
1
00:00:00,000 –> 00:00:02,960
Most organizations think securities are checklist, MFA,
2
00:00:02,960 –> 00:00:06,680
EDR, a pile of policies, and a dashboard that’s mostly green.
3
00:00:06,680 –> 00:00:09,560
That setup feels like control, it isn’t, it’s coverage,
4
00:00:09,560 –> 00:00:11,360
and coverage doesn’t equal resilience.
5
00:00:11,360 –> 00:00:14,640
This episode is about the uncomfortable shift leaders have to make,
6
00:00:14,640 –> 00:00:16,840
from buying controls to designing trust
7
00:00:16,840 –> 00:00:19,040
and from chasing no incidents to engineering,
8
00:00:19,040 –> 00:00:21,000
fast containment and recovery.
9
00:00:21,000 –> 00:00:23,080
We’ll anchor it in three Microsoft realities,
10
00:00:23,080 –> 00:00:25,560
intra-governance and identity threat detection,
11
00:00:25,560 –> 00:00:27,400
continuous access evaluation,
12
00:00:27,400 –> 00:00:29,960
and defender signals routed into service now,
13
00:00:29,960 –> 00:00:33,480
because the goal is decision speed, not feature completeness.
14
00:00:33,480 –> 00:00:36,760
Why well-secured organizations still get breached?
15
00:00:36,760 –> 00:00:38,200
Here’s what most people miss.
16
00:00:38,200 –> 00:00:41,400
Breaches don’t happen because an organization forgot to buy a product.
17
00:00:41,400 –> 00:00:44,600
They happen because the organization never updated its trust model,
18
00:00:44,600 –> 00:00:46,680
security teams deploy controls.
19
00:00:46,680 –> 00:00:50,200
The business keeps operating on assumptions that were true 10 years ago,
20
00:00:50,200 –> 00:00:53,600
that the network is a boundary, that authentication is a finish line,
21
00:00:53,600 –> 00:00:55,440
that permissions represent intent,
22
00:00:55,440 –> 00:00:58,000
and that alerts are the same thing as response.
23
00:00:58,000 –> 00:01:01,440
Those assumptions don’t fail loudly, they decay quietly.
24
00:01:01,440 –> 00:01:03,240
And attackers don’t need to break in anymore.
25
00:01:03,240 –> 00:01:05,160
They walk the pathways you already built.
26
00:01:05,160 –> 00:01:07,480
A modern breach story usually starts with identity,
27
00:01:07,480 –> 00:01:10,200
not because identity is weak, but because identity is everywhere.
28
00:01:10,200 –> 00:01:13,520
Cloud, SAS, API’s, automation, contractors, service accounts,
29
00:01:13,520 –> 00:01:15,680
and now agents, identity isn’t the directory,
30
00:01:15,680 –> 00:01:17,640
it’s the control plane, that distinction matters
31
00:01:17,640 –> 00:01:21,200
because your control plane isn’t protected by the existence of controls.
32
00:01:21,200 –> 00:01:24,320
It’s protected by whether those controls enforce your intent.
33
00:01:24,320 –> 00:01:28,080
Most well-secured environments are rich in prevention and poor in constraint.
34
00:01:28,080 –> 00:01:31,320
You see it in the gap between authentication and authorization.
35
00:01:31,320 –> 00:01:34,760
They might have fishing-resistant MFA and still have reckless entitlements.
36
00:01:34,760 –> 00:01:36,720
They might have conditional access policies
37
00:01:36,720 –> 00:01:39,680
and still allow broad access packages that never expire.
38
00:01:39,680 –> 00:01:41,360
They might have privileged access tooling
39
00:01:41,360 –> 00:01:42,800
and still tolerate standing power
40
00:01:42,800 –> 00:01:45,320
because approvals are slow and exceptions are easier.
41
00:01:45,320 –> 00:01:46,600
Attackers understand this.
42
00:01:46,600 –> 00:01:50,360
They don’t fight your MFA head-on if they can steal a token after the MFA challenge.
43
00:01:50,360 –> 00:01:52,320
They don’t brute force a firewall
44
00:01:52,320 –> 00:01:55,560
if they can use a perfectly valid identity to call an API.
45
00:01:55,560 –> 00:01:57,720
They don’t need to exploit a vulnerability
46
00:01:57,720 –> 00:02:00,880
if the environment already grants the privileges that do the damage.
47
00:02:00,880 –> 00:02:02,760
So when leaders ask, “How did this happen?”
48
00:02:02,760 –> 00:02:04,080
We had everything turned on.
49
00:02:04,080 –> 00:02:07,560
The correct answer is, “You had controls, but you didn’t have enforced trust.”
50
00:02:07,560 –> 00:02:09,400
Then there’s the green dashboard problem.
51
00:02:09,400 –> 00:02:12,520
Dashboards show deployment state, not risk reality.
52
00:02:12,520 –> 00:02:15,000
We enabled feature X is not the same as feature X
53
00:02:15,000 –> 00:02:17,040
is constraining the right pathways.
54
00:02:17,040 –> 00:02:18,640
Attendant can show high compliance
55
00:02:18,640 –> 00:02:21,040
while still carrying structural exposure.
56
00:02:21,040 –> 00:02:23,800
Dormant accounts, stale guest access,
57
00:02:23,800 –> 00:02:25,560
over-permissioned applications,
58
00:02:25,560 –> 00:02:27,480
service principles with broad rights
59
00:02:27,480 –> 00:02:30,200
and exception policies that never die.
60
00:02:30,200 –> 00:02:32,440
Controls drift because organizations drift.
61
00:02:32,440 –> 00:02:35,800
Entitlements accumulate, policy exceptions become permanent
62
00:02:35,800 –> 00:02:37,280
and the system keeps working,
63
00:02:37,280 –> 00:02:39,400
which is exactly why the risk stays invisible.
64
00:02:39,400 –> 00:02:41,160
This is why compliance isn’t the finish line.
65
00:02:41,160 –> 00:02:44,880
It’s a snapshot and snapshots don’t stop moving systems from eroding.
66
00:02:44,880 –> 00:02:47,120
A breach in that sense is not a moral failure.
67
00:02:47,120 –> 00:02:48,680
It’s system behavior.
68
00:02:48,680 –> 00:02:50,240
Systems optimize for throughput.
69
00:02:50,240 –> 00:02:52,000
People optimize for getting work done.
70
00:02:52,000 –> 00:02:54,480
Security teams optimize for what they can measure.
71
00:02:54,480 –> 00:02:57,160
If the organization measures how many controls are deployed,
72
00:02:57,160 –> 00:02:58,600
it will get deployed controls.
73
00:02:58,600 –> 00:03:02,000
If it measures how fast can we contain identity-driven incidents
74
00:03:02,000 –> 00:03:04,920
end to end, it will build the ability to contain them.
75
00:03:04,920 –> 00:03:08,080
That is the difference between prevention, theater and resilience.
76
00:03:08,080 –> 00:03:09,480
And AI doesn’t make this easier.
77
00:03:09,480 –> 00:03:10,440
It makes it faster.
78
00:03:10,440 –> 00:03:13,680
AI amplifies the speed of both offense and defense.
79
00:03:13,680 –> 00:03:15,600
It reduces the cost of generating fishing,
80
00:03:15,600 –> 00:03:17,600
social engineering and automation.
81
00:03:17,600 –> 00:03:20,200
But it also reduces the cost of correlating signals
82
00:03:20,200 –> 00:03:22,520
summarizing incidents and orchestrating response
83
00:03:22,520 –> 00:03:24,760
if you design the system to act on those signals.
84
00:03:24,760 –> 00:03:27,880
And if you don’t, AI just accelerates your alert volume.
85
00:03:27,880 –> 00:03:30,320
You end up with higher telemetry, more noise
86
00:03:30,320 –> 00:03:31,920
and the same decision latency.
87
00:03:31,920 –> 00:03:32,920
That is not progress.
88
00:03:32,920 –> 00:03:34,240
That is expensive confusion.
89
00:03:34,240 –> 00:03:38,160
So what does well-secured but still breached look like in executive terms?
90
00:03:38,160 –> 00:03:42,000
It looks like an organization that can detect but can’t decide.
91
00:03:42,000 –> 00:03:45,480
Or can decide but can’t enforce or can enforce but can’t recover quickly.
92
00:03:45,480 –> 00:03:46,800
Each hand of ads time.
93
00:03:46,800 –> 00:03:48,520
Each manual step adds delay.
94
00:03:48,520 –> 00:03:50,040
Each exception adds ambiguity.
95
00:03:50,040 –> 00:03:52,720
Over time you don’t have a deterministic security model anymore.
96
00:03:52,720 –> 00:03:53,960
You have conditional chaos.
97
00:03:53,960 –> 00:03:56,440
And that’s why organizations still get breached.
98
00:03:56,440 –> 00:03:58,000
Not because they lacked tools.
99
00:03:58,000 –> 00:04:01,200
Because the trust system was never engineered as a closed loop.
100
00:04:01,200 –> 00:04:04,440
Identity signals into policy decisions, decisions into enforcement,
101
00:04:04,440 –> 00:04:08,040
enforcement into response, response into recovery and recovery into learning.
102
00:04:08,040 –> 00:04:12,840
Without that loop, every control is just a static gate on a dynamic highway.
103
00:04:12,840 –> 00:04:14,280
Redefining success.
104
00:04:14,280 –> 00:04:16,880
From prevention fantasy to resilience discipline,
105
00:04:16,880 –> 00:04:20,360
leaders keep getting trapped by a definition of success that sounds reasonable
106
00:04:20,360 –> 00:04:22,160
but collapses in practice.
107
00:04:22,160 –> 00:04:23,600
Fewer incidents.
108
00:04:23,600 –> 00:04:24,480
It’s a nice headline.
109
00:04:24,480 –> 00:04:25,720
It’s also not a strategy.
110
00:04:25,720 –> 00:04:26,600
Prevention matters.
111
00:04:26,600 –> 00:04:28,800
Nobody is arguing for neglect.
112
00:04:28,800 –> 00:04:30,600
But prevention is probability management.
113
00:04:30,600 –> 00:04:32,640
It reduces the likelihood of an incident.
114
00:04:32,640 –> 00:04:34,720
Resilience is impact management.
115
00:04:34,720 –> 00:04:36,680
It reduces the cost, the downtime,
116
00:04:36,680 –> 00:04:39,480
and the organizational confusion when the incident happens anyway.
117
00:04:39,480 –> 00:04:42,400
That distinction matters because probability is never zero
118
00:04:42,400 –> 00:04:45,040
and the business still has to operate while you’re cleaning up.
119
00:04:45,040 –> 00:04:48,760
The uncomfortable truth is that the goal is not no breaches.
120
00:04:48,760 –> 00:04:50,240
The goal is bounded failure.
121
00:04:50,240 –> 00:04:53,240
Bounded failure means the system anticipates compromise
122
00:04:53,240 –> 00:04:55,400
and limits what a compromise identity can do,
123
00:04:55,400 –> 00:04:58,080
how far it can move and how long it can persist.
124
00:04:58,080 –> 00:05:00,800
It treats incidents as inevitable system states,
125
00:05:00,800 –> 00:05:03,040
not unexpected moral violations.
126
00:05:03,040 –> 00:05:07,040
And it builds the muscle to contain those states quickly and repeatedly.
127
00:05:07,040 –> 00:05:08,960
This is where security programs get honest.
128
00:05:08,960 –> 00:05:11,320
A prevention first program tends to behave like this.
129
00:05:11,320 –> 00:05:13,840
Deploy more controls, tighten policies, increase friction,
130
00:05:13,840 –> 00:05:15,400
and hope the incident curve goes down.
131
00:05:15,400 –> 00:05:16,480
Sometimes it does.
132
00:05:16,480 –> 00:05:18,440
But the second order effect shows up later.
133
00:05:18,440 –> 00:05:20,920
The business finds workarounds, the exceptions pile up,
134
00:05:20,920 –> 00:05:23,040
and security becomes a cue.
135
00:05:23,040 –> 00:05:25,200
You’ve improved security in the dashboard sense
136
00:05:25,200 –> 00:05:28,080
while increasing organizational entropy in the real sense.
137
00:05:28,080 –> 00:05:30,440
A resilience first program behaves differently.
138
00:05:30,440 –> 00:05:33,200
It assumes compromise designs for rapid revocation,
139
00:05:33,200 –> 00:05:35,880
reduces standing privilege, automates containment steps,
140
00:05:35,880 –> 00:05:37,520
and rehearses decision making.
141
00:05:37,520 –> 00:05:39,280
It doesn’t chase perfect defense.
142
00:05:39,280 –> 00:05:40,720
It builds repeatable recovery.
143
00:05:40,720 –> 00:05:42,560
If you want board-facing language for this,
144
00:05:42,560 –> 00:05:43,960
don’t talk about products.
145
00:05:43,960 –> 00:05:45,080
Talk about three outcomes.
146
00:05:45,080 –> 00:05:48,040
Continuity, trust preservation, and decision speed.
147
00:05:48,040 –> 00:05:49,480
Continuity is obvious.
148
00:05:49,480 –> 00:05:50,840
Can the business keep operating?
149
00:05:50,840 –> 00:05:53,480
Or does an identity incident turn into a multi-day outage
150
00:05:53,480 –> 00:05:55,440
because nobody can tell what access is safe?
151
00:05:55,440 –> 00:05:57,920
Trust preservation is less obvious, but more expensive.
152
00:05:57,920 –> 00:05:59,720
Can customers, partners, and regulators
153
00:05:59,720 –> 00:06:01,840
believe you’re in control during the incident?
154
00:06:01,840 –> 00:06:04,600
Or does the story become, we didn’t know what we had,
155
00:06:04,600 –> 00:06:06,520
so we shut everything down?
156
00:06:06,520 –> 00:06:08,760
Decision speed is the actual multiplier.
157
00:06:08,760 –> 00:06:11,280
How fast can the organization detect, decide,
158
00:06:11,280 –> 00:06:14,440
and enforce, end to end without a dozen handoffs and three committees?
159
00:06:14,440 –> 00:06:16,520
This is why MTTR is not SOC trivia.
160
00:06:16,520 –> 00:06:18,480
It’s executive telemetry.
161
00:06:18,480 –> 00:06:21,680
Mean time to respond or recover depending on how you define it
162
00:06:21,680 –> 00:06:23,400
turns an abstract security posture
163
00:06:23,400 –> 00:06:25,440
into a measurable operating capability.
164
00:06:25,440 –> 00:06:27,320
It forces the right conversations.
165
00:06:27,320 –> 00:06:29,480
Who has authority to disable an identity?
166
00:06:29,480 –> 00:06:31,720
Who can revoke access across critical apps?
167
00:06:31,720 –> 00:06:33,120
Which actions are automated?
168
00:06:33,120 –> 00:06:35,120
Which require approval and why?
169
00:06:35,120 –> 00:06:36,480
Where are the manual steps?
170
00:06:36,480 –> 00:06:39,920
And what risk are those steps supposedly managing?
171
00:06:39,920 –> 00:06:41,320
And it exposes the usual lie.
172
00:06:41,320 –> 00:06:42,760
We can respond quickly.
173
00:06:42,760 –> 00:06:44,800
Most organizations can respond quickly
174
00:06:44,800 –> 00:06:47,600
if the right person is awake, available, and empowered.
175
00:06:47,600 –> 00:06:50,040
That is not a capability, that is a dependency.
176
00:06:50,040 –> 00:06:52,600
Resilience discipline replaces heroics with design.
177
00:06:52,600 –> 00:06:55,280
It builds the response pathways before the incident.
178
00:06:55,280 –> 00:06:56,880
When everyone is calm and rational,
179
00:06:56,880 –> 00:06:58,560
instead of inventing their mid-breach
180
00:06:58,560 –> 00:07:00,880
when fear and politics take over.
181
00:07:00,880 –> 00:07:02,880
It also acknowledges a basic system law.
182
00:07:02,880 –> 00:07:05,000
Every manual handoff is a latency generator.
183
00:07:05,000 –> 00:07:07,200
Every exception is an ambiguity generator.
184
00:07:07,200 –> 00:07:09,120
Every ambiguity increases blast radius
185
00:07:09,120 –> 00:07:11,600
because people hesitate and attackers don’t.
186
00:07:11,600 –> 00:07:14,840
This is also where AI is either your advantage or your tax.
187
00:07:14,840 –> 00:07:16,760
If AI is only used to summarize alerts,
188
00:07:16,760 –> 00:07:18,920
you get prettier descriptions of the same delays.
189
00:07:18,920 –> 00:07:21,840
If AI is used to compress the detect to decide phase
190
00:07:21,840 –> 00:07:24,880
and trigger auditable, reversible containment actions,
191
00:07:24,880 –> 00:07:27,480
then you get something that looks like real resilience.
192
00:07:27,480 –> 00:07:30,040
Less time spent arguing about what’s happening,
193
00:07:30,040 –> 00:07:32,160
more time spent making it stop.
194
00:07:32,160 –> 00:07:34,080
So success needs a different definition.
195
00:07:34,080 –> 00:07:36,520
Success is not, we didn’t have incidents this quarter.
196
00:07:36,520 –> 00:07:39,080
That’s whether or not engineering success is,
197
00:07:39,080 –> 00:07:41,800
when identity-driven incidents occur and they will,
198
00:07:41,800 –> 00:07:43,680
the organization contains them in business time
199
00:07:43,680 –> 00:07:45,520
recovers without panic and learns
200
00:07:45,520 –> 00:07:47,320
without repeating the same failure mode.
