An identity third-party risk assessment is the fastest way to see how much damage that smoke can do. It evaluates every external service, SaaS provider, contractor system, and API that touches your identity layer. Each third-party link to your authentication, authorization, or directory service is a potential point of failure. If one is compromised, it can be used to pivot into your core systems.
The process starts with mapping every identity integration. List every vendor that has user data, SSO access, or API tokens. Then, score each one based on data sensitivity, permission scope, and their own security posture. Do not skip minor services. Even a marketing SaaS with a weak password policy can become an attack vector.
From there, examine authentication methods and federation setups. Enforce strong MFA where possible. Disable legacy authentication protocols. Review OAuth scopes and SAML assertions for over-permissioned grants. Check for dormant service accounts and revoke any unused access to identity providers.