (providers, payers, labs, clinics, hospitals, integrated delivery networks) that manage workforce access to clinical and business systems. (HICP 2023 - 405(d) Health Industry Cybersecurity Practices)
- Health IT vendors and other third parties that operate platforms processing healthcare data or providing administrative access paths into customer environments. (HICP 2023 - 405(d) Health Industry Cybersecurity Practices)
Operational contexts where auditors focus:
- Hybrid identity (on-prem directory + cloud directory) with multiple tenants or forests/domains.
- M&A environments with multiple directories and inconsistent identity namespaces.
- EHR ecosystems with add-on modules and legacy apps that don’t support modern federation.
- Third-party access (managed service providers, billing partners, remote support) where identities often bypass HR-driven lifecycle processes.
What you actually need to do (step-by-step)
Use this as an implementation runbook. Assign clear owners: IAM lead (technical), HR/People Ops (authoritative status), application owners (integration), and GRC (evidence).
Step 1: Declare the identity architecture and “source of truth”
- Define identity populations: workforce, privileged admins, break-glass accounts, service accounts, and third-party user identities.
- Name your authoritative sources:
- HR system for employment status and core attributes.
- Identity directory for authentication identifiers and group membership.
- Set the non-negotiable rule: no production user account exists in a connected system unless it originates from (or is reconciled to) the directory record.
Deliverable: Identity Source-of-Truth statement (one page) approved by IT and Compliance.
Step 2: Standardize identity attributes and identifiers
- Pick a unique immutable identifier (employee ID or equivalent) and map it across systems.
- Define required attributes for access decisions: role, department, location, manager, status, and contractor end date where applicable.
- Define naming standards (UPN/email, display name) and collision handling for duplicates.
Why auditors care: attribute drift creates unauthorized access through mis-scoped group rules and stale role assignments.
Step 3: Inventory connected systems and classify synchronization method
Build an application inventory that answers:
- Does the system authenticate directly to the directory, use SSO/federation, or manage local accounts?
- What objects must sync (users, groups, roles)?
- Is provisioning automatic (SCIM/API), directory sync agent, or manual?
Create a simple classification:
| System type | Expected approach | Compliance risk if not integrated |
|---|---|---|
| Modern SaaS | SSO + automated provisioning (SCIM/API) | Orphans, inconsistent deprovisioning |
| Legacy on-prem app | Directory auth (LDAP/Kerberos) or controlled local accounts with reconciliation | Local accounts proliferate |
| Admin consoles (cloud/IaaS) | Central directory / IdP integration + strict admin group controls | Privilege sprawl |
| EHR + ancillary modules | Directory-backed authentication where supported; otherwise controlled local accounts tied to directory identities | Clinical access persists after termination |
Step 4: Implement synchronization (provisioning + deprovisioning) for lifecycle events
For each connected system:
- Provisioning trigger: what creates accounts (new hire, contractor onboarding, approved request)?
- Mover trigger: what updates entitlements (role/department/location changes)?
- Deprovisioning trigger: what disables/removes access (termination, contractor end date, leave status)?
- Control the exceptions: define when local accounts are allowed and how they get reviewed.
Design expectation: directory changes propagate to systems quickly enough to meet your internal risk tolerance, and failures generate tickets with ownership.
Step 5: Add detection for sync failures and identity drift
“Proper synchronization” requires you to detect when it breaks.
Minimum operational checks:
- Connector health monitoring (sync job failures, API errors, disabled agents).
- Reconciliation reports that identify:
- accounts present in apps but missing in the directory,
- accounts disabled in directory but active in apps,
- duplicate identities mapped to one person,
- privileged roles assigned outside approved groups.
If you use Daydream to manage compliance operations, treat these reconciliations as recurring control activities with assigned owners, evidence capture, and exception workflows so audit requests don’t turn into screenshot hunts.
Step 6: Govern privileged and non-human identities explicitly
Central directory services often handle workforce identities well but leave gaps in:
- Service accounts (app-to-app, integration users)
- Robotic process automation accounts
- Shared admin accounts (should be minimized and justified)
- Break-glass accounts (must be controlled, monitored, and reviewed)
Tie each non-human account to:
- a business owner,
- a technical owner,
- a purpose,
- rotation/credential storage method,
- and a disablement plan.
Step 7: Document, train, and operationalize change control
Synchronization breaks most often during:
- domain/tenant migrations,
- app upgrades,
- SSO cutovers,
- HR system field changes.
Require change tickets to include:
- identity impact assessment,
- attribute mapping updates,
- connector test plan,
- rollback plan.
Required evidence and artifacts to retain
Auditors and assessors typically want proof that the directory is central, integrations exist, and synchronization is controlled. Retain:
- Identity architecture diagram showing directory, IdP/SSO, HR source, and connected systems.
- Application integration inventory with sync method, owner, and last review date.
- Attribute mapping documentation (HR → directory → downstream apps).
- Provisioning/deprovisioning SOPs (joiner/mover/leaver) and exception handling process.
- Sync monitoring evidence: alerts, dashboards, tickets, and incident records for failed syncs.
- Reconciliation outputs and remediation tickets for identified drift.
- Access reviews for privileged groups managed through the directory.
- Third-party identity approach: how contractors and third parties are created, time-bound, and removed.
Common exam/audit questions and hangups
Expect questions like:
- “Which system is the authoritative source for employment status and termination?”
- “Show me a termination and prove access was removed from the EHR and key SaaS applications.”
- “How do you detect accounts in applications that do not exist in the directory?”
- “Which applications are not integrated, and what compensating controls exist?”
- “Who approves attribute mappings and group-to-role rules, and how often are they reviewed?”