201
00:07:47,320 –> 00:07:48,800
That’s resilience.
202
00:07:48,800 –> 00:07:50,680
And once you adopt that definition,
203
00:07:50,680 –> 00:07:52,520
the rest of the strategy becomes obvious.
204
00:07:52,520 –> 00:07:54,120
You stop chasing control coverage
205
00:07:54,120 –> 00:07:55,680
and start designing the trust system
206
00:07:55,680 –> 00:07:57,680
that controls are supposed to enforce.
207
00:07:57,680 –> 00:08:00,320
Identity is the control plane, not a directory.
208
00:08:00,320 –> 00:08:02,320
Most organizations still talk about identity
209
00:08:02,320 –> 00:08:04,840
like it’s a shared phone book, a place where users live,
210
00:08:04,840 –> 00:08:06,840
a place where groups live, a place you sync to,
211
00:08:06,840 –> 00:08:08,360
so Microsoft 365 works.
212
00:08:08,360 –> 00:08:09,800
That mental model is obsolete.
213
00:08:09,800 –> 00:08:11,240
Identity is not a directory.
214
00:08:11,240 –> 00:08:13,240
It is the control plane for the enterprise.
215
00:08:13,240 –> 00:08:14,960
It is the distributed decision engine
216
00:08:14,960 –> 00:08:16,720
that decides who can touch what,
217
00:08:16,720 –> 00:08:18,560
from where, using which device,
218
00:08:18,560 –> 00:08:21,360
under which conditions, with which level of confidence.
219
00:08:21,360 –> 00:08:23,040
Every time an employee opens a file,
220
00:08:23,040 –> 00:08:24,680
a workload calls an API,
221
00:08:24,680 –> 00:08:26,920
a contractor accesses a project site
222
00:08:26,920 –> 00:08:29,000
or an admin attempts a privileged action.
223
00:08:29,000 –> 00:08:30,920
The business is not logging in.
224
00:08:30,920 –> 00:08:33,400
The business is running an authorization decision.
225
00:08:33,400 –> 00:08:35,320
And the uncomfortable part is that the system
226
00:08:35,320 –> 00:08:37,000
makes those decisions continuously
227
00:08:37,000 –> 00:08:39,240
at scale across hundreds of services
228
00:08:39,240 –> 00:08:41,960
with a default posture that does not care about your intent.
229
00:08:41,960 –> 00:08:43,680
It cares about your configuration.
230
00:08:43,680 –> 00:08:46,360
This is why identity strategy is not an IT topic.
231
00:08:46,360 –> 00:08:47,880
It’s operational architecture.
232
00:08:47,880 –> 00:08:49,760
The control plane is where business workflows
233
00:08:49,760 –> 00:08:51,120
become enforceable rules.
234
00:08:51,120 –> 00:08:53,480
If you design it well, autonomy becomes safe.
235
00:08:53,480 –> 00:08:56,040
If you design it poorly, autonomy becomes an incident.
236
00:08:56,040 –> 00:08:58,360
But this is also why the network stop being your boundary.
237
00:08:58,360 –> 00:08:59,840
Networks are still useful.
238
00:08:59,840 –> 00:09:02,600
They still matter for segmentation, routing, inspection,
239
00:09:02,600 –> 00:09:03,920
and reducing exposure.
240
00:09:03,920 –> 00:09:06,920
But they are no longer the thing that defines inside.
241
00:09:06,920 –> 00:09:09,640
Cloud and SAS dissolve that assumption years ago.
242
00:09:09,640 –> 00:09:12,040
Users sit on unmanaged networks, devices,
243
00:09:12,040 –> 00:09:14,280
roam, apps live outside your perimeter,
244
00:09:14,280 –> 00:09:17,240
and internal traffic often never touches your infrastructure.
245
00:09:17,240 –> 00:09:18,440
So trust moved.
246
00:09:18,440 –> 00:09:20,200
Not because Microsoft had a marketing moment,
247
00:09:20,200 –> 00:09:22,760
but because the architecture forced it to move.
248
00:09:22,760 –> 00:09:25,320
Trust now attaches to claims who the subject is,
249
00:09:25,320 –> 00:09:26,520
what the device looks like,
250
00:09:26,520 –> 00:09:28,280
how risky the behavior appears,
251
00:09:28,280 –> 00:09:31,000
what the session is doing, and what the resource is.
252
00:09:31,000 –> 00:09:33,080
In this terms, every access flow becomes
253
00:09:33,080 –> 00:09:36,040
subject policy decision, policy enforcement resource.
254
00:09:36,040 –> 00:09:37,480
Leaders don’t need the diagram.
255
00:09:37,480 –> 00:09:38,760
They need the implication.
256
00:09:38,760 –> 00:09:41,480
Authorization is now the primary business risk surface.
257
00:09:41,480 –> 00:09:42,760
And that surface is huge.
258
00:09:42,760 –> 00:09:43,960
It’s humans, yes.
259
00:09:43,960 –> 00:09:45,960
But it’s also service principles,
260
00:09:45,960 –> 00:09:47,800
managed identities, automation accounts,
261
00:09:47,800 –> 00:09:49,320
connectors, third party apps,
262
00:09:49,320 –> 00:09:52,680
and increasingly AI agents that act on behalf of users.
263
00:09:52,680 –> 00:09:55,320
This is where the human machine blur becomes a governance problem,
264
00:09:55,320 –> 00:09:57,160
not a futuristic curiosity.
265
00:09:57,160 –> 00:09:59,560
Machine identities can outnumber humans dramatically
266
00:09:59,560 –> 00:10:00,840
in real enterprises,
267
00:10:00,840 –> 00:10:03,000
and they don’t complain when you over-permission them.
268
00:10:03,000 –> 00:10:05,000
They just keep running, quietly.
269
00:10:05,000 –> 00:10:07,160
Perfectly, until they’re abused.
270
00:10:07,160 –> 00:10:09,800
When identity is the control plane,
271
00:10:09,800 –> 00:10:12,680
then security maturity becomes less about how many tools you bought
272
00:10:12,680 –> 00:10:15,800
and more about how accurately you can answer a few basic questions.
273
00:10:15,800 –> 00:10:16,760
Who has access?
274
00:10:16,760 –> 00:10:17,640
Why do they have it?
275
00:10:17,640 –> 00:10:19,320
For how long? Under what conditions?
276
00:10:19,320 –> 00:10:21,400
And what happens when those conditions change?
277
00:10:21,400 –> 00:10:23,800
Most organizations can answer the first question
278
00:10:23,800 –> 00:10:25,640
incompletely, the second question,
279
00:10:25,640 –> 00:10:27,320
narratively, the third question,
280
00:10:27,320 –> 00:10:28,760
rarely, and the fourth question
281
00:10:28,760 –> 00:10:31,000
with a policy document, nobody enforces.
282
00:10:31,000 –> 00:10:33,880
The last question is the one that decides whether you have resilience
283
00:10:33,880 –> 00:10:35,080
or just optimism,
284
00:10:35,080 –> 00:10:37,320
because identity isn’t only about allowing access,
285
00:10:37,320 –> 00:10:39,160
it’s about revoking it, fast.
286
00:10:39,160 –> 00:10:40,280
In a directory mindset,
287
00:10:40,280 –> 00:10:42,520
revocation is an administrative event.
288
00:10:42,520 –> 00:10:43,800
Someone disables an account,
289
00:10:43,800 –> 00:10:45,240
someone removes a group membership,
290
00:10:45,240 –> 00:10:46,600
someone closes a ticket.
291
00:10:46,600 –> 00:10:47,880
In a control plane mindset,
292
00:10:47,880 –> 00:10:50,200
revocation is a containment mechanism.
293
00:10:50,200 –> 00:10:51,800
It is part of incident response.
294
00:10:51,800 –> 00:10:53,480
It is supposed to happen in business time,
295
00:10:53,480 –> 00:10:54,600
not IT time.
296
00:10:54,600 –> 00:10:57,240
This is also why the identity plane is where governance
297
00:10:57,240 –> 00:10:58,760
either exists or it doesn’t.
298
00:10:58,760 –> 00:11:01,160
Governance isn’t a compliance activity you do annually.
299
00:11:01,160 –> 00:11:02,440
Governance is the mechanism
300
00:11:02,440 –> 00:11:04,280
that prevents entitlement drift
301
00:11:04,280 –> 00:11:06,200
from turning into permanent over-pimission.
302
00:11:06,200 –> 00:11:08,120
Drift is what happens when every joiner,
303
00:11:08,120 –> 00:11:09,560
mover, lever, contractor,
304
00:11:09,560 –> 00:11:12,520
and exception creates a small, reasonable access decision
305
00:11:12,520 –> 00:11:14,040
and nobody ever takes it back.
306
00:11:14,040 –> 00:11:17,000
Over time, the organization doesn’t have access by design.
307
00:11:17,000 –> 00:11:18,440
It has access by archaeology
308
00:11:18,440 –> 00:11:20,440
and the control plane preserves all of it.
309
00:11:20,440 –> 00:11:22,280
So when leaders say we trust our people,
310
00:11:22,280 –> 00:11:24,360
that’s fine, but the system doesn’t trust people.
311
00:11:24,360 –> 00:11:25,880
It trusts claims and permissions.
312
00:11:25,880 –> 00:11:27,960
If permissions don’t reflect business intent,
313
00:11:27,960 –> 00:11:29,480
then the system will authorize things
314
00:11:29,480 –> 00:11:31,480
the business never consciously approved.
315
00:11:31,480 –> 00:11:33,000
That’s not a security failure.
316
00:11:33,000 –> 00:11:34,520
That’s predictable system behavior.
317
00:11:34,520 –> 00:11:36,360
Once identity becomes the control plane,
318
00:11:36,360 –> 00:11:38,520
you stop asking, did they authenticate?
319
00:11:38,520 –> 00:11:39,880
And you start asking,
320
00:11:39,880 –> 00:11:42,120
what does this identity allow them to change,
321
00:11:42,120 –> 00:11:44,760
exfiltrate, approve, disable or persist?
322
00:11:44,760 –> 00:11:46,120
That’s where business impact lives.
323
00:11:46,120 –> 00:11:48,600
And that is the transition point for the rest of this episode.
324
00:11:48,600 –> 00:11:50,520
The failure mode is not login.
325
00:11:50,520 –> 00:11:53,000
It’s authorization and entitlement drift.
326
00:11:53,000 –> 00:11:55,640
Authorization failures beat authentication failures.
327
00:11:55,640 –> 00:11:57,640
MFA can be perfect and you can still lose.
328
00:11:57,640 –> 00:11:59,080
That sentence annoys people
329
00:11:59,080 –> 00:12:02,120
because MFA is the sacred cow of identity security.
330
00:12:02,120 –> 00:12:02,920
And it should be.
331
00:12:02,920 –> 00:12:06,040
Strong authentication removes an entire class of cheap attacks.
332
00:12:06,040 –> 00:12:07,800
But authentication is a gate.
333
00:12:07,800 –> 00:12:09,080
Authorization is the map.
334
00:12:09,080 –> 00:12:10,840
If the map is wrong, the gate doesn’t matter.
335
00:12:10,840 –> 00:12:13,400
Most incident reviews obsess over how the attacker got in.
336
00:12:13,400 –> 00:12:15,560
The more useful question is what the attacker could do
337
00:12:15,560 –> 00:12:16,600
after they were in.
338
00:12:16,600 –> 00:12:17,640
That’s authorization.
339
00:12:17,640 –> 00:12:18,600
That’s entitlements.
340
00:12:18,600 –> 00:12:20,360
That’s the permissions graph you built
341
00:12:20,360 –> 00:12:23,240
over years of reasonable decisions and never revisited.
342
00:12:23,240 –> 00:12:24,680
And the real failure mode is that
343
00:12:24,680 –> 00:12:26,840
authorization errors look like normal business.
344
00:12:26,840 –> 00:12:28,360
A privileged user downloads data.
345
00:12:28,360 –> 00:12:30,360
An automation account exports content.
346
00:12:30,360 –> 00:12:32,040
A service principle reads a directory.
347
00:12:32,040 –> 00:12:33,560
An admin disables a control.
348
00:12:33,560 –> 00:12:36,280
These are all legitimate actions in the right context.
349
00:12:36,280 –> 00:12:39,880
That’s why authorization failures beat authentication failures.
350
00:12:39,880 –> 00:12:41,720
They hide inside allowed behavior.
351
00:12:41,720 –> 00:12:43,720
They’re not break class events.
352
00:12:43,720 –> 00:12:45,800
They are business as usual events performed
353
00:12:45,800 –> 00:12:48,680
by the wrong actor at the wrong time for the wrong reason.
354
00:12:48,680 –> 00:12:50,840
This is also why token theft is so effective.
355
00:12:50,840 –> 00:12:53,160
The attacker doesn’t need to defeat authentication
356
00:12:53,160 –> 00:12:55,880
if they can reuse the session after authentication.
357
00:12:55,880 –> 00:12:57,560
Now the system sees a valid token
358
00:12:57,560 –> 00:12:59,960
and the policy engine does what it was configured to do.
359
00:12:59,960 –> 00:13:02,840
Authorize your expensive identity controls become irrelevant
360
00:13:02,840 –> 00:13:04,920
because the attacker is no longer trying to log in.
361
00:13:04,920 –> 00:13:07,240
They’re trying to act which brings us to privilege creep.
362
00:13:07,240 –> 00:13:09,000
Privileged creep is not a misconfiguration.
363
00:13:09,000 –> 00:13:10,440
It is an organizational default.
364
00:13:10,440 –> 00:13:13,560
Every organization hires, promotes, reorganizes,
365
00:13:13,560 –> 00:13:15,960
uses contractors, launches projects
366
00:13:15,960 –> 00:13:18,840
and grants temporary access to get work done.
367
00:13:18,840 –> 00:13:21,800
Access accumulates because removing access costs time
368
00:13:21,800 –> 00:13:23,480
and creates risk of breaking something.
369
00:13:23,480 –> 00:13:24,440
So people avoid it.
370
00:13:24,440 –> 00:13:26,840
Over time the default posture becomes
371
00:13:26,840 –> 00:13:29,240
keep access unless there’s a reason to remove it.
372
00:13:29,240 –> 00:13:31,720
That is backwards but it feels safe operationally
373
00:13:31,720 –> 00:13:32,680
so it persists.
374
00:13:32,680 –> 00:13:35,080
This is where least privilege becomes a slogan
375
00:13:35,080 –> 00:13:36,440
instead of a system property.
376
00:13:36,440 –> 00:13:38,280
Least privilege is not something you declare.
377
00:13:38,280 –> 00:13:41,080
It is something you enforce through life cycle design,
378
00:13:41,080 –> 00:13:44,520
time limits, approvals, reviews and clear ownership.
379
00:13:44,520 –> 00:13:47,560
If those mechanisms aren’t built into the way access is granted,
380
00:13:47,560 –> 00:13:50,920
the organization will drift toward maximum privilege over time.
381
00:13:50,920 –> 00:13:51,560
Always.
382
00:13:51,560 –> 00:13:52,680
That’s not cynicism.
383
00:13:52,680 –> 00:13:53,720
That’s entropy.
384
00:13:53,720 –> 00:13:55,640
And privilege creep isn’t limited to humans.
385
00:13:55,640 –> 00:13:57,880
Non-human identities accumulate faster
386
00:13:57,880 –> 00:13:59,640
because they don’t show up in org charts
387
00:13:59,640 –> 00:14:01,320
and they don’t rotate roles.
388
00:14:01,320 –> 00:14:03,400
An application gets permissions for a project.
389
00:14:03,400 –> 00:14:04,200
The project ends.
390
00:14:04,200 –> 00:14:05,240
The permissions remain.
391
00:14:05,240 –> 00:14:07,000
A connector gets broad graph access
392
00:14:07,000 –> 00:14:08,440
because it needed it once.
393
00:14:08,440 –> 00:14:09,720
Nobody narrows it later.
394
00:14:09,720 –> 00:14:12,680
These identities are quiet, powerful and rarely reviewed.
395
00:14:12,680 –> 00:14:14,440
They are ideal attack infrastructure.
396
00:14:14,440 –> 00:14:16,440
So when leaders think identity risk,
397
00:14:16,440 –> 00:14:18,760
they picture stolen passwords and fishing.
398
00:14:18,760 –> 00:14:20,680
That’s the entry point, not the impact surface.
399
00:14:20,680 –> 00:14:23,080
The impact surface is who can approve spend,
400
00:14:23,080 –> 00:14:24,920
who can access regulated data,
401
00:14:24,920 –> 00:14:27,560
who can create or modify conditional access policies,
402
00:14:27,560 –> 00:14:29,000
who can grant app consent,
403
00:14:29,000 –> 00:14:30,520
who can create new identities,
404
00:14:30,520 –> 00:14:32,120
who can change audit settings,
405
00:14:32,120 –> 00:14:34,280
and who can disable the tools you rely on
406
00:14:34,280 –> 00:14:35,480
to detect compromise.
407
00:14:35,480 –> 00:14:38,680
In other words, the risk concentrates in change authority.
408
00:14:38,680 –> 00:14:40,600
If an identity can change the environment,
409
00:14:40,600 –> 00:14:43,320
then that identity is effectively part of your control plane.
410
00:14:43,320 –> 00:14:45,640
And control plane identities need different rules,
411
00:14:45,640 –> 00:14:46,920
reduced standing privilege,
412
00:14:46,920 –> 00:14:48,120
stronger session constraints,
413
00:14:48,120 –> 00:14:50,360
more scrutiny and faster revocation.
