
In reality, identity has become the enterprise control plane. And attackers don’t need to “break in” anymore—they operate using the pathways organizations have already built. MFA can be perfect, and the breach still succeeds, because the failure mode isn’t login. It’s authorization. Identity Is the Control Plane, Not a Directory Identity is no longer a place where users live. It is a distributed decision engine that determines who can act, what they can change, and how far damage can spread. Every file access, API call, admin action, workload execution, and AI agent request is an authorization decision. When identity is treated like plumbing instead of architecture, access becomes accidental, over-permissioned, and ungovernable under pressure. Human and non-human identities—service principals, automation, connectors, and agents—now make up a massive portion of enterprise authority, often with minimal ownership or review. Authorization Failures Beat Authentication Failures The most damaging incidents don’t look like hacking. They look like work. Authorization failures hide inside legitimate behavior:
Privilege creep isn’t misconfiguration—it’s entropy. Access accumulates because removal feels risky and slow. Over time, the organization loses the ability to answer critical questions during an incident:
When hesitation sets in, attackers win on time. Redefining Success: From Prevention Fantasy to Resilience Discipline “No breaches” is not a strategy. It’s weather. Prevention reduces probability. Resilience reduces impact. The real objective is bounded failure: limiting what a compromised identity can do, how long it can act, and how quickly the organization can recover. This shifts executive language from tools to outcomes:
MTTR becomes the most honest security metric leadership has. Identity Governance as a Business Discipline Governance is not about saying “no.” It’s about making “yes” safe. Real identity governance introduces time, ownership, and accountability into access:
Without governance, access becomes archaeology. And during an incident, archaeology becomes paralysis. Scenario 1 — Entra ID: Governance + ITDR as the Foundation This episode reframes Entra as a trust compiler, not a directory. When identity governance and Identity Threat Detection & Response (ITDR) are treated as foundational:
Governance removes political hesitation. ITDR turns signals into decisive containment. Zero Trust Is Not a Product Rollout Turning on Conditional Access is not Zero Trust. Zero Trust is an operating model where trust decisions are dynamic, exceptions are governed, and enforcement actually happens. Programs fail when:
Real Zero Trust reduces friction for normal work and constrains abnormal behavior—without relying on constant prompts. Trust Decays Continuously, Not at Login The session—not the login screen—is the modern attack surface. Authentication proves who you are once. Trust must be continuously evaluated after that. When risk changes and enforcement doesn’t, attackers are granted time by design. Continuous trust requires revocation that happens in business time, not token-expiry time. Scenario 2 — Continuous Access Evaluation (CAE) CAE makes Zero Trust real by collapsing the gap between decision and enforcement. When risk changes:
CAE exposes maturity fast: which apps honor revocation, which rely on legacy assumptions, and where exception culture quietly undermines the trust model. Detection Without Response Is Expensive Telemetry Alerting is not containment. Most organizations are rich in signal and poor in action. Analysts become human middleware, stitching context across tools while attackers exploit latency. Resilience requires a conversion layer:
Scenario 3 — Defender Signals Routed into ServiceNow This scenario shows how detection becomes coordinated response:
MTTR becomes measurable, improvable, and defensible at the board level. Safe Autonomy: The Real Objective The goal isn’t more control—it’s safe autonomy. Teams must move fast without creating existential risk. That requires:
When revocation is slow, security compensates with friction. When revocation is fast, autonomy becomes safe. The Leadership Metric: Reduce MTTR MTTR is not a SOC metric. It’s an enterprise resilience KPI. Leaders should demand visibility into:
If any link is slow, the organization is granting attackers time—by design. Executive Takea
Become a supporter of this podcast: https://www.spreaker.com/podcast/m365-fm-modern-work-security-and-productivity-with-microsoft-365–6704921/support.
If this clashes with how you’ve seen it play out, I’m always curious. I use LinkedIn for the back-and-forth.