Identity Is the New Security Perimeter

The 2023 MGM Resorts breach is the defining case study of identity-based attacks. The attackers — social engineering specialists who had never met MGM's systems — called the IT help desk, impersonated an employee using information scraped from LinkedIn, and convinced the operator to reset MFA credentials. From that single compromised identity, they owned MGM's enterprise environment within hours. Total disclosed losses: over $100 million.

This pattern repeats across the most significant breaches of 2023–2026. Okta — the identity provider — was compromised twice through social engineering targeting their support personnel. Microsoft Exchange suffered the Storm-0558 breach through forged authentication tokens. Colonial Pipeline, SolarWinds, and the Bangladesh Bank SWIFT heist all pivoted through compromised privileged identities.

The traditional network perimeter — the firewall as the security boundary — is strategically irrelevant. Cloud infrastructure, hybrid work, SaaS sprawl, contractor access, and supply chain integrations mean there is no meaningful "inside the network" anymore. Identity is the only perimeter that remains meaningful, and it must be defended accordingly.

The Evolution of Access Control Models

Role-Based Access Control (RBAC)

RBAC — still the dominant enterprise access control model — assigns permissions to roles rather than individuals. Users are assigned roles; roles have permissions. Administration scales: changing a "Finance Analyst" role affects every user in that role simultaneously. But RBAC fails at granularity: the Finance Analyst role that grants appropriate access 80% of the time creates overprivilege for the other 20%. That overprivilege is the attack surface that adversaries exploit.

The "least privilege problem" of RBAC: to reduce roles to truly minimal permissions, you need exponentially more roles. A typical enterprise with 200 business functions and 3 sensitivity levels needs 600 precisely-scoped roles — an administrative nightmare that in practice leads to broad, overprivileged roles.

Attribute-Based Access Control (ABAC)

ABAC solves RBAC's granularity problem by evaluating access decisions against multi-dimensional attribute policies:

ABAC Policy Example — Confidential Financial Data:
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
ALLOW IF:
  user.department = "Finance"           AND
  user.clearance_level ≥ 3             AND
  data.classification = "Confidential" AND
  device.compliance_status = "Managed" AND
  session.risk_score < 0.3             AND
  time.current IN business_hours       AND
  location.country = "India"
DENY otherwise

ABAC enables true least-privilege without role explosion, supports dynamic context evaluation, and integrates naturally with Zero Trust policy engines. The implementation complexity is the trade-off: attribute management, policy authoring, and policy testing require mature governance processes.

Zero Trust Architecture

Zero Trust is not a product — it is an architectural philosophy. Its core principle: never trust, always verify. Every access request is treated as potentially hostile regardless of network origin, evaluated against identity, device, context, and resource signals before access is granted, and continuously re-evaluated during the session.

Zero Trust Access Decision Engine:
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Request arrives from: user@corp.com → Salesforce API

Policy Engine evaluates:
  ├── Identity: Authentication strength? MFA type? Session age?
  ├── Device: Managed? Patched? EDR active? Risk score?
  ├── Context: Time? Location? Impossible travel? Risk tier?
  ├── Resource: Sensitivity? Data classification? API scope?
  └── Behaviour: Anomaly score? Access frequency? Volume?

Decision: ALLOW (with logging) | DENY | STEP-UP MFA

Passwordless Authentication: Beyond the Password

Passwords are the original cybersecurity design failure. 80%+ of breaches involve compromised credentials (Verizon DBIR 2025). The root problem is not user behaviour — passwords are inherently phishable, reusable, and forgettable. The solution is eliminating them.

FIDO2 and WebAuthn

FIDO2 replaces passwords with public-key cryptography. During registration, a key pair is generated on the authenticator (hardware security key, device TPM, secure enclave). The private key never leaves the device. Authentication proves:

  1. Key possession: The private key is present
  2. User verification: Biometric or PIN confirmed locally
  3. Origin binding: The credential is bound to the specific domain — phishing sites cannot receive valid assertions

Phishing Resistance: Why FIDO2 Cannot Be Phished

The origin binding property is cryptographic. When Alice authenticates to google.com, her FIDO2 authenticator signs a challenge that includes google.com as the relying party ID. A phishing site at g00gle.com cannot receive a valid FIDO2 assertion for google.com — the authenticator verifies the origin before signing. Even if the phishing site is a perfect visual clone, the cryptographic binding prevents credential theft entirely.

MFA Security Comparison

Authentication MethodPhishing ResistantAiTM ResistantRecommendation
Password onlyNoNo❌ Eliminate immediately
SMS OTPNoNo❌ SIM-swap vulnerable
Email OTPNoNo❌ Avoid
TOTP (Google Auth)NoNo⚠ Minimum baseline only
Push notificationNoPartial⚠ Add number matching
FIDO2 hardware keyYesYes✅ Privileged accounts
PasskeysYesYes✅ All accounts
Certificate-based (PIV)YesYes✅ Enterprise preferred

Identity Threat Detection & Response (ITDR)

ITDR addresses the gap between identity security controls (authentication, authorisation) and security operations (detection, response). It instruments the identity plane — IdP logs, directory service events, authentication telemetry — with ML-powered anomaly detection and real-time alerting.

Key ITDR detection scenarios:

  • Impossible travel: User authenticates from Mumbai at 09:00, next authentication from London at 09:45
  • Password spray: Many failed authentications across many usernames from the same IP/ASN
  • MFA fatigue: Repeated push notifications to a user — indicates attacker attempting to exhaust the user into approving
  • Privilege escalation: User granted Global Admin within minutes of initial authentication
  • Lateral movement via service accounts: Service account authenticating to systems outside its normal access pattern
  • OAuth consent abuse: New OAuth application granted broad scopes, especially Mail.Read or Files.ReadWrite

Just-in-Time Privileged Access

Standing privileged access — permanent admin accounts that exist 24/7 — is the primary driver of breach blast radius. Once compromised, a standing admin account gives attackers persistent, always-available access. JIT access eliminates standing privilege: administrators request elevated access on demand, provide business justification, receive time-bounded permissions (e.g., 2 hours), and permissions are automatically revoked at expiry.

Decentralised Identity: The Next Frontier

W3C Decentralised Identifiers (DIDs) and Verifiable Credentials (VCs) enable users to present cryptographically signed identity attributes without relying on a centralised identity provider. India's DEPA (Data Empowerment and Protection Architecture) and the EU's eIDAS 2.0 represent national-scale deployments of decentralised identity principles, giving citizens control over their identity data while enabling secure, privacy-preserving authentication to government and enterprise services.

Common Mistakes

  • Accepting any form of MFA as "MFA complete": SMS OTP is bypassed trivially by AiTM and SIM swapping. FIDO2 is the only phishing-resistant standard.
  • Neglecting service account identity: Service accounts, managed identities, and API keys are frequently overprivileged and unmonitored — primary targets for privilege escalation.
  • No ITDR instrumentation: Deploying strong authentication without monitoring the identity plane for attack patterns creates a blind spot exactly where attackers pivot.
  • Treating Zero Trust as a network project: Zero Trust is an identity project. Deploying micro-segmentation without addressing identity verification is architectural malpractice.

Expert Conclusion

Identity security is no longer a supporting discipline — it is the primary battleground of enterprise cybersecurity. The organisations winning this battle have eliminated passwords for privileged access, deployed FIDO2 for high-risk users, implemented JIT privilege for administrative functions, and instrumented their identity plane with ITDR. They treat every authentication event as a security signal to be evaluated, not a gate to be opened.

The organisations losing are those still treating IAM as a provisioning exercise rather than a security discipline — deploying identity solutions to enable access rather than to control it. The distinction in outcome, when attacks arrive, is measured in millions of dollars and months of recovery.

Frequently Asked Questions

Vikram Madane — Identity Security Expert
Vikram Madane
Cybersecurity Researcher & Technical Project Manager

Lead Cyber Security Projects at RBI-IT. OSCP+ · PMP® 2025 · 13+ years securing enterprise BFSI & government identity infrastructure at national scale.