414
00:14:50,360 –> 00:14:51,960
This is also where over permission
415
00:14:51,960 –> 00:14:53,800
becomes business process debt.
416
00:14:53,800 –> 00:14:56,680
IT didn’t accidentally grant broad access.
417
00:14:56,680 –> 00:14:57,960
The business demanded speed,
418
00:14:57,960 –> 00:14:59,560
and the easiest way to deliver speed
419
00:14:59,560 –> 00:15:01,000
was to grant access broadly
420
00:15:01,000 –> 00:15:02,360
and hope nobody abuses it.
421
00:15:02,360 –> 00:15:04,360
That decision doesn’t show up as a line item.
422
00:15:04,360 –> 00:15:07,240
It shows up later as incident cost, audit friction,
423
00:15:07,240 –> 00:15:08,360
and emergency cleanup
424
00:15:08,360 –> 00:15:11,640
when the access graph is too messy to trust under pressure.
425
00:15:11,640 –> 00:15:14,680
And the most expensive moment to discover authorization debt
426
00:15:14,680 –> 00:15:15,880
is during an incident.
427
00:15:15,880 –> 00:15:17,720
Because now you can’t answer simple questions
428
00:15:17,720 –> 00:15:19,560
if we disable this account, what breaks?
429
00:15:19,560 –> 00:15:21,720
If we revoke this app’s permissions, what stops?
430
00:15:21,720 –> 00:15:24,360
If we remove this group, which business process fails?
431
00:15:24,360 –> 00:15:26,760
So you hesitate, you negotiate, you open tickets,
432
00:15:26,760 –> 00:15:27,880
you call the system owners,
433
00:15:27,880 –> 00:15:29,400
meanwhile the attacker keeps moving.
434
00:15:29,400 –> 00:15:31,960
That’s why authorization failures beat authentication failures.
435
00:15:31,960 –> 00:15:33,560
They don’t require sophistication.
436
00:15:33,560 –> 00:15:35,800
They require patience and a permission path.
437
00:15:35,800 –> 00:15:37,480
So the leadership take away is blunt.
438
00:15:37,480 –> 00:15:38,520
If you want resilience,
439
00:15:38,520 –> 00:15:41,160
you need to manage authorization as a first class asset.
440
00:15:41,160 –> 00:15:43,240
Not a byproduct, not a quarterly spreadsheet,
441
00:15:43,240 –> 00:15:44,440
a living decision model.
442
00:15:44,440 –> 00:15:45,880
And this is the transition point.
443
00:15:45,880 –> 00:15:47,480
If identity is the control plane,
444
00:15:47,480 –> 00:15:49,960
an authorization is the primary failure mode,
445
00:15:49,960 –> 00:15:52,600
then identity governance is where strategy becomes real
446
00:15:52,600 –> 00:15:54,360
because it is the mechanism that turns
447
00:15:54,360 –> 00:15:56,520
who should have access into enforceable,
448
00:15:56,520 –> 00:15:57,560
reviewable truth.
449
00:15:57,560 –> 00:16:01,240
Identity governance as a business discipline.
450
00:16:01,240 –> 00:16:03,960
Identity governance is where security stops being
451
00:16:03,960 –> 00:16:06,440
a collection of settings and becomes a management system.
452
00:16:06,440 –> 00:16:07,960
Not a tool, a discipline.
453
00:16:07,960 –> 00:16:10,440
Because governance answers the only questions
454
00:16:10,440 –> 00:16:11,720
that matter in a breach.
455
00:16:11,720 –> 00:16:12,920
Who should have access?
456
00:16:12,920 –> 00:16:13,800
Why do they have it?
457
00:16:13,800 –> 00:16:15,800
For how long, under what conditions?
458
00:16:15,800 –> 00:16:18,360
And who is accountable when those answers are wrong?
459
00:16:18,360 –> 00:16:21,240
Most organizations treat those as documentation questions.
460
00:16:21,240 –> 00:16:21,880
They are not.
461
00:16:21,880 –> 00:16:23,160
They are designed questions.
462
00:16:23,160 –> 00:16:25,560
If the organization can’t express intent
463
00:16:25,560 –> 00:16:27,320
in a way the control plane can enforce,
464
00:16:27,320 –> 00:16:30,520
then the control plane will default to what it always defaults to.
465
00:16:30,520 –> 00:16:32,840
Whatever grants, access, and avoids outages,
466
00:16:32,840 –> 00:16:34,920
that’s why governance has to be owned like finance,
467
00:16:34,920 –> 00:16:35,880
not like a project.
468
00:16:35,880 –> 00:16:38,840
Finance doesn’t turn on budgeting and declare victory.
469
00:16:38,840 –> 00:16:42,440
It runs a cadence, controls, approvals, reconciliation,
470
00:16:42,440 –> 00:16:43,960
audits, and corrective actions.
471
00:16:43,960 –> 00:16:46,840
Identity governance needs the same shape.
472
00:16:46,840 –> 00:16:49,240
Otherwise, access becomes a one-way valve.
473
00:16:49,240 –> 00:16:51,960
Granted quickly, removed slowly, reviewed rarely.
474
00:16:51,960 –> 00:16:53,320
That’s not a security posture.
475
00:16:53,320 –> 00:16:54,920
That’s entitlement inflation.
476
00:16:54,920 –> 00:16:57,080
So start with the foundational misunderstanding.
477
00:16:57,080 –> 00:16:59,320
People think governance is about saying no.
478
00:16:59,320 –> 00:17:00,040
It isn’t.
479
00:17:00,040 –> 00:17:02,280
Governance is about making yes, safe.
480
00:17:02,280 –> 00:17:04,520
It creates predictable pathways for access,
481
00:17:04,520 –> 00:17:06,760
so the business doesn’t need informal workarounds,
482
00:17:06,760 –> 00:17:08,760
shared accounts, or permanent exceptions.
483
00:17:08,760 –> 00:17:12,280
It is the system that turns autonomy into something you can tolerate.
484
00:17:12,280 –> 00:17:15,720
This is also why joiner, mover, lever is not an HR workflow.
485
00:17:15,720 –> 00:17:17,080
It is the access supply chain.
486
00:17:17,080 –> 00:17:17,800
Joiners are easy.
487
00:17:17,800 –> 00:17:19,480
The organization knows they need something,
488
00:17:19,480 –> 00:17:20,760
so it provisions access.
489
00:17:20,760 –> 00:17:22,120
Movers are where damage starts.
490
00:17:22,120 –> 00:17:24,120
People change roles, projects overlap.
491
00:17:24,120 –> 00:17:26,280
People keep their old permissions just in case,
492
00:17:26,280 –> 00:17:28,360
because removing access might break a process.
493
00:17:28,360 –> 00:17:29,880
So access accumulates.
494
00:17:29,880 –> 00:17:31,320
Leavers are the obvious part.
495
00:17:31,320 –> 00:17:32,360
Accounts get disabled.
496
00:17:32,360 –> 00:17:33,640
That’s table stakes.
497
00:17:33,640 –> 00:17:35,480
But the real governance failure is that
498
00:17:35,480 –> 00:17:38,440
movers and temporary workers are treated like edge cases.
499
00:17:38,440 –> 00:17:40,680
In most enterprises, contractors, partners,
500
00:17:40,680 –> 00:17:42,040
and vendors are not edge cases.
501
00:17:42,040 –> 00:17:43,720
They are core operating capacity.
502
00:17:43,720 –> 00:17:45,720
That means the identities are first-class risk.
503
00:17:45,720 –> 00:17:48,040
Their access has to be time-bound by default,
504
00:17:48,040 –> 00:17:50,440
with explicit sponsorship and an expiration date
505
00:17:50,440 –> 00:17:51,560
that actually expires.
506
00:17:51,560 –> 00:17:53,640
If access doesn’t expire, it is not governed.
507
00:17:53,640 –> 00:17:54,840
It is merely granted.
508
00:17:54,840 –> 00:17:56,760
And that’s the difference between access reviews
509
00:17:56,760 –> 00:17:59,400
as a checkbox and access reviews as a control loop.
510
00:17:59,400 –> 00:18:01,560
An access review is not a spreadsheet exercise.
511
00:18:01,560 –> 00:18:04,440
It is the mechanism that forces intent to be restated.
512
00:18:04,440 –> 00:18:07,640
If nobody can explain why an identity still needs access,
513
00:18:07,640 –> 00:18:09,000
that access is dead.
514
00:18:09,000 –> 00:18:11,320
If the reviewer can’t confidently remove access
515
00:18:11,320 –> 00:18:12,840
because nobody knows what it impacts,
516
00:18:12,840 –> 00:18:14,520
that’s not a reason to keep it.
517
00:18:14,520 –> 00:18:17,640
That is evidence the system has become ungovernable.
518
00:18:17,640 –> 00:18:20,440
Governance is also where least privilege becomes practical.
519
00:18:20,440 –> 00:18:22,440
Least privilege isn’t achieved by telling people
520
00:18:22,440 –> 00:18:23,640
to have less access.
521
00:18:23,640 –> 00:18:26,120
It’s achieved by designing access as a package.
522
00:18:26,120 –> 00:18:28,280
Scoped, conditional, and temporary.
523
00:18:28,280 –> 00:18:30,200
Access packages, approval parts,
524
00:18:30,200 –> 00:18:33,240
and periodic recertification are not extra-process.
525
00:18:33,240 –> 00:18:35,160
They are how an organization prevents
526
00:18:35,160 –> 00:18:38,280
privilege creep from becoming an incident-response problem.
527
00:18:38,280 –> 00:18:40,120
Now apply that logic to privileged access
528
00:18:40,120 –> 00:18:41,880
because that’s where business impact concentrates.
529
00:18:41,880 –> 00:18:44,840
Privileged access governance is not just admin roles.
530
00:18:44,840 –> 00:18:46,920
It is any identity that can change data,
531
00:18:46,920 –> 00:18:49,560
change systems, change controls, or change other identities.
532
00:18:49,560 –> 00:18:52,120
Those identities must be designed around two truths.
533
00:18:52,120 –> 00:18:53,480
Standing privilege is risk,
534
00:18:53,480 –> 00:18:55,880
and manual elevation is a latency generator.
535
00:18:55,880 –> 00:18:58,200
So the discipline is reduce standing privilege,
536
00:18:58,200 –> 00:19:00,280
make elevation fast and auditable,
537
00:19:00,280 –> 00:19:02,520
and enforce expiration without negotiation.
538
00:19:02,520 –> 00:19:04,600
If elevation requires three days and five approvals,
539
00:19:04,600 –> 00:19:05,560
people will bypass it.
540
00:19:05,560 –> 00:19:07,720
If it requires five minutes and leaves a perfect audit,
541
00:19:07,720 –> 00:19:08,760
trail people will use it.
542
00:19:08,760 –> 00:19:10,520
Systems train behavior.
543
00:19:10,520 –> 00:19:12,760
This is also where separation of duties
544
00:19:12,760 –> 00:19:14,280
stops being a policy statement
545
00:19:14,280 –> 00:19:16,280
and becomes a control plane property.
546
00:19:16,280 –> 00:19:17,640
The person who requests access
547
00:19:17,640 –> 00:19:19,240
should not be the person who approves it.
548
00:19:19,240 –> 00:19:21,400
The person who deploys should not be the only person
549
00:19:21,400 –> 00:19:22,520
who can disable logging.
550
00:19:22,520 –> 00:19:25,000
Governance is where those boundaries become enforceable,
551
00:19:25,000 –> 00:19:26,120
not aspirational.
552
00:19:26,120 –> 00:19:27,480
And one more uncomfortable truth,
553
00:19:27,480 –> 00:19:28,920
governance has a licensing model,
554
00:19:28,920 –> 00:19:30,600
but it also has an ownership model.
555
00:19:30,600 –> 00:19:32,120
Someone has to own access decisions
556
00:19:32,120 –> 00:19:33,480
the way someone own spend.
557
00:19:33,480 –> 00:19:35,320
That means business owners for resources.
558
00:19:35,320 –> 00:19:37,400
Not just IT, not the security team,
559
00:19:37,400 –> 00:19:39,000
the security team enforces.
560
00:19:39,000 –> 00:19:40,280
The business defines intent
561
00:19:40,280 –> 00:19:42,120
because when an identity incident happens,
562
00:19:42,120 –> 00:19:43,320
you don’t need more dashboards.
563
00:19:43,320 –> 00:19:44,200
You need authority.
564
00:19:44,200 –> 00:19:46,280
So identity governance as a business discipline
565
00:19:46,280 –> 00:19:48,120
is the mechanism that turns identity
566
00:19:48,120 –> 00:19:49,560
from a sprawling permission graph
567
00:19:49,560 –> 00:19:51,320
into a manageable decision system.
568
00:19:51,320 –> 00:19:53,560
It creates bounded access, predictable change,
569
00:19:53,560 –> 00:19:54,760
and fast revocation.
570
00:19:54,760 –> 00:19:56,040
And that’s the transition point.
571
00:19:56,040 –> 00:19:57,400
Once governance exists,
572
00:19:57,400 –> 00:19:59,960
identity becomes a foundation you can build on.
573
00:19:59,960 –> 00:20:02,040
Without it, every advance control you add
574
00:20:02,040 –> 00:20:04,520
is just another policy layered on top of drift.
575
00:20:04,520 –> 00:20:05,560
Scenario one,
576
00:20:05,560 –> 00:20:06,600
Entra ID,
577
00:20:06,600 –> 00:20:09,640
Identity governance plus ITDR as the foundation.
578
00:20:09,640 –> 00:20:11,480
Scenario one is Entra ID,
579
00:20:11,480 –> 00:20:13,880
done the way leadership assumes it already is.
580
00:20:13,880 –> 00:20:15,400
Governance plus identity,
581
00:20:15,400 –> 00:20:17,000
threat detection and response.
582
00:20:17,000 –> 00:20:19,000
Treat it as a control plane capability,
583
00:20:19,000 –> 00:20:21,560
not a portal someone logs into when they remember.
584
00:20:21,560 –> 00:20:23,240
Start with the clean definition.
585
00:20:23,240 –> 00:20:25,240
Entra is not where identities live.
586
00:20:25,240 –> 00:20:28,200
Entra is where trust decisions compile.
587
00:20:28,200 –> 00:20:30,520
It takes signals, applies policy intent,
588
00:20:30,520 –> 00:20:31,720
and issues the tokens
589
00:20:31,720 –> 00:20:34,360
that let humans and machines act inside your business.
590
00:20:34,360 –> 00:20:36,840
When that engine is governed, you get bounded access.
591
00:20:36,840 –> 00:20:38,920
When it isn’t, you get an authorization lottery
592
00:20:38,920 –> 00:20:39,960
with a nice UI.
593
00:20:39,960 –> 00:20:42,040
So the foundation is two linked disciplines.
594
00:20:42,040 –> 00:20:43,320
First identity governance,
595
00:20:43,320 –> 00:20:46,360
this is the part that answers should this identity have this access
596
00:20:46,360 –> 00:20:48,040
and forces time into the equation.
597
00:20:48,040 –> 00:20:49,160
Access packages,
598
00:20:49,160 –> 00:20:51,800
expiration, sponsorship, reviews,
599
00:20:51,800 –> 00:20:54,040
privileged elevation with justification,
600
00:20:54,040 –> 00:20:55,400
the goal isn’t bureaucracy,
601
00:20:55,400 –> 00:20:57,400
the goal is to stop entitlement drift
602
00:20:57,400 –> 00:20:59,800
from becoming your default security model.
603
00:20:59,800 –> 00:21:01,960
Second, ITDR identity threat,
604
00:21:01,960 –> 00:21:04,360
detection and response is the part that answers
605
00:21:04,360 –> 00:21:06,360
is this identity behaving like itself
606
00:21:06,360 –> 00:21:08,520
and how fast can we contain it when it doesn’t.
607
00:21:08,920 –> 00:21:10,040
Not as a SO-key hobby,
608
00:21:10,040 –> 00:21:11,240
as an operating requirement.
609
00:21:11,240 –> 00:21:13,640
Most organizations treat identity telemetry
610
00:21:13,640 –> 00:21:14,920
like a forensic archive.
611
00:21:14,920 –> 00:21:17,800
Sign-in logs, audit logs, risky users, risky sign-ins.
612
00:21:17,800 –> 00:21:19,320
Useful, but not decisive.
613
00:21:19,320 –> 00:21:20,920
ITDR is decisive.
614
00:21:20,920 –> 00:21:21,880
It’s the shift from,
615
00:21:21,880 –> 00:21:23,080
we can investigate later,
616
00:21:23,080 –> 00:21:24,280
to we can revoke now.
617
00:21:24,280 –> 00:21:26,680
Because identity incidents are not technical events.
618
00:21:26,680 –> 00:21:29,160
They are business events with business blast radius.
619
00:21:29,160 –> 00:21:30,840
The attacker doesn’t want your login page.
620
00:21:30,840 –> 00:21:32,120
They want your approval chains,
621
00:21:32,120 –> 00:21:33,720
your data export paths,
622
00:21:33,720 –> 00:21:35,400
your automation identities,
623
00:21:35,400 –> 00:21:36,520
and your admin surface.
624
00:21:36,520 –> 00:21:39,400
So what does Entra governance pass ITDR actually look like
625
00:21:39,400 –> 00:21:41,240
in practical terms without turning this
626
00:21:41,240 –> 00:21:42,840
into a configuration tutorial?
627
00:21:42,840 –> 00:21:44,840
It looks like the organization treating access
628
00:21:44,840 –> 00:21:46,600
as a product with a life cycle.
629
00:21:46,600 –> 00:21:48,920
A new contractor needs access to a project space
630
00:21:48,920 –> 00:21:50,520
and they requested through an access package.
631
00:21:50,520 –> 00:21:53,000
The package is scoped to what the contractor should touch,
632
00:21:53,000 –> 00:21:54,600
not what’s convenient to grant.
633
00:21:54,600 –> 00:21:56,680
It requires a sponsor who is accountable,
634
00:21:56,680 –> 00:21:58,440
it expires automatically.
635
00:21:58,440 –> 00:21:59,800
And there is a review cadence
636
00:21:59,800 –> 00:22:01,720
that doesn’t depend on someone remembering.
637
00:22:01,720 –> 00:22:02,680
That seems simple.
638
00:22:02,680 –> 00:22:03,560
Here’s the weird part.
639
00:22:03,560 –> 00:22:04,920
It is rare.
640
00:22:04,920 –> 00:22:07,080
Most contractors get access via group membership.
641
00:22:07,080 –> 00:22:08,360
The membership doesn’t expire.
642
00:22:08,360 –> 00:22:09,560
The sponsor changes jobs.
643
00:22:09,560 –> 00:22:10,440
The project ends.
644
00:22:10,440 –> 00:22:11,560
The access remains.
645
00:22:11,560 –> 00:22:12,600
That’s not malicious.
646
00:22:12,600 –> 00:22:13,400
That’s drift.
647
00:22:13,400 –> 00:22:15,400
And drift is the raw material of breaches.
648
00:22:15,400 –> 00:22:16,920
Now layer in privileged access.
649
00:22:16,920 –> 00:22:18,920
Entra PIM is not a nice to have.
650
00:22:18,920 –> 00:22:21,000
It’s the mechanism that prevents standing power
651
00:22:21,000 –> 00:22:22,840
from becoming standing exposure.
652
00:22:22,840 –> 00:22:24,840
If an identity can change conditional access,
653
00:22:24,840 –> 00:22:27,480
modify app consent, create new service principles,
654
00:22:27,480 –> 00:22:29,480
reset credentials, or turn off logging,
655
00:22:29,480 –> 00:22:31,400
that identity is part of your control plane.
656
00:22:31,400 –> 00:22:33,720
Control plane power cannot be permanently assigned
657
00:22:33,720 –> 00:22:35,880
and still be called least privilege.
658
00:22:35,880 –> 00:22:37,400
It becomes inherited risk.
659
00:22:37,400 –> 00:22:39,800
So the model is, eligible by default,
660
00:22:39,800 –> 00:22:42,360
active only when needed, time bound, always,
661
00:22:42,360 –> 00:22:43,800
and auditable without effort.
662
00:22:43,800 –> 00:22:45,640
If elevation is slow, people bypass.
663
00:22:45,640 –> 00:22:47,960
If elevation is fast and logged, people comply.
664
00:22:47,960 –> 00:22:49,400
Your design trains your culture.
665
00:22:49,400 –> 00:22:51,640
Now the ITDR half.
666
00:22:51,640 –> 00:22:53,800
Identity incidents rarely announce themselves
667
00:22:53,800 –> 00:22:56,120
with a single obvious alert.
668
00:22:56,120 –> 00:22:57,720
They show up as weak signals.
669
00:22:57,720 –> 00:23:00,520
Unusual token use, a sign in that’s technically valid
670
00:23:00,520 –> 00:23:02,040
but behaviorally wrong,
671
00:23:02,040 –> 00:23:04,680
a new OAuth app consent that shouldn’t exist,
672
00:23:04,680 –> 00:23:06,840
an admin role activation at an odd time
673
00:23:06,840 –> 00:23:09,160
an account that starts enumerating directory objects
674
00:23:09,160 –> 00:23:11,720
it never touched before, the system has those signals.
675
00:23:11,720 –> 00:23:14,040
The question is whether you connected them to response.
676
00:23:14,040 –> 00:23:16,040
This is where Entra becomes an execution layer,
677
00:23:16,040 –> 00:23:17,080
not a reporting layer.
678
00:23:17,080 –> 00:23:18,840
Risk signals can drive policy actions.
679
00:23:18,840 –> 00:23:21,160
Session risk can trigger step-up requirements.
680
00:23:21,160 –> 00:23:23,000
Compromised accounts can be disabled.
681
00:23:23,000 –> 00:23:24,440
Tokens can be invalidated.
682
00:23:24,440 –> 00:23:26,200
Privileged sessions can be constrained
683
00:23:26,200 –> 00:23:27,960
and the moment you can do that quickly,
684
00:23:27,960 –> 00:23:29,800
you change the economics of an attack.
685
00:23:29,800 –> 00:23:32,120
Because the attacker’s best advantage is time
686
00:23:32,120 –> 00:23:34,280
and governance is what makes response safe.
687
00:23:34,280 –> 00:23:37,560
Without governance, every containment action becomes political.
688
00:23:37,560 –> 00:23:40,360
If we disable this account, we’ll payroll break.
689
00:23:40,360 –> 00:23:43,160
If we revoke this app, will the sales team lose access?
690
00:23:43,160 –> 00:23:44,760
So the organization hesitates.
691
00:23:44,760 –> 00:23:46,280
Governance reduces that hesitation
692
00:23:46,280 –> 00:23:49,000
by making access intentional, scoped and owned.
693
00:23:49,000 –> 00:23:50,840
You can be decisive because you understand
694
00:23:50,840 –> 00:23:52,920
what normal access looks like.
695
00:23:52,920 –> 00:23:55,800
There’s also a 2026 reality leaders should not ignore.
696
00:23:55,800 –> 00:23:58,600
Entra is tightening the rules around application identities
697
00:23:58,600 –> 00:24:01,800
and service principle less authentication behavior is being retired.
698
00:24:01,800 –> 00:24:02,760
That is not a nuisance.
699
00:24:02,760 –> 00:24:03,800
That is a forcing function.
700
00:24:03,800 –> 00:24:05,720
It’s Microsoft telling you in policy
701
00:24:05,720 –> 00:24:08,360
that invisible identities don’t get to exist anymore,
702
00:24:08,360 –> 00:24:09,640
which is the point.
703
00:24:09,640 –> 00:24:11,080
Scenario one is the foundation
704
00:24:11,080 –> 00:24:12,520
because it restores determinism.
705
00:24:12,520 –> 00:24:13,880
It makes access time-bound.
706
00:24:13,880 –> 00:24:15,240
It makes privilege temporary.
707
00:24:15,240 –> 00:24:16,840
It makes ownership explicit.
708
00:24:16,840 –> 00:24:19,560
And it turns identity signals into actions instead of evidence.
709
00:24:19,560 –> 00:24:21,000
Then you can build zero trust
710
00:24:21,000 –> 00:24:24,360
that actually works because now your trust model has teeth.
711
00:24:24,360 –> 00:24:26,280
Zero trust is not a product rollout.
712
00:24:26,280 –> 00:24:28,120
Zero trust is where a lot of security programs
713
00:24:28,120 –> 00:24:30,840
go to die because it gets treated like a procurement event.
714
00:24:30,840 –> 00:24:33,320
A vendor pitches a zero trust solution.
715
00:24:33,320 –> 00:24:35,080
The organization buys licenses.
716
00:24:35,080 –> 00:24:36,840
Someone turns on conditional access.
717
00:24:36,840 –> 00:24:38,360
A slide gets shown to the board.
718
00:24:38,360 –> 00:24:40,920
And everybody quietly agrees the journey is complete.
719
00:24:40,920 –> 00:24:42,440
It isn’t zero trust is not a product.
720
00:24:42,440 –> 00:24:43,320
It is not a portal.
721
00:24:43,320 –> 00:24:44,840
It is not a single policy set.
722
00:24:44,840 –> 00:24:45,800
In architectural terms,
723
00:24:45,800 –> 00:24:49,000
it is a replacement for your old trust assumptions.
724
00:24:49,000 –> 00:24:51,160
The idea that inside means safe,
725
00:24:51,160 –> 00:24:53,080
that authenticated means trusted
726
00:24:53,080 –> 00:24:55,560
and that compliant means controlled.
727
00:24:55,560 –> 00:24:57,720
Zero trust says none of that is true by default.
728
00:24:57,720 –> 00:24:59,800
Trust has to be earned continuously
729
00:24:59,800 –> 00:25:02,360
per request and revoked when reality changes.
730
00:25:02,360 –> 00:25:03,480
That distinction matters
731
00:25:03,480 –> 00:25:06,200
because product rollouts create coverage.
732
00:25:06,200 –> 00:25:08,760
Zero trust requires behavior change in the system.
733
00:25:08,760 –> 00:25:11,560
The foundational misunderstanding is that people translate
734
00:25:11,560 –> 00:25:13,880
“Never trust, always verify”
735
00:25:13,880 –> 00:25:15,240
into “add more prompts”.
736
00:25:15,240 –> 00:25:17,720
More MFA prompts, more approvals, more blocks,
737
00:25:17,720 –> 00:25:19,880
that’s not zero trust, that’s friction.
738
00:25:19,880 –> 00:25:22,680
Zero trust unproperly reduces friction for normal work
739
00:25:22,680 –> 00:25:24,840
and increases constraint for abnormal work.
740
00:25:24,840 –> 00:25:27,960
It does that by making policy decisions dynamic,
741
00:25:27,960 –> 00:25:30,280
contextual and enforceable close to the resource.
742
00:25:30,280 –> 00:25:32,040
That’s the NIST model in plain language.
743
00:25:32,040 –> 00:25:33,480
A subject requests access,
744
00:25:33,480 –> 00:25:35,800
a policy decision happens using real signals
745
00:25:35,800 –> 00:25:38,200
and a policy enforcement point applies that decision.
746
00:25:38,200 –> 00:25:40,040
And that loop never stops existing
747
00:25:40,040 –> 00:25:42,040
just because the user passed a login screen once.
748
00:25:42,040 –> 00:25:44,360
This is why the phrase we turned on conditional access
749
00:25:44,360 –> 00:25:45,480
is such a warning sign.
750
00:25:45,480 –> 00:25:47,320
Conditional access is a policy engine.
751
00:25:47,320 –> 00:25:48,120
It’s powerful.
752
00:25:48,120 –> 00:25:51,160
But if the program around it is built on exception culture,
753
00:25:51,160 –> 00:25:52,680
shared responsibility gaps,
754
00:25:52,680 –> 00:25:54,680
and unowned entitlements,
755
00:25:54,680 –> 00:25:57,320
then conditional access becomes conditional chaos,
756
00:25:57,320 –> 00:25:59,800
a pile of policies that look sophisticated
757
00:25:59,800 –> 00:26:01,640
and behave inconsistently.
758
00:26:01,640 –> 00:26:03,960
The system doesn’t degrade because it’s malicious.
759
00:26:03,960 –> 00:26:06,840
It degrades because organizations are, they merge, they reorganize,
760
00:26:06,840 –> 00:26:08,680
they acquire, they ship new apps,
761
00:26:08,680 –> 00:26:11,400
they onboard third parties, they add automation.
762
00:26:11,400 –> 00:26:14,600
And every one of those changes generates just one exception.
763
00:26:14,600 –> 00:26:16,760
Remember this detail, it’s going to matter later.
764
00:26:16,760 –> 00:26:18,360
Exceptions are entropy generators.
765
00:26:18,360 –> 00:26:20,200
Every exception is a trust assumption
766
00:26:20,200 –> 00:26:21,880
you are choosing not to enforce.
767
00:26:21,880 –> 00:26:23,880
It becomes a permanent alternate pathway
768
00:26:23,880 –> 00:26:25,640
unless you govern it like a liability,
769
00:26:25,640 –> 00:26:27,560
expiration, justification, and review.
770
00:26:27,560 –> 00:26:29,240
If you don’t, your zero trust program
771
00:26:29,240 –> 00:26:31,160
becomes a museum of past urgency.
772
00:26:31,160 –> 00:26:32,840
Nobody knows which policies still matter,
773
00:26:32,840 –> 00:26:35,000
nobody knows which applications rely on them.
774
00:26:35,000 –> 00:26:37,320
And when an incident hits, you cannot act decisively
775
00:26:37,320 –> 00:26:39,720
because you can’t predict the blast radius of enforcement.
776
00:26:39,720 –> 00:26:41,880
That’s why zero trust is not a technical rollout.
777
00:26:41,880 –> 00:26:43,000
It’s an operating model.
778
00:26:43,000 –> 00:26:45,480
Operating model means ownership boundaries are explicit.
779
00:26:45,480 –> 00:26:47,160
Someone defines policy intent.
780
00:26:47,160 –> 00:26:49,240
Someone implements it, someone monitors drift,
781
00:26:49,240 –> 00:26:50,680
someone owns exceptions.
782
00:26:50,680 –> 00:26:53,240
Someone is accountable for outcomes, not configuration.
783
00:26:53,240 –> 00:26:56,360
And in most organizations, that’s exactly where the program fails.
784
00:26:56,360 –> 00:26:59,960
Identity teams own identity, endpoint teams own devices,
785
00:26:59,960 –> 00:27:01,640
network teams own connectivity,
786
00:27:01,640 –> 00:27:03,400
application teams own uptime,
787
00:27:03,400 –> 00:27:06,040
security teams own alerts, nobody owns trust end to end.
788
00:27:06,040 –> 00:27:08,600
So the attacker gets gaps between teams, always.
789
00:27:08,600 –> 00:27:11,960
A real zero trust transformation collapses
790
00:27:11,960 –> 00:27:14,840
those gaps by defining the trust system as one loop.
791
00:27:14,840 –> 00:27:17,800
Signals into decision, decision into enforcement,
792
00:27:17,800 –> 00:27:19,480
enforcement into response.
793
00:27:19,480 –> 00:27:21,400
It becomes less about do we have the feature
794
00:27:21,400 –> 00:27:25,480
and more about does the system reliably constrain the pathways that matter?
795
00:27:25,480 –> 00:27:28,760
This is also where leadership has to stop rewarding the wrong behavior.
796
00:27:28,760 –> 00:27:31,400
If teams are punished for outages and not punished for drift,
797
00:27:31,400 –> 00:27:32,360
they will choose drift.
798
00:27:32,360 –> 00:27:34,680
If teams are rewarded for fast delivery
799
00:27:34,680 –> 00:27:37,000
and not rewarded for revocation discipline,
800
00:27:37,000 –> 00:27:38,440
they will accumulate permissions.
801
00:27:38,440 –> 00:27:41,320
If security is measured by how many requested blocks,
802
00:27:41,320 –> 00:27:42,520
it will block more.
803
00:27:42,520 –> 00:27:44,040
And the business will root around it.
804
00:27:44,040 –> 00:27:46,520
Zero trust done right has a different success condition.
805
00:27:46,520 –> 00:27:47,640
Safe autonomy.
806
00:27:47,640 –> 00:27:49,000
People should be able to work quickly
807
00:27:49,000 –> 00:27:50,920
because the system makes low-risk work easy
808
00:27:50,920 –> 00:27:52,280
and high-risk work controlled.
809
00:27:52,280 –> 00:27:53,480
That requires two things.
810
00:27:53,480 –> 00:27:55,000
Leaders rarely fund explicitly.
811
00:27:55,000 –> 00:27:56,600
Decision quality and enforcement speed.
812
00:27:56,600 –> 00:27:59,000
Decision quality comes from identity governance
813
00:27:59,000 –> 00:28:01,000
and clean entitlement design.
814
00:28:01,000 –> 00:28:03,080
Enforcement speed comes from capabilities
815
00:28:03,080 –> 00:28:05,000
like continuous access evaluation
816
00:28:05,000 –> 00:28:06,520
and automated response loops.
817
00:28:06,520 –> 00:28:09,240
Without those, zero trust stays a diagram.
818
00:28:09,240 –> 00:28:11,960
A beautiful policy model with no runtime authority.
819
00:28:11,960 –> 00:28:15,640
So the product rollout mindset needs to die.
820
00:28:15,640 –> 00:28:17,640
What replaces it is a program mindset.
821
00:28:17,640 –> 00:28:19,240
Trust assumptions are explicit,
822
00:28:19,240 –> 00:28:20,360
exceptions are governed,
823
00:28:20,360 –> 00:28:22,600
sessions are continuously evaluated
824
00:28:22,600 –> 00:28:25,560
and revocation happens fast enough that it matters.
825
00:28:25,560 –> 00:28:26,520
And once you accept that,
826
00:28:26,520 –> 00:28:28,040
the next point becomes obvious.
827
00:28:28,040 –> 00:28:29,480
Trust doesn’t decay at login.
828
00:28:29,480 –> 00:28:31,960
It decays continuously inside the session.
829
00:28:31,960 –> 00:28:35,640
Trust decays continuously, not at login.
830
00:28:35,640 –> 00:28:37,720
Most organizations still design trust
831
00:28:37,720 –> 00:28:39,080
like it’s a moment in time.
832
00:28:39,080 –> 00:28:41,240
You authenticate, you pass MFA, you’re good.
833
00:28:41,240 –> 00:28:43,000
Then you get a token
834
00:28:43,000 –> 00:28:45,000
and that token becomes a little permission slip
835
00:28:45,000 –> 00:28:46,600
that travels with you for hours.
836
00:28:46,600 –> 00:28:48,920
That model made sense when the network was the boundary
837
00:28:48,920 –> 00:28:50,280
and sessions were short.