- “How do you manage contractor end dates and third-party offboarding?”
Common hangup: teams show SSO is in place but cannot prove provisioning and deprovisioning are synchronized across apps.
Frequent implementation mistakes (and how to avoid them)
- SSO-only designs that ignore lifecycle. SSO reduces password sprawl, but orphan accounts still exist in downstream apps. Fix: implement provisioning/deprovisioning or reconciliation.
- Multiple “sources of truth” by accident. Local admins create accounts directly in apps for speed. Fix: remove admin rights, require directory-driven creation, and log/approve exceptions.
- Attribute chaos. Role and department values are inconsistent across HR and IT. Fix: define a controlled attribute dictionary and validate values before syncing.
- Ignoring non-human accounts. Service accounts multiply and never get reviewed. Fix: inventory, ownership, and periodic review tied to business processes.
- No monitoring for sync breakage. Connectors fail silently until an audit. Fix: alerting, ticketing, and reconciliation reports.
Enforcement context and risk implications
No public enforcement cases were provided in the supplied source catalog for this requirement. Practically, weak directory centralization increases the likelihood of unauthorized access through stale accounts, uncontrolled privilege assignment, and delayed deprovisioning, which can raise patient safety, privacy, and operational risks in healthcare environments.
Practical 30/60/90-day execution plan
Use this as a sequencing guide; adjust based on your environment complexity and change windows.
First 30 days: establish control boundaries
- Confirm the authoritative source(s) for identity and employment status.
- Publish the identity architecture diagram and the “no local-only accounts” rule (with exceptions process).
- Build the connected-systems inventory and flag systems with local accounts.
- Implement monitoring for existing directory sync tooling and route alerts into ticketing.
Days 31–60: close the largest lifecycle gaps
- Prioritize integrations for systems with high-risk access (EHR, remote access, cloud admin consoles).
- Implement automated provisioning/deprovisioning where supported; otherwise implement reconciliation plus documented compensating controls.
- Standardize required identity attributes and finalize mapping documentation.
- Start drift reporting (accounts not in directory, disabled mismatch, privilege mismatch) and track remediation.
Days 61–90: make it auditable and durable
- Run tabletop tests: new hire, role change, termination, contractor end date. Capture evidence.
- Review privileged directory groups and tighten ownership/approvals.
- Formalize periodic reviews: integration inventory review, drift remediation SLAs, and exception recertification.
- Centralize evidence collection in your GRC workflow (Daydream can help structure recurring tasks, store artifacts, and produce audit-ready narratives).
Frequently Asked Questions
Do we need exactly one directory product to meet the identity directory services requirement?
No. You need a centralized identity directory service model with a clearly defined source of truth and controlled synchronization across connected systems (HICP 2023 - 405(d) Health Industry Cybersecurity Practices). Hybrid and multi-directory designs can pass if governance and reconciliation prevent drift.
Does SSO satisfy the “proper synchronization” part by itself?
Usually not. SSO controls authentication, but it does not guarantee accounts are created, updated, and disabled consistently in each application. Auditors typically want lifecycle evidence for provisioning and deprovisioning, not just login flows.
What if a legacy application cannot integrate with our directory?
Document the limitation, require named accounts tied to directory identities, restrict who can create accounts, and run regular reconciliations to detect orphaned or stale users. Treat each exception as a risk decision with compensating controls and evidence.
How should we handle third-party identities (MSP, billing partner, vendor support)?
Put third-party users into the same lifecycle process as workforce users: unique identity, documented sponsor/owner, time-bound access, and deprovisioning triggers. Avoid “shared vendor logins” unless you have a formally approved exception with monitoring.
What evidence best proves deprovisioning works end-to-end?
A sampled termination record that traces HR status change (or equivalent) to directory disablement and then to downstream application disablement, with timestamps from logs or tickets. Pair it with reconciliation output showing no remaining active accounts for the identity.
Where does an identity directory end and IAM governance begin?
Directory services store identities and attributes and feed connected systems. Governance defines who approves access, how role/group rules are managed, how exceptions are handled, and how drift is detected and remediated.
Frequently Asked Questions
Do we need exactly one directory product to meet the identity directory services requirement?
No. You need a centralized identity directory service model with a clearly defined source of truth and controlled synchronization across connected systems (HICP 2023 - 405(d) Health Industry Cybersecurity Practices). Hybrid and multi-directory designs can pass if governance and reconciliation prevent drift.
Does SSO satisfy the “proper synchronization” part by itself?
Usually not. SSO controls authentication, but it does not guarantee accounts are created, updated, and disabled consistently in each application. Auditors typically want lifecycle evidence for provisioning and deprovisioning, not just login flows.
What if a legacy application cannot integrate with our directory?
Document the limitation, require named accounts tied to directory identities, restrict who can create accounts, and run regular reconciliations to detect orphaned or stale users. Treat each exception as a risk decision with compensating controls and evidence.
How should we handle third-party identities (MSP, billing partner, vendor support)?
Put third-party users into the same lifecycle process as workforce users: unique identity, documented sponsor/owner, time-bound access, and deprovisioning triggers. Avoid “shared vendor logins” unless you have a formally approved exception with monitoring.
What evidence best proves deprovisioning works end-to-end?
A sampled termination record that traces HR status change (or equivalent) to directory disablement and then to downstream application disablement, with timestamps from logs or tickets. Pair it with reconciliation output showing no remaining active accounts for the identity.
Where does an identity directory end and IAM governance begin?
Directory services store identities and attributes and feed connected systems. Governance defines who approves access, how role/group rules are managed, how exceptions are handled, and how drift is detected and remediated.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream