Becoming AI-Ready (Step 1:Identity).

Step 1 — Fix Identity: The Non-Negotiable Foundation of AI (1-Minute Read) Part of the “Becoming AI-Ready” Series Before data, governance, or use-cases — identity comes first.If identity is weak,…

Step 1 — Fix Identity: The Non-Negotiable Foundation of AI (1-Minute Read)

Part of the “Becoming AI-Ready” Series

Before data, governance, or use-cases — identity comes first.
If identity is weak, AI becomes unpredictable, unsafe, and impossible to control.
This is the number-one blocker I see in the field.

Here’s the quick version of what “fixing identity” actually means — with how-to resources to get started.


1. Enforce MFA Everywhere

Not just “recommended”, not just “for some users”.
Every. Single. User.

How-to:
See Microsoft Entra ID MFA – How it Works (Microsoft Learn)
https://learn.microsoft.com/en-us/entra/identity/authentication/concept-mfa-howitworks
And configure it via the tutorial: Enable Entra MFA
https://learn.microsoft.com/en-us/entra/identity/authentication/tutorial-enable-azure-mfa


2. Kill Legacy Authentication

If you still have basic auth or older protocols enabled — you’re inviting risk.
Modern authentication is the baseline.

How-to:
Plan your MFA and legacy auth switch-off via the deployment guide:
https://learn.microsoft.com/en-us/entra/identity/authentication/howto-mfa-getstarted


3. Build Clear Conditional Access Policies

This is your control layer: “If user X from location Y on device Z — then access resource A.”
Without this, identity becomes inconsistent.

How-to:
Explore Conditional Access overview and policy planning links:
Microsoft Entra Conditional Access overview
https://learn.microsoft.com/en-us/entra/identity/conditional-access/overview
And dive into conditions in CA policies: users/groups, devices, locations
https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-conditional-access-conditions


4. Clean Up Users, Guests, and Groups

Old accounts. Stale permissions. External guests without reviews.
AI will see them — and you don’t want it to.

How-to:
There isn’t a single “cleanup” tutorial but use the CA user/group guidance above and audit your directory consistently.


5. Make Devices Compliant

If your devices are unmanaged or not governed, your control model is broken.
Identity + compliant devices = trust.

How-to:
Refer to identity management overview that covers device compliance as part of the story:
https://learn.microsoft.com/en-us/azure/security/fundamentals/identity-management-overview


Why It Matters

AI builds on identity.
If identity is weak — AI becomes a liability.
If identity is strong — AI becomes a multiplier.

This is the foundation everything else sits on.

Next up:
Step 2 — Preparing Your Data for AI: Clean, Classify, Consolidate.

— Jean-Paul Abi Atme