838
00:28:50,280 –> 00:28:51,880
In cloud and sass, it’s backwards.
839
00:28:51,880 –> 00:28:54,200
The reality is that the session is the attack surface.
840
00:28:54,200 –> 00:28:55,480
Not the login screen,
841
00:28:55,480 –> 00:28:56,840
because the attacker doesn’t care
842
00:28:56,840 –> 00:28:58,200
about proving who they are.
843
00:28:58,200 –> 00:29:00,440
They care about inheriting what you already proved.
844
00:29:00,440 –> 00:29:02,280
If they can get hold of the session token
845
00:29:02,280 –> 00:29:03,160
or the refresh token,
846
00:29:03,160 –> 00:29:04,920
they’re not trying to authenticate anymore.
847
00:29:04,920 –> 00:29:06,600
They’re trying to operate as you
848
00:29:06,600 –> 00:29:08,520
after the platform already granted trust.
849
00:29:08,520 –> 00:29:10,680
This is why we have strong MFA
850
00:29:10,680 –> 00:29:13,640
can be true and still irrelevant to the event that hurts you.
851
00:29:13,640 –> 00:29:15,960
It’s also why leaders keep hearing the same sentence
852
00:29:15,960 –> 00:29:17,000
after incidents.
853
00:29:17,000 –> 00:29:19,080
The user successfully completed MFA.
854
00:29:19,080 –> 00:29:21,400
Yes, and then the session lived long enough to be abused.
855
00:29:21,400 –> 00:29:22,920
So the core shift is this.
856
00:29:22,920 –> 00:29:24,920
Authentication is not the end of trust.
857
00:29:24,920 –> 00:29:28,040
It’s the beginning of a continuously evaluated relationship
858
00:29:28,040 –> 00:29:29,800
between an identity, a device,
859
00:29:29,800 –> 00:29:31,160
a session, and a resource.
860
00:29:31,160 –> 00:29:32,760
And that relationship decays.
861
00:29:32,760 –> 00:29:36,520
Sometimes it decays because the device posture changes.
862
00:29:36,520 –> 00:29:38,680
A laptop goes from compliant to not compliant.
863
00:29:38,680 –> 00:29:41,320
An endpoint alert fires, a risky sign in is detected.
864
00:29:41,320 –> 00:29:43,800
A user is disabled, a role assignment changes.
865
00:29:43,800 –> 00:29:46,760
Or a credential reset happens for suspected compromise.
866
00:29:46,760 –> 00:29:49,720
Those are all state changes that should alter trust immediately.
867
00:29:49,720 –> 00:29:51,960
But in a point in time model, none of them matter
868
00:29:51,960 –> 00:29:54,200
until the session naturally expires.
869
00:29:54,200 –> 00:29:57,320
That gap between the world changed and enforcement caught up
870
00:29:57,320 –> 00:29:58,840
is where modern incidents live.
871
00:29:58,840 –> 00:30:01,400
It’s the difference between knowing a door should be locked
872
00:30:01,400 –> 00:30:03,960
and waiting eight hours for the lock to engage
873
00:30:03,960 –> 00:30:05,400
because the key card still works.
874
00:30:05,400 –> 00:30:07,480
This is where it gets uncomfortable for leadership
875
00:30:07,480 –> 00:30:10,360
because IT time is not the time unit that matters.
876
00:30:10,360 –> 00:30:11,480
Business time is.
877
00:30:11,480 –> 00:30:13,320
If it takes you six hours to revoke access
878
00:30:13,320 –> 00:30:15,400
because you rely on token expiration,
879
00:30:15,400 –> 00:30:17,400
the attacker has six hours of clean runway.
880
00:30:17,400 –> 00:30:18,600
They don’t need persistence.
881
00:30:18,600 –> 00:30:21,240
They need time and your organization usually gives it to them
882
00:30:21,240 –> 00:30:23,320
because it designed trust as a single event,
883
00:30:23,320 –> 00:30:24,760
not a continuous state.
884
00:30:24,760 –> 00:30:26,680
Now, layer in the things leaders don’t see.
885
00:30:26,680 –> 00:30:29,720
Sessions aren’t only for humans, workloads have sessions,
886
00:30:29,720 –> 00:30:32,600
automation has sessions, integrations have sessions,
887
00:30:32,600 –> 00:30:34,360
third party apps have sessions.
888
00:30:34,360 –> 00:30:36,360
And these identities often have broader permissions
889
00:30:36,360 –> 00:30:39,160
because someone wanted the workflow to just work.
890
00:30:39,160 –> 00:30:40,360
When those sessions are abused,
891
00:30:40,360 –> 00:30:42,680
you don’t get a helpful prompt or user complaint.
892
00:30:42,680 –> 00:30:44,760
You get silent high throughput actions
893
00:30:44,760 –> 00:30:46,840
that look like normal system activity.
894
00:30:46,840 –> 00:30:49,560
That’s the human machine blur, operationalized.
895
00:30:49,560 –> 00:30:51,640
So when people say continuous verification,
896
00:30:51,640 –> 00:30:53,880
they tend to imagine constant MFA prompts.
897
00:30:53,880 –> 00:30:55,160
That’s the wrong mental model.
898
00:30:55,160 –> 00:30:57,160
The system doesn’t need to keep asking the user
899
00:30:57,160 –> 00:30:58,280
to prove their human.
900
00:30:58,280 –> 00:30:59,960
The system needs to keep validating
901
00:30:59,960 –> 00:31:03,000
whether the conditions that justified access still exist.
902
00:31:03,000 –> 00:31:05,080
In zero trust terms, the policy decision point
903
00:31:05,080 –> 00:31:07,160
should not be consulted once and then ignored.
904
00:31:07,160 –> 00:31:08,280
It should stay relevant.
905
00:31:08,280 –> 00:31:09,560
It should be able to say
906
00:31:09,560 –> 00:31:11,960
that session was valid, but now it isn’t.
907
00:31:11,960 –> 00:31:14,040
Which implies something simple and brutal.
908
00:31:14,040 –> 00:31:15,480
Trust must be revocable,
909
00:31:15,480 –> 00:31:17,160
not in an annual access review,
910
00:31:17,160 –> 00:31:18,200
not in a ticket queue,
911
00:31:18,200 –> 00:31:19,400
not after a meeting,
912
00:31:19,400 –> 00:31:20,760
revocable in near real time
913
00:31:20,760 –> 00:31:23,080
and in a way, your critical apps actually honor.
914
00:31:23,080 –> 00:31:25,240
Because the most expensive form of security control
915
00:31:25,240 –> 00:31:26,440
is one that detects risk
916
00:31:26,440 –> 00:31:29,000
and cannot enforce consequences quickly enough to matter.
917
00:31:29,000 –> 00:31:31,880
This is also where exception culture quietly destroys you.
918
00:31:31,880 –> 00:31:34,680
If you’ve carved out bypasses for business critical apps
919
00:31:34,680 –> 00:31:36,920
or you allow legacy auth because it’s complicated
920
00:31:36,920 –> 00:31:38,760
or you exempt privileged identities
921
00:31:38,760 –> 00:31:41,000
because they can’t be disrupted,
922
00:31:41,000 –> 00:31:42,440
you have effectively declared
923
00:31:42,440 –> 00:31:45,480
that the most important pathways are the least governable.
924
00:31:45,480 –> 00:31:46,760
That’s not a security program.
925
00:31:46,760 –> 00:31:48,840
That’s a liability register you refuse to name.
926
00:31:48,840 –> 00:31:51,480
And the reason this matters to leaders is not philosophical.
927
00:31:51,480 –> 00:31:52,520
It’s operational.
928
00:31:52,520 –> 00:31:54,440
If trust decays continuously,
929
00:31:54,440 –> 00:31:57,160
then your organization must be able to revoke continuously.
930
00:31:57,160 –> 00:31:59,480
Otherwise, you’re running a probabilistic security model.
931
00:31:59,480 –> 00:32:01,160
Sometimes revocation happens fast,
932
00:32:01,160 –> 00:32:02,120
sometimes it doesn’t,
933
00:32:02,120 –> 00:32:04,200
and you just hope the attacker lands in the slow lane.
934
00:32:04,200 –> 00:32:07,400
So the ahaha to hold on to is this.
935
00:32:07,400 –> 00:32:09,400
Resilience in identity-driven incidents
936
00:32:09,400 –> 00:32:11,080
is mostly about collapsing the time
937
00:32:11,080 –> 00:32:12,760
between a trust decision changing
938
00:32:12,760 –> 00:32:14,360
and enforcement taking effect.
939
00:32:14,360 –> 00:32:15,720
That’s why the next scenario matters.
940
00:32:15,720 –> 00:32:18,120
Continuous access evaluation is where zero trust
941
00:32:18,120 –> 00:32:21,320
stops being a diagram and starts being lived reality.
942
00:32:21,320 –> 00:32:22,360
Scenario three.
943
00:32:22,360 –> 00:32:24,040
Continuous access evaluation.
944
00:32:24,040 –> 00:32:26,680
CAE as lived zero trust.
945
00:32:26,680 –> 00:32:29,000
CAE is what happens when an organization
946
00:32:29,000 –> 00:32:31,800
stops pretending that access granted is a permanent state.
947
00:32:31,800 –> 00:32:32,520
It is not.
948
00:32:32,520 –> 00:32:34,520
It is a temporary decision that should collapse
949
00:32:34,520 –> 00:32:36,360
the moment the conditions behind it change.
950
00:32:36,360 –> 00:32:39,080
CAE is the mechanism that makes that collapse real
951
00:32:39,080 –> 00:32:41,160
and fast in the Microsoft ecosystem,
952
00:32:41,160 –> 00:32:43,720
not as a concept as runtime behavior.
953
00:32:43,720 –> 00:32:44,920
Here’s the simple version.
954
00:32:44,920 –> 00:32:48,120
CAE lets entra tell participating applications.
955
00:32:48,120 –> 00:32:50,200
This session is no longer acceptable.
956
00:32:50,200 –> 00:32:52,280
And have the app enforce that in near real time
957
00:32:52,280 –> 00:32:54,040
instead of waiting for token expiry.
958
00:32:54,040 –> 00:32:56,440
That’s the gap it closes, decision versus enforcement.
959
00:32:56,440 –> 00:32:59,080
Most security programs have decent decision making.
960
00:32:59,080 –> 00:33:00,760
They know when something is risky,
961
00:33:00,760 –> 00:33:02,960
they can flag a user, they can disable an account,
962
00:33:02,960 –> 00:33:04,440
they can mark a sign in as high risk,
963
00:33:04,440 –> 00:33:06,920
they can detect a device falling out of compliance.
964
00:33:06,920 –> 00:33:09,160
But then nothing happens quickly enough to matter
965
00:33:09,160 –> 00:33:11,240
because the user’s session keeps running.
966
00:33:11,240 –> 00:33:14,680
CAE is how you stop granting attackers the courtesy of time.
967
00:33:14,680 –> 00:33:17,000
Why leaders should care is straightforward.
968
00:33:17,000 –> 00:33:20,200
It converts trust revocation from an administrative workflow
969
00:33:20,200 –> 00:33:21,640
into an operational control.
970
00:33:21,640 –> 00:33:24,040
It turns we noticed into we contained
971
00:33:24,040 –> 00:33:26,680
without a help desk ticket and without waiting six hours
972
00:33:26,680 –> 00:33:27,960
for a token to die naturally.
973
00:33:27,960 –> 00:33:29,320
But CAE is not magic.
974
00:33:29,320 –> 00:33:30,040
It’s a contract.
975
00:33:30,040 –> 00:33:31,240
Entra can emit the signal.
976
00:33:31,240 –> 00:33:32,920
The application has to honor it.
977
00:33:32,920 –> 00:33:34,440
And that’s where reality shows up.
978
00:33:34,440 –> 00:33:37,640
Microsoft services like Exchange Online, SharePoint Online, Teams
979
00:33:37,640 –> 00:33:39,800
and others support CAE in specific ways.
980
00:33:39,800 –> 00:33:41,320
Many third party SaaS apps don’t.
981
00:33:41,320 –> 00:33:44,280
Some claim they do, but implemented partially or inconsistently.
982
00:33:44,280 –> 00:33:46,680
So we enabled CAE is not an end state.
983
00:33:46,680 –> 00:33:50,680
It’s the start of verifying which of your critical applications
984
00:33:50,680 –> 00:33:53,400
actually behave like they live in a zero trust system.
985
00:33:53,400 –> 00:33:55,800
That distinction matters because CAE creates
986
00:33:55,800 –> 00:33:57,560
an uncomfortable inventory problem.
987
00:33:57,560 –> 00:33:59,640
Which sessions can you actually revoke quickly
988
00:33:59,640 –> 00:34:00,840
across the apps that matter?
989
00:34:00,840 –> 00:34:02,360
This is where leaders get leverage
990
00:34:02,360 –> 00:34:05,080
because CAE forces a clean separation
991
00:34:05,080 –> 00:34:07,040
between two types of work.
992
00:34:07,040 –> 00:34:10,120
First, the policy work deciding which events should trigger
993
00:34:10,120 –> 00:34:12,440
revocation and for which resources.
994
00:34:12,440 –> 00:34:15,560
Account disabled, password reset, risk level elevated,
995
00:34:15,560 –> 00:34:18,800
device non-compliant, role change, those are business decisions
996
00:34:18,800 –> 00:34:20,520
framed are security conditions.
997
00:34:20,520 –> 00:34:23,280
Second, the application work, ensuring critical apps
998
00:34:23,280 –> 00:34:26,000
honor revocation signals and that your user experience
999
00:34:26,000 –> 00:34:28,440
doesn’t collapse into constant reauthentication.
1000
00:34:28,440 –> 00:34:31,400
Now, the part nobody likes, exceptions.
1001
00:34:31,400 –> 00:34:34,280
CAE works exactly as well as your exception governance.
1002
00:34:34,280 –> 00:34:37,040
Every time someone says don’t enforce this for executives
1003
00:34:37,040 –> 00:34:39,320
or exclude this app because it breaks,
1004
00:34:39,320 –> 00:34:40,840
you’ve created a permanent bypass
1005
00:34:40,840 –> 00:34:43,800
around your revocation model and bypasses don’t stay rare.
1006
00:34:43,800 –> 00:34:44,720
They replicate.
1007
00:34:44,720 –> 00:34:47,440
This is where CAE exposes the program’s maturity.
1008
00:34:47,440 –> 00:34:49,080
If exception handling is informal,
1009
00:34:49,080 –> 00:34:51,480
CAE becomes another half-deployed capability.
1010
00:34:51,480 –> 00:34:53,280
If exception handling is governed,
1011
00:34:53,280 –> 00:34:55,560
expiration justification, review cadence,
1012
00:34:55,560 –> 00:34:57,600
CAE becomes a control you can trust.
1013
00:34:57,600 –> 00:34:59,840
There’s also a dependency most people miss.
1014
00:34:59,840 –> 00:35:03,280
CAE pushes you toward cleaner identity architecture.
1015
00:35:03,280 –> 00:35:05,000
If your environment still relies heavily
1016
00:35:05,000 –> 00:35:06,640
on legacy authentication patterns
1017
00:35:06,640 –> 00:35:08,600
or your application estate treats tokens
1018
00:35:08,600 –> 00:35:11,200
as long-lived entitlements, then CAE becomes
1019
00:35:11,200 –> 00:35:14,120
a compatibility argument instead of a security capability.
1020
00:35:14,120 –> 00:35:15,480
That’s not a reason to avoid it.
1021
00:35:15,480 –> 00:35:17,680
That’s a reason to treat application modernization
1022
00:35:17,680 –> 00:35:19,000
as part of security resilience
1023
00:35:19,000 –> 00:35:21,320
because the business depends on revocation speed.
1024
00:35:21,320 –> 00:35:23,760
A concrete scenario makes this obvious.
1025
00:35:23,760 –> 00:35:25,880
An employee’s account gets flagged as high risk
1026
00:35:25,880 –> 00:35:27,640
after anomalous activity.
1027
00:35:27,640 –> 00:35:29,200
In the old model, the security team
1028
00:35:29,200 –> 00:35:30,200
disables the account,
1029
00:35:30,200 –> 00:35:32,000
but the attacker’s token remains valid
1030
00:35:32,000 –> 00:35:34,000
in a browser session connected to SharePoint
1031
00:35:34,000 –> 00:35:35,600
or another SaaS service.
1032
00:35:35,600 –> 00:35:37,240
The attacker continues downloading data
1033
00:35:37,240 –> 00:35:38,520
until the session expires.
1034
00:35:38,520 –> 00:35:40,880
The organization responded, but impact continued.
1035
00:35:40,880 –> 00:35:42,520
With CAE, disabling the account
1036
00:35:42,520 –> 00:35:44,280
or changing the risk state can trigger
1037
00:35:44,280 –> 00:35:45,880
a near real-time re-evaluation.
1038
00:35:45,880 –> 00:35:47,840
The app receives the revocation signal.
1039
00:35:47,840 –> 00:35:49,880
The session is forced to re-authenticate
1040
00:35:49,880 –> 00:35:51,640
and the attacker’s runway collapses.
1041
00:35:51,640 –> 00:35:53,760
The cost of compromise becomes bounded,
1042
00:35:53,760 –> 00:35:55,800
not because the attacker failed to get in,
1043
00:35:55,800 –> 00:35:57,040
but because they couldn’t stay.
1044
00:35:57,040 –> 00:35:58,320
That is lived zero trust.
1045
00:35:58,320 –> 00:35:59,560
Not a poster, not a slide,
1046
00:35:59,560 –> 00:36:02,040
a system that revokes trust inside the session.
