Identity Resilience for Federal Agencies

Protect Federal Organizations from Identity Cyberattacks

Ransomware attacks against federal agencies are on the rise, and most breaches involve the identity system (Active Directory and Entra ID). Protecting federal agencies from cyberattacks requires specialized tools and expertise to uncover vulnerabilities, monitor and remediate malicious changes, and recover the identity system to a trusted environment.

Cyberattacks against federal agencies are on the rise

Identity-related cyberattacks are prevalent in federal agencies. CISA’s FY2023 Risk and Vulnerability Assessment work (including assessments across the Federal Civilian Executive Branch) highlights credential access as a prevalent and successful method used by threat actors to compromise networks—aligning with the rising share of credential-driven vectors seen in FISMA reporting.

cybersecurity incidents were reported by US federal agencies to US-CERT
email accounts were compromised in the 2025 Office of the Comptroller of Currency (OCC) breach
of government agencies reported ransomware attacks in the past 12 months
new ransomware variants were tracked in 2024; groups such as LockBit specifically targeted government and critical services

Proven track record in identity resilience for government agencies

With unmatched identity security and recovery expertise, Semperis provides comprehensive hybrid AD and Entra ID threat detection and response, recovery, and crisis management for government agencies across the U.S., including 2 of the 10 largest U.S. states, one of the top 3 largest U.S. transit systems, and the #2 defense contractor in the world.

Unmatched identity resilience expertise

180+ years of Microsoft MVP experience, including battle-tested incident response team

Emergency
Growing government agency track record

Proven identity resilience for state and local government agencies, including the State of Michigan

Federal compliance milestones

Verified adherence to recognized security requirements and best practices required by federal agencies

Trusted by the largest U.S. state, local, and education organizations

Semperis has a strong track record of protecting millions of identities for numerous state, local, and education organizations, including the largest U.S. city, 5 of the largest U.S. states, court systems, transportation systems, emergency communications systems, and more.

5
biggest U.S. states
#1
U.S. city
20+
school districts, colleges, and universities
10+
agencies of the 2 largest U.S. states

The most important thing that you can do to prevent yourself from falling victim to a ransomware attack is … to prepare your business for disruption: to have backups in place, to ensure that your technology is as secure as possible, that you’ve implemented multi-factor authentication, that you’ve patched your internet-facing devices.

Jen Easterly Former Director of the Cybersecurity and Infrastructure Agency (CISA)

Primed to protect federal agencies from identity-related cyberattacks

Relentless in its adherence to technical and security requirements and best practices, Semperis has achieved significant federal security milestones.

FedRamp

On target to secure FedRamp authorization in 2026, Semperis is partnering with a 3PAO, executing a phased gap analysis and remediation plan, and targeting key federal agency sponsorships to achieve marketplace readiness and certification.

VPAT

Semperis is committed to compliance with accessibility standards, including VPAT (Voluntary Product Accessibility Template) requirements, to ensure our solutions are usable by individuals with disabilities. Accessibility is built into our product design and development processes, aligning with recognized standards such as WCAG 2.1 AA.

Common Criteria

Semperis is pursuing Common Criteria certification, a framework for independent, rigorous assessment to determine whether a product meets specific security requirements defined in documents called Protection Profiles (PPs).

CMMC

Semperis is conducting gap analysis against NIST SP 800-171 requirements to identify current controls and processes, including mapping data flows, identifying stakeholders, and reviewing workflows that handle CUI/FCI, in pursuit of Cybersecurity Maturity Certification.

ISO 27001:2013

Semperis has ISO 27001:2013 certification, which includes rigorous controls, regular internal and external audits, and ongoing assessments to ensure our security practices remain effective and up to date.

SOC 2 Type II

Semperis maintains SOC 2 Type II certification for our cloud-based services, including Disaster Recovery for Entra Tenant (DRET), which demonstrates that our security controls and processes for handling sensitive customer information are designed to meet industry standards and have been independently audited and verified as operating effectively over time.

Why federal agency identity systems are vulnerable to attack

As the National Security Agency (NSA) warned in its Detecting & Mitigating Active Directory Compromise report, gaining control over AD gives malicious actors privileged access to all systems and users managed by AD.

““Like numerous other networks, Active Directory is used in many Department of Defense and Defense Industrial Base networks as a critical component for managing identities and access,” said Dave Luber, NSA Cybersecurity Director. “This makes it an attractive target for malicious actors to attempt to steal the proverbial ‘keys to the kingdom.’ ” Federal agencies face several challenges in effectively protecting hybrid AD/Entra ID systems from cyberattacks.

Legacy technologies
Remote infrastructure
Siloed IT and security teams
Outdated security practices
Complex digital & networked environment
Limited budgets and resources

Gain control of federal agency identity security

Active Directory is involved in 9 out of 10 cyberattacks. Semperis helps federal agencies prevent, mitigate, and recover from identity-related breaches—before, during, and after an attack.

checklist icon
Challenges

Solutions

Sophisticated ransomware groups are targeting U.S. federal agencies with AD and Entra ID exploits.
Semperis identifies gaps in AD and Entra ID, including indicators of compromise (IOCs) and indicators of exposure (IOEs) resulting from human error or malicious actors.
Many attackers inject malware or ransomware weeks or months before triggering it, infecting system backups and making recovery more difficult.
Semperis automates cyber-first cyber recovery to ensure AD is restored to a malware-free environment, preventing follow-on attacks.
Lack of AD and Entra ID expertise delays security and recovery initiatives.
Semperis has extensive domain experience with more than 180+ years’ collective Microsoft MVP experience in directory services and Active Directory Group Policy.
Many attacks (including SolarWinds) start on-prem and move to the cloud, or vice versa, complicating remediation and recovery.
Semperis provides comprehensive security and recovery for hybrid AD and Entra ID environments to find and fix vulnerabilities, roll back malicious changes, and quickly recover the hybrid identity system to a trusted environment.
90% of organizations reported “serious blockers” to effective cyber crisis response, delaying recovery and resulting in ransom payments.
Semperis brings order to chaos in an incident response scenario, providing a command-and-control center to unify stakeholders, coordinators, and technical teams under one secure platform with out-of-band communications.

You can’t simply bolt on identity security because it is core to business operations and critical to sustain defense against sophisticated and motivated nation state–backed threat groups. Like business resilience, identity resilience must be addressed at the core.

Chris Inglis Former US National Cyber Directory, Semperis Strategic Advisor

NSA report: Mitigating Active Directory attacks

The National Security Agency (NSA) joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD ACSC) and other global government entities in releasing the Cybersecurity Technical Report (CTR) “Detecting and Mitigating Active Directory Compromises.” The guidance provides prevention and detection strategies for the most prevalent techniques used to target Active Directory (AD).

Read the Report