Get renewal‑ready proof for MFA, admin access, and offboarding—fast.

Greysolve helps managing partners at 75–200 person professional services firms answer cyber insurance and client security questionnaires with claim‑defensible, forwardable evidence from Microsoft 365/Azure AD—without a drawn‑out security program.

Darrick Richardson

Darrick Richardson has spent two decades configuring identity and access at Toyota, Blackstone, CVS Health, T-Mobile, Credit Suisse, and Leidos. Greysolve brings that discipline to professional services firms that need proof, not buzzwords.

Founder, Greysolve Consulting
Readiness report · 24 questions · About 4 minutes · No call required

Why this matters now

Carriers
Renewals increasingly require identity controls you can demonstrate, not just attest to.
Clients
Security questionnaires ask for proof of MFA coverage, privileged access, offboarding, and access reviews—with a clear evidence trail.
Leadership
Someone has to sign. They need answers they can forward, defend, and stand behind.

Our approach

Practical IAM, built for renewals.

We focus on the identity controls carriers and large clients actually verify—implemented in Microsoft 365 + Azure AD—so your risk story matches your environment and the proof is ready when you need it.

Who this is for (and who it isn’t)

A strong fit if you’re dealing with any of these:

  • You’re a Managing Partner / Senior Partner (or the ops leader supporting them) at a law, accounting, or insurance firm
  • You’re 75–200 employees, hybrid or multi-office, and running on Microsoft 365 / Azure AD
  • Renewals or client questionnaires are forcing “prove it” answers on MFA, admin access, joiner-mover-leaver, and access reviews

Probably not a fit if:

  • You want a tool rollout without changing how access is owned, approved, and evidenced
  • You’re looking for a generic checkbox exercise disconnected from real controls
  • You prefer buzzwords over forwardable evidence

Five principles your renewals can rely on

A repeatable way to go from “we think we’re covered” to “here is the proof.”

Timelines depend on scope—the goal is defensible, forwardable evidence, not a slide deck.

1

MFA enforced

MFA is consistently enforced where underwriters care most, with exportable proof you can share.

2

Privileged access controlled

Admin access is reduced and governed—so you can answer “who had admin when?” without guessing.

3

Joiner-Mover-Leaver documented

Onboarding, role changes, and offboarding happen on time, with a clear owner and an evidence trail.

4

Access reviews completed

Periodic reviews that produce sign-offs and artifacts, not “we’re pretty sure.”

5

Audit trail ready

The right records are captured and organized, so renewal and client reviews don’t trigger a scramble.

How we make it real: We set this up inside Microsoft 365 + Azure AD so the proof exists in your systems—not just in a policy document.

Plain-English, forwardable proof

Deliverables vary by engagement. The constant is renewal- and client-ready answers—not a compliance-program vibe, and not proof that depends on a last-minute scramble.

📋

Renewal-ready security narrative

Plain-English answers tied to your Microsoft 365 / Azure AD tenant—so MFA, admin access, and onboarding/offboarding map directly to the questions you actually see from underwriters and clients.

📎

Forwardable evidence packet

Exportable reports and configuration proof you can send to a broker, underwriter, or client—without digging through tickets or memory.

(Where needed: supporting screenshots to match exact questionnaire wording.)

🔍

Priority fixes before renewal

A short, ranked list of what to address next—based on risk, insurer expectations, and time-to-proof—with clear ownership (you vs. IT vs. MSP) so work doesn’t stall.

Ownership + repeatable review rhythm

Who reviews what, when, and what proof gets saved each cycle—so access reviews and evidence stay current month to month.

Common questions

Straight answers — no jargon for its own sake.

Is this only for cyber insurance?
No. Client security questionnaires often ask for the same identity and access controls. This is about defensible proof of how access is managed; renewals are just one high-stakes moment that forces the issue.
We already have MFA. Why would we need this?
Carriers and clients rarely stop at “MFA is enabled.” They ask where it’s enforced, how break-glass is handled, how joiner-mover-leaver is executed, and whether you can produce audit-ready evidence quickly. We help align the implementation and the proof.
Do you replace our IT team or MSP?
No. We focus on identity architecture, evidence, and handoff—so your IT team or MSP can run it day to day. If you need ongoing support, we can discuss a light model, but we’re not a generic help desk.
How long does implementation take?
It depends on scope and how clean your Microsoft 365 / Azure AD tenant is today. We’ll recommend a path after discovery. The goal is durable, provable controls—not a rushed checkbox.
What is the Readiness Report?
A short structured assessment (about 24 questions, a few minutes) that surfaces gaps in MFA, admin access, onboarding/offboarding, access reviews, and evidence readiness—so you know what to fix before renewal or a client questionnaire forces a scramble.
Is this “zero trust”?
We use plain language. If your underwriter asks for MFA, privileged access governance, offboarding, access reviews, and logging, we help you put those in place and prove them—without selling a buzzword.
Where do we start?
Take the Readiness Report to baseline where you stand—especially if a renewal or client questionnaire deadline is coming up.

Renewals and questionnaires are not getting easier.

Get the Readiness Report to see where your access story stands before the next carrier review.

Readiness report · No obligation · Built for 75–200 employee professional services firms on M365