1047
00:36:02,040 –> 00:36:03,640
And CAE has a second order benefit
1048
00:36:03,640 –> 00:36:04,960
that leaders tend to miss.
1049
00:36:04,960 –> 00:36:07,320
It reduces the need for blanket shutdowns.
1050
00:36:07,320 –> 00:36:09,200
When you can revoke precisely
1051
00:36:09,200 –> 00:36:11,480
this identity, these sessions, these apps,
1052
00:36:11,480 –> 00:36:13,520
you stop reaching for the blunt instrument
1053
00:36:13,520 –> 00:36:16,920
of turn-off access for everyone until we figure it out.
1054
00:36:16,920 –> 00:36:20,120
Precision is how you preserve continuity while you contain.
1055
00:36:20,120 –> 00:36:22,320
That is resilience measured in business uptime,
1056
00:36:22,320 –> 00:36:23,760
not in policy documents.
1057
00:36:23,760 –> 00:36:26,800
So CAE is not a feature you enable to feel modern.
1058
00:36:26,800 –> 00:36:28,800
It is a forcing function that makes you prove
1059
00:36:28,800 –> 00:36:30,560
your trust model is enforceable.
1060
00:36:30,560 –> 00:36:32,880
Your app estate is compatible with revocation
1061
00:36:32,880 –> 00:36:34,760
and your exception culture is governed.
1062
00:36:34,760 –> 00:36:36,480
If you can’t revoke trust quickly,
1063
00:36:36,480 –> 00:36:37,760
you don’t have zero trust.
1064
00:36:37,760 –> 00:36:39,880
You have conditional chaos with nicer branding.
1065
00:36:39,880 –> 00:36:42,520
Why adding controls often slows the business.
1066
00:36:42,520 –> 00:36:45,000
Now here’s the part leaders feel in their bones.
1067
00:36:45,000 –> 00:36:47,840
Every time security improves, the business feels slower,
1068
00:36:47,840 –> 00:36:50,320
more prompts, more tickets, more waiting,
1069
00:36:50,320 –> 00:36:52,720
more people saying, “I can’t do my job.”
1070
00:36:52,720 –> 00:36:54,360
And then the predictable conclusion,
1071
00:36:54,360 –> 00:36:56,520
security is the department of no.
1072
00:36:56,520 –> 00:36:58,520
That conclusion is convenient, it’s also wrong.
1073
00:36:58,520 –> 00:37:00,920
The system is doing exactly what it was designed to do.
1074
00:37:00,920 –> 00:37:04,000
Most organizations add controls the way they add speed bumps,
1075
00:37:04,000 –> 00:37:07,040
reactively, locally, and without redesigning the road.
1076
00:37:07,040 –> 00:37:09,480
A fishing incident happens so MFA prompts increase.
1077
00:37:09,480 –> 00:37:12,040
A data leak happens so downloads get blocked
1078
00:37:12,040 –> 00:37:13,440
and audit finding appears.
1079
00:37:13,440 –> 00:37:15,720
So an approval step gets inserted.
1080
00:37:15,720 –> 00:37:17,080
None of these are irrational.
1081
00:37:17,080 –> 00:37:19,760
But stack together, they create a security program
1082
00:37:19,760 –> 00:37:21,200
that behaves like a queue.
1083
00:37:21,200 –> 00:37:23,040
Cue’s create latency.
1084
00:37:23,040 –> 00:37:25,440
Latency creates workarounds.
1085
00:37:25,440 –> 00:37:27,440
This is where the real failure happens.
1086
00:37:27,440 –> 00:37:29,840
The business doesn’t break security because it’s malicious.
1087
00:37:29,840 –> 00:37:32,160
It roots around security because security behaves
1088
00:37:32,160 –> 00:37:34,400
like an obstacle course bolted onto workflows
1089
00:37:34,400 –> 00:37:35,560
that were never redesigned.
1090
00:37:35,560 –> 00:37:37,720
People will always optimize for outcomes.
1091
00:37:37,720 –> 00:37:39,040
If the system blocks outcomes,
1092
00:37:39,040 –> 00:37:40,960
people will find alternate pathways.
1093
00:37:40,960 –> 00:37:43,280
And the alternate pathways are never the safe ones.
1094
00:37:43,280 –> 00:37:45,920
This is also why security teams are stuck in a losing pattern.
1095
00:37:45,920 –> 00:37:48,040
They add a control, the business adapts,
1096
00:37:48,040 –> 00:37:51,080
exceptions multiply, the control loses force.
1097
00:37:51,080 –> 00:37:54,080
The dashboard stays green because the control exists.
1098
00:37:54,080 –> 00:37:57,320
But the organization is now operating on a shadow model.
1099
00:37:57,320 –> 00:38:00,240
What the policies say versus what people actually do
1100
00:38:00,240 –> 00:38:02,240
to get work done, that distinction matters
1101
00:38:02,240 –> 00:38:03,960
because leadership often measures security
1102
00:38:03,960 –> 00:38:05,160
by visible friction.
1103
00:38:05,160 –> 00:38:07,040
Look, we’re blocking risky behavior.
1104
00:38:07,040 –> 00:38:08,720
Meanwhile, the most dangerous behaviors
1105
00:38:08,720 –> 00:38:10,400
are now happening invisibly.
1106
00:38:10,400 –> 00:38:13,120
Shared admin access because approvals are too slow,
1107
00:38:13,120 –> 00:38:15,680
unsanctioned SaaS because procurement takes months,
1108
00:38:15,680 –> 00:38:18,880
personal devices because corporate enrollment is painful,
1109
00:38:18,880 –> 00:38:21,640
or OAuth app consent because it’s faster
1110
00:38:21,640 –> 00:38:23,560
than requesting integration support.
1111
00:38:23,560 –> 00:38:25,320
Security didn’t prevent risk.
1112
00:38:25,320 –> 00:38:26,480
It displaced it.
1113
00:38:26,480 –> 00:38:28,600
This is what happens when controls aren’t embedded
1114
00:38:28,600 –> 00:38:29,720
in the way work is done.
1115
00:38:29,720 –> 00:38:31,160
They become after the fact checkpoints
1116
00:38:31,160 –> 00:38:34,040
and checkpoints create backlogs, backlogs create pressure.
1117
00:38:34,040 –> 00:38:35,240
Pressure creates bypass.
1118
00:38:35,240 –> 00:38:37,440
Over time, you don’t get higher security.
1119
00:38:37,440 –> 00:38:40,480
You get conditional compliance, people comply when it’s easy
1120
00:38:40,480 –> 00:38:41,840
and evade when it’s hard.
1121
00:38:41,840 –> 00:38:43,440
This is also why just add more approvals
1122
00:38:43,440 –> 00:38:45,040
is such a dangerous reflex.
1123
00:38:45,040 –> 00:38:46,840
Approvals feel like governance, but approvals
1124
00:38:46,840 –> 00:38:47,880
are just decision gates.
1125
00:38:47,880 –> 00:38:50,840
If those gates are slow, inconsistent, or unclear,
1126
00:38:50,840 –> 00:38:53,600
you’ve traded technical risk for operational risk.
1127
00:38:53,600 –> 00:38:55,560
Now the business can’t execute quickly
1128
00:38:55,560 –> 00:38:57,360
and when the business can’t execute quickly,
1129
00:38:57,360 –> 00:38:59,840
the business creates its own execution layer.
1130
00:38:59,840 –> 00:39:02,000
That is shadowite and it is not a moral problem.
1131
00:39:02,000 –> 00:39:03,200
It is a systems outcome.
1132
00:39:03,200 –> 00:39:04,440
So why does this keep happening?
1133
00:39:04,440 –> 00:39:07,240
Because controls are being deployed as independent artifacts
1134
00:39:07,240 –> 00:39:09,200
instead of as parts of a trust system,
1135
00:39:09,200 –> 00:39:11,560
each control is optimized for its own purpose.
1136
00:39:11,560 –> 00:39:13,520
The combined effect is rarely modeled.
1137
00:39:13,520 –> 00:39:15,640
Nobody asks the core question,
1138
00:39:15,640 –> 00:39:18,080
what decision latency are we introducing
1139
00:39:18,080 –> 00:39:20,800
and what behaviors will that latency incentivize?
1140
00:39:20,800 –> 00:39:23,480
Security teams also get trapped by the wrong success metric.
1141
00:39:23,480 –> 00:39:26,440
If success is reduced incidents, teams will add friction.
1142
00:39:26,440 –> 00:39:27,960
A friction reduces some incidents,
1143
00:39:27,960 –> 00:39:30,160
but friction also creates bypass and resentment
1144
00:39:30,160 –> 00:39:31,920
which creates new incidents later.
1145
00:39:31,920 –> 00:39:34,600
It’s the same pattern as poorly designed compliance.
1146
00:39:34,600 –> 00:39:37,080
It produces paperwork, not capability.
1147
00:39:37,080 –> 00:39:38,760
The better metric is still MTTR
1148
00:39:38,760 –> 00:39:40,360
because when you measure MTTR,
1149
00:39:40,360 –> 00:39:42,080
you get forced to remove friction
1150
00:39:42,080 –> 00:39:43,560
that doesn’t produce containment.
1151
00:39:43,560 –> 00:39:46,440
You start asking which steps are genuinely necessary
1152
00:39:46,440 –> 00:39:49,840
and which steps exist because we don’t trust our own systems.
1153
00:39:49,840 –> 00:39:51,200
Which checks can be automated
1154
00:39:51,200 –> 00:39:52,360
and which require humans
1155
00:39:52,360 –> 00:39:54,440
because the decision is truly business sensitive.
1156
00:39:54,440 –> 00:39:56,200
That’s where automation matters, not as a gadget
1157
00:39:56,200 –> 00:39:58,400
but as a way to restore human decision time.
1158
00:39:58,400 –> 00:40:00,600
Automation doesn’t eliminate accountability.
1159
00:40:00,600 –> 00:40:02,520
It collapses the boring latency,
1160
00:40:02,520 –> 00:40:06,000
enrichment, correlation, ticket creation, routing
1161
00:40:06,000 –> 00:40:07,760
and reversible containment actions
1162
00:40:07,760 –> 00:40:10,280
that should not require a human to copy paste data
1163
00:40:10,280 –> 00:40:12,320
across tools at 2AM.
1164
00:40:12,320 –> 00:40:14,920
The human should be deciding intent and impact.
1165
00:40:14,920 –> 00:40:17,640
The system should be executing repeatable mechanics
1166
00:40:17,640 –> 00:40:19,480
and the reason leaders should care is simple.
1167
00:40:19,480 –> 00:40:22,880
When you make security slow, you make the business unsafe.
1168
00:40:22,880 –> 00:40:24,360
Not because users are careless
1169
00:40:24,360 –> 00:40:27,600
because the system taught them that speed requires evasion.
1170
00:40:27,600 –> 00:40:29,600
So the problem is not too many controls.
1171
00:40:29,600 –> 00:40:32,400
The problem is controls added without redesigning workflows
1172
00:40:32,400 –> 00:40:33,800
into safe autonomy.
1173
00:40:33,800 –> 00:40:35,760
Controls that don’t create safe autonomy
1174
00:40:35,760 –> 00:40:37,720
will always be experienced as friction
1175
00:40:37,720 –> 00:40:38,840
and friction is not neutral.
1176
00:40:38,840 –> 00:40:40,280
It is an entropy generator.
1177
00:40:40,280 –> 00:40:41,600
If you want speed and security,
1178
00:40:41,600 –> 00:40:43,280
you don’t negotiate with human nature.
1179
00:40:43,280 –> 00:40:44,480
You redesign the system
1180
00:40:44,480 –> 00:40:47,040
so the safe path is the fast path.
1181
00:40:47,040 –> 00:40:49,040
Human behavior is not the weak link.
1182
00:40:49,040 –> 00:40:52,160
Design is human behavior isn’t the weak link.
1183
00:40:52,160 –> 00:40:52,920
That’s the story.
1184
00:40:52,920 –> 00:40:55,240
Security tells itself when it can’t admit the system
1185
00:40:55,240 –> 00:40:57,960
is poorly designed, people don’t wake up wanting to create risk.
1186
00:40:57,960 –> 00:40:59,680
They wake up wanting to finish work,
1187
00:40:59,680 –> 00:41:02,240
ship the release, close the quarter, onboard the partner,
1188
00:41:02,240 –> 00:41:04,800
respond to the customer, unblock the executive.
1189
00:41:04,800 –> 00:41:06,160
When security makes that harder,
1190
00:41:06,160 –> 00:41:07,800
people don’t ignore policy.
1191
00:41:07,800 –> 00:41:08,960
They optimize around it.
1192
00:41:08,960 –> 00:41:09,880
That’s not negligence.
1193
00:41:09,880 –> 00:41:12,600
That’s predictable behavior inside a constrained system.
1194
00:41:12,600 –> 00:41:15,040
This is why blaming users is such a comfortable mistake.
1195
00:41:15,040 –> 00:41:17,400
It turns a design failure into a training problem.
1196
00:41:17,400 –> 00:41:20,160
It converts architecture into morality.
1197
00:41:20,160 –> 00:41:22,120
And it lets leadership believe the solution
1198
00:41:22,120 –> 00:41:23,520
is another awareness module
1199
00:41:23,520 –> 00:41:25,720
instead of fixing the way access workflow
1200
00:41:25,720 –> 00:41:27,320
and response actually function.
1201
00:41:27,320 –> 00:41:30,040
The system creates the behavior, always.
1202
00:41:30,040 –> 00:41:32,800
If privileged access elevation takes two days,
1203
00:41:32,800 –> 00:41:35,000
people will find a standing admin account.
1204
00:41:35,000 –> 00:41:36,720
If app onboarding takes six weeks,
1205
00:41:36,720 –> 00:41:39,640
teams will use personal tokens and unsanctioned CES.
1206
00:41:39,640 –> 00:41:41,880
If approvals require three different managers,
1207
00:41:41,880 –> 00:41:44,280
someone will share credentials temporarily
1208
00:41:44,280 –> 00:41:45,960
and temporary will become permanent
1209
00:41:45,960 –> 00:41:48,560
because the business still needs to operate tomorrow.
1210
00:41:48,560 –> 00:41:50,760
Your policies don’t fail because people are bad.
1211
00:41:50,760 –> 00:41:52,640
They fail because the path of least resistance
1212
00:41:52,640 –> 00:41:53,760
is the unsafe path.
1213
00:41:53,760 –> 00:41:57,000
This is where workarounds stop being a human failure
1214
00:41:57,000 –> 00:41:58,680
and start being system telemetry.
1215
00:41:58,680 –> 00:41:59,840
A workaround is a signal
1216
00:41:59,840 –> 00:42:02,200
that the intended workflow doesn’t match reality.
1217
00:42:02,200 –> 00:42:03,760
It’s evidence that the control plane
1218
00:42:03,760 –> 00:42:06,280
isn’t aligned with how work actually happens.
1219
00:42:06,280 –> 00:42:09,280
And when security treats workarounds as insubordination,
1220
00:42:09,280 –> 00:42:10,880
it guarantees two outcomes.
1221
00:42:10,880 –> 00:42:12,160
Workarounds go underground
1222
00:42:12,160 –> 00:42:13,960
and the organization loses visibility
1223
00:42:13,960 –> 00:42:15,800
into its true operating model.
1224
00:42:15,800 –> 00:42:18,000
Silent non-compliance is the default state
1225
00:42:18,000 –> 00:42:19,720
of mature bureaucracies.
1226
00:42:19,720 –> 00:42:21,800
The policy exists, the dashboard is green,
1227
00:42:21,800 –> 00:42:24,080
the audit passes, the behavior diverges anyway
1228
00:42:24,080 –> 00:42:25,800
because the system rewards throughput
1229
00:42:25,800 –> 00:42:27,360
more than it rewards adherents.
1230
00:42:27,360 –> 00:42:29,760
Meanwhile, the organization tells itself a story.
1231
00:42:29,760 –> 00:42:31,640
We’re secure because we have controls.
1232
00:42:31,640 –> 00:42:33,040
The attacker enjoys that story.
1233
00:42:33,040 –> 00:42:35,760
This is also why security fatigue is not a user problem.
1234
00:42:35,760 –> 00:42:36,720
It’s a design problem.
1235
00:42:36,720 –> 00:42:38,240
If MFA prompts a constant,
1236
00:42:38,240 –> 00:42:40,440
users learn to approve without reading.
1237
00:42:40,440 –> 00:42:42,200
If warning banners appear on every email,
1238
00:42:42,200 –> 00:42:43,600
people stop seeing them.
1239
00:42:43,600 –> 00:42:45,680
If every request is treated like a crisis,
1240
00:42:45,680 –> 00:42:46,920
the workforce becomes numb.
1241
00:42:46,920 –> 00:42:48,360
The control becomes noise.
1242
00:42:48,360 –> 00:42:50,880
And noise is not protection, it’s attacks.
1243
00:42:50,880 –> 00:42:53,200
A well-designed system doesn’t require heroic attention.
1244
00:42:53,200 –> 00:42:55,840
It assumes attention is scarce and builds guardrails
1245
00:42:55,840 –> 00:42:58,640
that work even when people are tired, rushed or distracted.
1246
00:42:58,640 –> 00:43:01,360
That’s not cynical, that’s operational realism.
1247
00:43:01,360 –> 00:43:03,720
So when organizations say people are the weakest link,
1248
00:43:03,720 –> 00:43:05,320
they’re usually describing a mismatch
1249
00:43:05,320 –> 00:43:07,920
between two speeds, the speed of business
1250
00:43:07,920 –> 00:43:09,440
and the speed of security.
1251
00:43:09,440 –> 00:43:11,400
Security responds by slowing the business
1252
00:43:11,400 –> 00:43:13,600
and the business responds by rooting around security.
1253
00:43:13,600 –> 00:43:14,440
That is the loop.
1254
00:43:14,440 –> 00:43:16,440
It repeats until either leadership intervenes
1255
00:43:16,440 –> 00:43:17,720
or the attacker does.
1256
00:43:17,720 –> 00:43:19,520
And AI makes the mismatch sharper.
1257
00:43:19,520 –> 00:43:21,040
AI accelerates work.
1258
00:43:21,040 –> 00:43:23,800
Drafting, coding, summarizing, automating, integrating,
1259
00:43:23,800 –> 00:43:26,440
the organization’s appetite for speed increases.
1260
00:43:26,440 –> 00:43:29,000
If security remains a manual gate, tickets, approvals,
1261
00:43:29,000 –> 00:43:32,000
reviews done quarterly, then security becomes the bottleneck
1262
00:43:32,000 –> 00:43:33,400
that the business will circumvent,
1263
00:43:33,400 –> 00:43:35,040
not because it wants to, because it has to.
1264
00:43:35,040 –> 00:43:37,480
This is why secure by design is not a slogan.
1265
00:43:37,480 –> 00:43:39,400
It’s a requirement for maintaining control
1266
00:43:39,400 –> 00:43:41,400
when the systems throughput doubles.
1267
00:43:41,400 –> 00:43:44,160
Design is how you scale trust without scaling friction.
1268
00:43:44,160 –> 00:43:47,360
Design means the safest path is also the fastest path.
1269
00:43:47,360 –> 00:43:49,520
Users shouldn’t need to choose between compliance
1270
00:43:49,520 –> 00:43:50,600
and productivity.
1271
00:43:50,600 –> 00:43:52,360
If they do, they will choose productivity
1272
00:43:52,360 –> 00:43:54,960
because that’s what the organization actually rewards.
1273
00:43:54,960 –> 00:43:57,120
So what does design look like in this context?
1274
00:43:57,120 –> 00:43:58,920
It looks like making identity governance
1275
00:43:58,920 –> 00:44:01,640
and privileged access not only strict but usable.
1276
00:44:01,640 –> 00:44:03,200
It looks like time-bound access
1277
00:44:03,200 –> 00:44:05,280
that can be requested and approved quickly
1278
00:44:05,280 –> 00:44:06,920
with clear accountability.
1279
00:44:06,920 –> 00:44:09,360
It looks like conditional access policies
1280
00:44:09,360 –> 00:44:11,000
that are consistent and predictable,
1281
00:44:11,000 –> 00:44:12,600
not a maze of exceptions.
1282
00:44:12,600 –> 00:44:14,480
It looks like continuous session revocation,
1283
00:44:14,480 –> 00:44:16,880
so compromised access doesn’t linger.
1284
00:44:16,880 –> 00:44:18,320
It looks like response workflows
1285
00:44:18,320 –> 00:44:20,040
that trigger actions automatically.
1286
00:44:20,040 –> 00:44:21,920
So humans spend time deciding impact,
1287
00:44:21,920 –> 00:44:23,920
not moving data between portals.
1288
00:44:23,920 –> 00:44:26,600
And it looks like explicitly designing for failure,
1289
00:44:26,600 –> 00:44:28,720
assume compromise, reduce blast radius
1290
00:44:28,720 –> 00:44:30,160
and make containment normal.
1291
00:44:30,160 –> 00:44:32,680
If those properties exist, humans don’t need to be perfect.
1292
00:44:32,680 –> 00:44:34,840
The system catches them, the system constrains them,
1293
00:44:34,840 –> 00:44:37,240
the system corrects quickly when reality changes.
1294
00:44:37,240 –> 00:44:39,720
If those properties don’t exist, humans are asked
1295
00:44:39,720 –> 00:44:41,480
to compensate for architectural gaps
1296
00:44:41,480 –> 00:44:42,800
with attention and discipline.
1297
00:44:42,800 –> 00:44:43,800
That is not a strategy.
1298
00:44:43,800 –> 00:44:44,800
That is a fragile wish.
1299
00:44:44,800 –> 00:44:46,640
So stop saying the user is the problem.
1300
00:44:46,640 –> 00:44:48,040
The user is the environment
1301
00:44:48,040 –> 00:44:51,840
and your environment behaves exactly as you designed it to behave.
1302
00:44:51,840 –> 00:44:52,960
Safe autonomy.
1303
00:44:52,960 –> 00:44:55,320
The real objective of modern security.
1304
00:44:55,320 –> 00:44:57,880
Safe autonomy is the objective leaders actually want
1305
00:44:57,880 –> 00:44:59,400
even if they keep funding the opposite.
1306
00:44:59,400 –> 00:45:00,760
They want teams to move fast
1307
00:45:00,760 –> 00:45:02,720
without creating new existential risks.
1308
00:45:02,720 –> 00:45:05,040
They want developers shipping, finance approving,
1309
00:45:05,040 –> 00:45:06,760
sales sharing and operations running
1310
00:45:06,760 –> 00:45:09,080
without every meaningful action turning into a security
1311
00:45:09,080 –> 00:45:11,080
exception or a SOC incident.
1312
00:45:11,080 –> 00:45:13,400
And they want that speed to be reliable,
1313
00:45:13,400 –> 00:45:16,320
not dependent on which senior engineer happens to be awake.
1314
00:45:16,320 –> 00:45:18,640
Security that cannot produce safe autonomy
1315
00:45:18,640 –> 00:45:20,160
becomes a break you never tuned.
1316
00:45:20,160 –> 00:45:22,720
It still slows the car, but it doesn’t prevent the crash.
1317
00:45:22,720 –> 00:45:25,240
It just makes everyone angry on the way there.
1318
00:45:25,240 –> 00:45:26,640
So define it cleanly.
1319
00:45:26,640 –> 00:45:29,160
Autonomy means people and systems can act
1320
00:45:29,160 –> 00:45:31,920
without waiting for a central authority on every decision.
1321
00:45:31,920 –> 00:45:33,880
It means access is available when needed.
1322
00:45:33,880 –> 00:45:35,440
It means change is possible.
1323
00:45:35,440 –> 00:45:37,240
It means the organization can execute.
1324
00:45:37,240 –> 00:45:40,440
But autonomy without guardrails is just distributed risk creation.
1325
00:45:40,440 –> 00:45:42,920
Safe autonomy is autonomy with constraints
1326
00:45:42,920 –> 00:45:45,760
that are dynamic, enforceable and fast.
1327
00:45:45,760 –> 00:45:48,160
Dynamic means the control plane uses context,
1328
00:45:48,160 –> 00:45:49,640
not static assumptions.
1329
00:45:49,640 –> 00:45:53,320
Identity and device posture, risk signals, session state,
1330
00:45:53,320 –> 00:45:56,360
resource sensitivity, those inputs shape the decision
1331
00:45:56,360 –> 00:45:57,200
continuously.
1332
00:45:57,200 –> 00:45:59,280
If the context changes, the decision changes.
1333
00:45:59,280 –> 00:46:00,120
That’s not a feature.
1334
00:46:00,120 –> 00:46:02,160
That’s the only model that survives modern SAS
1335
00:46:02,160 –> 00:46:03,560
and AI accelerated work.
1336
00:46:03,560 –> 00:46:06,400
Enforceable means the decision isn’t just policy text.
1337
00:46:06,400 –> 00:46:08,600
It is honored by the system’s people actually use.
1338
00:46:08,600 –> 00:46:10,600
If a privileged role requires elevation,
1339
00:46:10,600 –> 00:46:13,120
the elevation path has to exist and work.
1340
00:46:13,120 –> 00:46:15,520
If a session is revoked, the app has to comply.
1341
00:46:15,520 –> 00:46:17,720
If an access package expires, the access
1342
00:46:17,720 –> 00:46:19,560
must disappear without negotiation.
1343
00:46:19,560 –> 00:46:20,960
Otherwise, you don’t have governance.
1344
00:46:20,960 –> 00:46:22,800
You have aspiration.
1345
00:46:22,800 –> 00:46:25,600
Fast means the safe path is the easy path.
1346
00:46:25,600 –> 00:46:27,800
This is the mistake security keeps making.
1347
00:46:27,800 –> 00:46:30,320
It builds a safe path that is correct but slow.
1348
00:46:30,320 –> 00:46:32,920
Then it acts surprised when the business roots around it.
1349
00:46:32,920 –> 00:46:35,240
If you want safe autonomy, your control mechanisms
1350
00:46:35,240 –> 00:46:36,960
must operate at business speed.
1351
00:46:36,960 –> 00:46:39,680
Access requests must be fulfilable without weeks of tickets.
1352
00:46:39,680 –> 00:46:42,280
Privilege elevation must be minutes, not days.
1353
00:46:42,280 –> 00:46:46,160
Revocation must be near real time, not when the token times out.
1354
00:46:46,160 –> 00:46:48,280
Response must be orchestrated, not tribal.
1355
00:46:48,280 –> 00:46:50,360
This is also where least privilege stops
1356
00:46:50,360 –> 00:46:53,280
being a purity test and becomes a design pattern.
1357
00:46:53,280 –> 00:46:55,040
These privilege in a safe autonomy model
1358
00:46:55,040 –> 00:46:57,560
is not, you get less access forever.
1359
00:46:57,560 –> 00:47:00,560
It’s, you get exactly what you need, exactly when you need it,
1360
00:47:00,560 –> 00:47:02,520
and it disappears when you don’t.
1361
00:47:02,520 –> 00:47:05,240
Time is the missing dimension in most access models.
1362
00:47:05,240 –> 00:47:07,320
At time and the whole system becomes easier
1363
00:47:07,320 –> 00:47:09,280
to secure without slowing work.
1364
00:47:09,280 –> 00:47:11,120
Remove time and privilege is accumulate
1365
00:47:11,120 –> 00:47:13,600
until your environment is permanently overauthorized
1366
00:47:13,600 –> 00:47:15,600
and autonomy doesn’t just apply to humans.
1367
00:47:15,600 –> 00:47:17,960
Work loads, connectors, service principles
1368
00:47:17,960 –> 00:47:21,560
and increasingly AI agents are acting on behalf of the business.
1369
00:47:21,560 –> 00:47:23,280
If those identities aren’t governed,
1370
00:47:23,280 –> 00:47:26,560
scoped permissions, explicit ownership, rotation, and monitoring,
1371
00:47:26,560 –> 00:47:27,840
you don’t have autonomy.
1372
00:47:27,840 –> 00:47:29,280
You have unattended authority.
1373
00:47:29,280 –> 00:47:31,200
That is the fastest way to create a breach
1374
00:47:31,200 –> 00:47:33,720
with no obvious user mistake to blame.
1375
00:47:33,720 –> 00:47:36,120
So safe autonomy requires two loops
1376
00:47:36,120 –> 00:47:38,320
to be built into the platform experience.
1377
00:47:38,320 –> 00:47:41,640
Loop one is the trust loop signals to decision to enforcement
1378
00:47:41,640 –> 00:47:43,080
continuously.
1379
00:47:43,080 –> 00:47:45,080
This is where entra governance, conditional access,
1380
00:47:45,080 –> 00:47:46,440
and CAE live.
1381
00:47:46,440 –> 00:47:48,240
It’s where trust is earned, constrained,
1382
00:47:48,240 –> 00:47:49,760
and revoked without drama.
1383
00:47:49,760 –> 00:47:53,280
Loop two is the response loop, detection to action to recovery.
1384
00:47:53,280 –> 00:47:56,040
Because safe autonomy doesn’t mean nothing goes wrong.
1385
00:47:56,040 –> 00:47:57,280
It means when something goes wrong,
1386
00:47:57,280 –> 00:47:58,800
the system contains it fast enough
1387
00:47:58,800 –> 00:48:00,320
that the business can keep moving.
1388
00:48:00,320 –> 00:48:01,840
This is the part leaders often miss.
1389
00:48:01,840 –> 00:48:04,720
Autonomy increases the number of actions taken without oversight,
1390
00:48:04,720 –> 00:48:06,640
so the system must be able to correct quickly
1391
00:48:06,640 –> 00:48:08,840
when an action turns out to be risky.
1392
00:48:08,840 –> 00:48:11,560
The faster you can revoke, isolate, and remediate,
1393
00:48:11,560 –> 00:48:13,840
the more autonomy you can safely allow.
1394
00:48:13,840 –> 00:48:15,480
That’s the trade.
1395
00:48:15,480 –> 00:48:16,960
If your response loop is slow,
1396
00:48:16,960 –> 00:48:19,480
you will inevitably compensate by reducing autonomy,
1397
00:48:19,480 –> 00:48:23,000
more approvals, more gates, more centralized control.
1398
00:48:23,000 –> 00:48:24,400
Not because it’s philosophically better,
1399
00:48:24,400 –> 00:48:26,440
but because it’s the only way to reduce blast radius
1400
00:48:26,440 –> 00:48:27,840
when you can’t contain quickly.
1401
00:48:27,840 –> 00:48:30,480
That is the real reason security slows the business.
1402
00:48:30,480 –> 00:48:32,360
It is compensating for weak revocation
1403
00:48:32,360 –> 00:48:34,320
and weak response with human friction.
1404
00:48:34,320 –> 00:48:36,040
Safe autonomy flips that equation.
1405
00:48:36,040 –> 00:48:38,880
It says, invest in control, plane clarity, and response speed,
1406
00:48:38,880 –> 00:48:40,960
so the organization can decentralize execution
1407
00:48:40,960 –> 00:48:42,280
without decentralizing risk.
1408
00:48:42,280 –> 00:48:43,640
And the executive level marker
1409
00:48:43,640 –> 00:48:45,800
that you’re building it correctly is simple,
1410
00:48:45,800 –> 00:48:48,840
fewer emergency exceptions, fewer escalations,
1411
00:48:48,840 –> 00:48:52,000
fewer security needs to approve this right now moments.
1412
00:48:52,000 –> 00:48:53,200
Not because you blocked more,
1413
00:48:53,200 –> 00:48:56,200
because you designed the trusted path to be the default path.
1414
00:48:56,200 –> 00:48:59,680
When safe autonomy exists, security stops being a queue.
1415
00:48:59,680 –> 00:49:02,120
It becomes an operating property of the business.
1416
00:49:02,120 –> 00:49:05,200
Detection without response is expensive telemetry.
1417
00:49:05,200 –> 00:49:07,640
Once you accept safe autonomy as the objective,
1418
00:49:07,640 –> 00:49:09,320
the next failure becomes obvious.
1419
00:49:09,320 –> 00:49:12,000
Most security programs are built like observatories.
1420
00:49:12,000 –> 00:49:13,840
They collect signals, they classify events,
1421
00:49:13,840 –> 00:49:16,080
they generate alerts, then they stop.
1422
00:49:16,080 –> 00:49:17,440
And then everyone acts surprised
1423
00:49:17,440 –> 00:49:19,880
when incidents still turn into business outages.
1424
00:49:19,880 –> 00:49:21,880
Detection by itself doesn’t reduce impact,
1425
00:49:21,880 –> 00:49:23,280
it documents impact.
1426
00:49:23,280 –> 00:49:24,320
That distinction matters
1427
00:49:24,320 –> 00:49:26,720
because dashboards are emotionally comforting.
1428
00:49:26,720 –> 00:49:28,800
A high severity alert feels like progress,
1429
00:49:28,800 –> 00:49:32,040
a unified incident view feels like control.
1430
00:49:32,040 –> 00:49:33,680
But none of it changes the outcome
1431
00:49:33,680 –> 00:49:36,560
if the organization can’t convert signal into action
1432
00:49:36,560 –> 00:49:37,760
fast enough to matter.
1433
00:49:37,760 –> 00:49:40,720
This is why so many well-secured organizations still fail.
1434
00:49:40,720 –> 00:49:42,360
Not because they lack detection,
1435
00:49:42,360 –> 00:49:45,160
because they lack decision speed and enforcement speed.
1436
00:49:45,160 –> 00:49:47,920
You can think of response as a pipeline with four stages.
1437
00:49:47,920 –> 00:49:50,600
Detect, decide, enforce, recover.
1438
00:49:50,600 –> 00:49:53,520
Most organizations over-invest in the first stage,
1439
00:49:53,520 –> 00:49:55,440
under-invest in the second and third
1440
00:49:55,440 –> 00:49:57,480
and treat the fourth as an annual exercise.
1441
00:49:57,480 –> 00:49:59,120
So the system behaves like a camera,
1442
00:49:59,120 –> 00:50:00,280
not like a control system.
1443
00:50:00,280 –> 00:50:02,080
A camera is valuable after the fact.
1444
00:50:02,080 –> 00:50:03,880
It tells you what happened, it can help you learn.
1445
00:50:03,880 –> 00:50:05,800
But it doesn’t stop the car from hitting the wall.
1446
00:50:05,800 –> 00:50:07,240
For that, you need brakes.
1447
00:50:07,240 –> 00:50:09,440
In security terms, you need orchestration.
1448
00:50:09,440 –> 00:50:12,280
Consistent, auditable actions that reduce blast radius quickly.
1449
00:50:12,280 –> 00:50:15,240
The core issue is that response is usually human middleware
1450
00:50:15,240 –> 00:50:16,200
and alert fires.
1451
00:50:16,200 –> 00:50:17,160
It lands in a queue.
1452
00:50:17,160 –> 00:50:20,280
Someone triages it, they copy information from one portal to another,
1453
00:50:20,280 –> 00:50:22,440
they ask an app owner what the identity does.
1454
00:50:22,440 –> 00:50:24,480
They ask I’d to isolate a device.
1455
00:50:24,480 –> 00:50:27,160
They ask identity administrators to disable an account.
1456
00:50:27,160 –> 00:50:29,360
They ask messaging teams to purge an email.
1457
00:50:29,360 –> 00:50:31,360
They ask someone else to reset credentials.
1458
00:50:31,360 –> 00:50:33,080
Each step is rational in isolation.
1459
00:50:33,080 –> 00:50:34,680
Collectively, it’s a latency engine.
1460
00:50:34,680 –> 00:50:36,400
An attacker’s exploit latency.
1461
00:50:36,400 –> 00:50:37,480
They don’t need to be brilliant.
1462
00:50:37,480 –> 00:50:38,520
They need you to be slow.
1463
00:50:38,520 –> 00:50:41,400
This is where leadership gets trapped in the wrong conversation.
1464
00:50:41,400 –> 00:50:43,360
They ask, do we have a sock?
1465
00:50:43,360 –> 00:50:45,000
They ask, are we monitoring?
1466
00:50:45,000 –> 00:50:47,040
They ask, how many alerts did we close out?
1467
00:50:47,040 –> 00:50:48,320
Those are activity metrics.
1468
00:50:48,320 –> 00:50:50,680
They don’t tell you whether the organization can contain
1469
00:50:50,680 –> 00:50:52,840
an identity-driven incident in business time.
1470
00:50:52,840 –> 00:50:55,160
The question that matters is, how long does it take
1471
00:50:55,160 –> 00:50:57,720
from first signal to first meaningful containment?
1472
00:50:57,720 –> 00:51:00,600
Not to a ticket, not to a slack thread, to containment?
1473
00:51:00,600 –> 00:51:03,880
Because that’s the moment you stop paying compounding interest on the breach.
1474
00:51:03,880 –> 00:51:07,160
Now, the uncomfortable part, detection without response is not neutral.
1475
00:51:07,160 –> 00:51:07,920
It’s expensive.
1476
00:51:07,920 –> 00:51:09,160
It consumes licensing.
1477
00:51:09,160 –> 00:51:10,240
It consumes storage.
1478
00:51:10,240 –> 00:51:11,720
It consumes analyst time.
1479
00:51:11,720 –> 00:51:13,560
It consumes executive attention.
1480
00:51:13,560 –> 00:51:15,520
And when it’s not connected to action,
1481
00:51:15,520 –> 00:51:17,800
it creates a worse outcome than ignorance.
1482
00:51:17,800 –> 00:51:22,400
A alert fatigue, where the organization learns to ignore its own warning systems.
1483
00:51:22,400 –> 00:51:24,840
Once that happens, you have telemetry theatre.
1484
00:51:24,840 –> 00:51:25,840
Lots of data.
1485
00:51:25,840 –> 00:51:27,120
Little control.
1486
00:51:27,120 –> 00:51:30,160
This is also why more sensors is a weak investment posture.
1487
00:51:30,160 –> 00:51:32,680
If you add more signals, without fixing the response loop,
1488
00:51:32,680 –> 00:51:33,600
you increase noise.
1489
00:51:33,600 –> 00:51:34,920
Noise reduces trust.
1490
00:51:34,920 –> 00:51:35,840
Reduced trust.
1491
00:51:35,840 –> 00:51:37,040
Slows decisions.
1492
00:51:37,040 –> 00:51:38,600
Slower decisions increase impact.
1493
00:51:38,600 –> 00:51:39,280
That’s the loop.
1494
00:51:39,280 –> 00:51:42,360
It’s the security equivalent of adding more gauges to a cockpit
1495
00:51:42,360 –> 00:51:44,880
while leaving the control surfaces unresponsive.
1496
00:51:44,880 –> 00:51:46,880
So what does a good response loop look like
1497
00:51:46,880 –> 00:51:48,720
without turning this into a tool demo?
1498
00:51:48,720 –> 00:51:52,320
It looks like the organization pre-defining a small set of reversible actions
1499
00:51:52,320 –> 00:51:55,360
that can happen fast with clear authority and clear logging.
1500
00:51:55,360 –> 00:51:58,320
If an identity exhibits a high confidence compromise signal,
1501
00:51:58,320 –> 00:52:02,120
the system can, revoke sessions, require reauthentication,
1502
00:52:02,120 –> 00:52:05,160
block risky sign-ins, disable the account,
1503
00:52:05,160 –> 00:52:08,240
remove standing privilege, quarantine a device,
1504
00:52:08,240 –> 00:52:11,360
suspend an OAuth app or route a case to the system owner
1505
00:52:11,360 –> 00:52:13,200
with context already attached.
1506
00:52:13,200 –> 00:52:14,640
Not all at once, not everywhere,
1507
00:52:14,640 –> 00:52:17,720
but as a designed set of bounded responses.
1508
00:52:17,720 –> 00:52:19,440
Bounded matters because leaders here
1509
00:52:19,440 –> 00:52:21,440
automation and picture chaos.
1510
00:52:21,440 –> 00:52:23,440
Accidental lockouts, business disruption,
1511
00:52:23,440 –> 00:52:25,720
the wrong account disabled at the wrong time.
1512
00:52:25,720 –> 00:52:29,040
That fear is rational when automation is built as an improvisation.
1513
00:52:29,040 –> 00:52:32,160
It becomes less rational when automation is built as policy.
1514
00:52:32,160 –> 00:52:34,960
Explicit triggers, reversible actions, audit trails,
1515
00:52:34,960 –> 00:52:37,320
and human approval where the blast radius is large.
1516
00:52:37,320 –> 00:52:41,320
That is how you turn response speed into a capability instead of a gamble.
1517
00:52:41,320 –> 00:52:43,800
And this ties directly back to identity as the control plane.
1518
00:52:43,800 –> 00:52:46,840
If your fastest containment actions live in identity,
1519
00:52:46,840 –> 00:52:49,640
session revocation, privilege reduction, access blocks,
1520
00:52:49,640 –> 00:52:51,440
then response becomes feasible.
1521
00:52:51,440 –> 00:52:54,000
If your containment requires days of coordination
1522
00:52:54,000 –> 00:52:57,480
across disconnected teams, response becomes aspirational.
1523
00:52:57,480 –> 00:52:58,880
So the takeaway is blunt.
1524
00:52:58,880 –> 00:53:00,960
You don’t buy resilience with telemetry.
1525
00:53:00,960 –> 00:53:03,560
You buy resilience by funding the conversion layer
1526
00:53:03,560 –> 00:53:05,000
between signal and action.
1527
00:53:05,000 –> 00:53:06,800
And that conversion layer is not glamorous.
1528
00:53:06,800 –> 00:53:09,200
It’s workflow, it’s ownership, it’s automation,
1529
00:53:09,200 –> 00:53:10,680
it’s rehearsed authority.
1530
00:53:10,680 –> 00:53:12,960
Without it, you don’t have a resilience program.
1531
00:53:12,960 –> 00:53:15,280
You have a very expensive record of how you lost.
1532
00:53:15,280 –> 00:53:18,760
Scenario 2, Microsoft Defender, ServiceNow Automation.
1533
00:53:18,760 –> 00:53:22,880
If identity is the control plane, and CAE is the revocation muscle,
1534
00:53:22,880 –> 00:53:25,640
then this scenario is the nervous system connection.
1535
00:53:25,640 –> 00:53:27,960
How signals become coordinated action
1536
00:53:27,960 –> 00:53:31,520
without turning your SOC into a human API.
1537
00:53:31,520 –> 00:53:34,640
Microsoft Defender gives you signals, ServiceNow gives you execution.
1538
00:53:34,640 –> 00:53:37,400
Most organizations own both categories of tooling,
1539
00:53:37,400 –> 00:53:39,240
but treat them like separate religions.
1540
00:53:39,240 –> 00:53:42,360
Security detects, IT operates, and the business weights.
1541
00:53:42,360 –> 00:53:44,280
That separation is where MTR is born.
1542
00:53:44,280 –> 00:53:46,080
Defender is already doing aggregation
1543
00:53:46,080 –> 00:53:49,440
across endpoint identity, email, SAS, and cloud activity.
1544
00:53:49,440 –> 00:53:53,120
It can correlate activity that looks unrelated in isolation,
1545
00:53:53,120 –> 00:53:56,000
a risky sign-in, a suspicious mailbox rule,
1546
00:53:56,000 –> 00:53:57,960
an endpoint alert and OAuth app consent,
1547
00:53:57,960 –> 00:53:59,800
a new admin role activation.
1548
00:53:59,800 –> 00:54:02,000
The value isn’t that any single alert exists.
1549
00:54:02,000 –> 00:54:04,640
The value is that the platform can form an incident story
1550
00:54:04,640 –> 00:54:07,320
without asking an analyst to manually stitch it together.
1551
00:54:07,320 –> 00:54:09,160
But correlation doesn’t contain anything.
1552
00:54:09,160 –> 00:54:10,840
Containment happens when the organization
1553
00:54:10,840 –> 00:54:14,280
executes a bounded set of actions fast with clear authority
1554
00:54:14,280 –> 00:54:17,840
and with an audit trail that survives the post-incident review.
1555
00:54:17,840 –> 00:54:20,640
That’s where ServiceNow becomes useful, not as a ticket factory,
1556
00:54:20,640 –> 00:54:23,800
as the system of action that codifies decisions, approvals,
1557
00:54:23,800 –> 00:54:25,840
handoffs, and remediation steps
1558
00:54:25,840 –> 00:54:27,520
in a way that is repeatable under stress.
1559
00:54:27,520 –> 00:54:30,400
The simple version is Defender detects and enriches service.
1560
00:54:30,400 –> 00:54:31,440
Now roots and governs.
1561
00:54:31,440 –> 00:54:33,960
Automation executes the first response steps.
1562
00:54:33,960 –> 00:54:37,000
Humans handle the exceptions and the irreversible decisions.
1563
00:54:37,000 –> 00:54:39,680
That’s the 1080-10 model in practice.
1564
00:54:39,680 –> 00:54:42,080
Without pretending the platform can replace judgment.
1565
00:54:42,080 –> 00:54:44,280
So what does good automation look like here?
1566
00:54:44,280 –> 00:54:46,400
It looks like defining a small number of playbooks
1567
00:54:46,400 –> 00:54:48,040
that are intentionally boring.
1568
00:54:48,040 –> 00:54:50,840
When Defender raises a high confidence identity incident,
1569
00:54:50,840 –> 00:54:53,360
the system can automatically create a ServiceNow Security
1570
00:54:53,360 –> 00:54:56,080
incident with the right context already attached.
1571
00:54:56,080 –> 00:55:00,600
Effected identity, impacted assets, correlated alerts, timestamps,
1572
00:55:00,600 –> 00:55:02,600
and suggested containment actions.
1573
00:55:02,600 –> 00:55:05,600
No copy-paste, no, what’s the UPN back and forth?
1574
00:55:05,600 –> 00:55:08,280
No analyst spending 20 minutes collecting screenshots
1575
00:55:08,280 –> 00:55:09,560
for a ticket nobody will read.
1576
00:55:09,560 –> 00:55:11,760
Then automation does the first reversible moves.
1577
00:55:11,760 –> 00:55:14,160
Reversible means you can undo the action
1578
00:55:14,160 –> 00:55:16,680
without negotiating with half the organization.
1579
00:55:16,680 –> 00:55:19,440
Reauthentication prompts, session revocation,
1580
00:55:19,440 –> 00:55:22,640
blocking risky sign-ins, disabling a single account,
1581
00:55:22,640 –> 00:55:25,440
removing a role activation, isolating a device,
1582
00:55:25,440 –> 00:55:28,680
quarantining an email, suspending an OAuth app consent,
1583
00:55:28,680 –> 00:55:30,720
depending on what signal fired and what authority
1584
00:55:30,720 –> 00:55:31,920
you’ve pre-approved.
1585
00:55:31,920 –> 00:55:34,040
This is the key leadership decision,
1586
00:55:34,040 –> 00:55:36,160
which actions are allowed to happen automatically
1587
00:55:36,160 –> 00:55:37,760
and under what confidence threshold.
1588
00:55:37,760 –> 00:55:39,880
If everything requires a human you get latency,
1589
00:55:39,880 –> 00:55:41,240
if everything is automated,
1590
00:55:41,240 –> 00:55:44,520
you get accidental outages and political backlash.
1591
00:55:44,520 –> 00:55:47,160
The only stable model is a tiered model.
1592
00:55:47,160 –> 00:55:49,480
Automatic containment for high confidence,
1593
00:55:49,480 –> 00:55:51,760
low blast radius actions, human approval
1594
00:55:51,760 –> 00:55:53,400
for high blast radius actions,
1595
00:55:53,400 –> 00:55:55,160
and explicit escalation when the system
1596
00:55:55,160 –> 00:55:56,600
can’t determine impact.
1597
00:55:56,600 –> 00:55:59,480
ServiceNow is where that tearing becomes enforceable.
1598
00:55:59,480 –> 00:56:00,960
It can embed approval workflows
1599
00:56:00,960 –> 00:56:02,400
in forced segregation of duties
1600
00:56:02,400 –> 00:56:05,040
and ensure every exception has an owner and an expiration.
1601
00:56:05,040 –> 00:56:07,560
It can also track recovery tasks as actual work,
1602
00:56:07,560 –> 00:56:10,160
not as tribal knowledge, credential resets,
1603
00:56:10,160 –> 00:56:13,080
access-reviewed triggers, device re-enrollment,
1604
00:56:13,080 –> 00:56:16,160
application owner confirmation, customer communications,
1605
00:56:16,160 –> 00:56:18,560
and post-incident backlog items.
1606
00:56:18,560 –> 00:56:19,880
That last part matters.
1607
00:56:19,880 –> 00:56:24,080
Most organizations can contain when the right people are awake.
1608
00:56:24,080 –> 00:56:25,480
They can’t recover consistently
1609
00:56:25,480 –> 00:56:27,160
because recovery is treated as cleanup,
1610
00:56:27,160 –> 00:56:30,000
not as an engineered loop, service.
1611
00:56:30,000 –> 00:56:33,000
Now forces recovery to be legible, tasks, owners,
1612
00:56:33,000 –> 00:56:34,920
deadlines, evidence.
1613
00:56:34,920 –> 00:56:36,680
Now the counterintuitive part,
1614
00:56:36,680 –> 00:56:38,920
this automation isn’t about speed for its own sake,
1615
00:56:38,920 –> 00:56:40,960
it’s about restoring human decision time.
1616
00:56:40,960 –> 00:56:42,320
Humans should decide intent.
1617
00:56:42,320 –> 00:56:44,080
Is this identity business critical?
1618
00:56:44,080 –> 00:56:45,400
Is this activity expected?
1619
00:56:45,400 –> 00:56:46,360
Do we accept the risk?
1620
00:56:46,360 –> 00:56:47,520
Do we shut down a workflow?
1621
00:56:47,520 –> 00:56:48,680
Do we notify customers?
1622
00:56:48,680 –> 00:56:50,560
Do we escalate to legal?
1623
00:56:50,560 –> 00:56:52,320
The system should execute mechanics.
1624
00:56:52,320 –> 00:56:54,440
Collect data, correlate, create the case,
1625
00:56:54,440 –> 00:56:56,240
root it, apply reversible containment,
1626
00:56:56,240 –> 00:56:57,480
and maintain the audit trail.
1627
00:56:57,480 –> 00:57:00,080
If your analysts are doing mechanics, you don’t have a so key.
1628
00:57:00,080 –> 00:57:02,080
You have a very expensive workflow gap.
1629
00:57:02,080 –> 00:57:04,040
And the reason this scenario belongs
1630
00:57:04,040 –> 00:57:06,440
in an executive briefing is that it changes
1631
00:57:06,440 –> 00:57:07,560
what leaders fund.
1632
00:57:07,560 –> 00:57:09,080
Instead of buying more detection,
1633
00:57:09,080 –> 00:57:11,880
you invest in the conversion layer, integrations,
1634
00:57:11,880 –> 00:57:15,720
playbooks, ownership models, and rehearsed authority.
1635
00:57:15,720 –> 00:57:17,320
You build the muscle that turns,
1636
00:57:17,320 –> 00:57:20,200
we saw something into, we contained something,
1637
00:57:20,200 –> 00:57:21,920
because the board doesn’t care that you detected
1638
00:57:21,920 –> 00:57:24,160
an identity incident at 2.03 AM.
1639
00:57:24,160 –> 00:57:28,000
They care whether the attacker still had access at 2.33 AM.
1640
00:57:28,000 –> 00:57:29,920
This is also where you stop measuring success
1641
00:57:29,920 –> 00:57:31,560
by ticket volume and start measuring it
1642
00:57:31,560 –> 00:57:34,600
by decision latency, time to detect, time to decide,
1643
00:57:34,600 –> 00:57:36,680
time to enforce, time to recover.
1644
00:57:36,680 –> 00:57:39,400
Service now gives you the workflow time stamps.
1645
00:57:39,400 –> 00:57:41,240
Defender gives you the signal time stamps.
1646
00:57:41,240 –> 00:57:43,800
Together, they give you the only metric that matters.
1647
00:57:43,800 –> 00:57:45,560
MTR becomes visible.
1648
00:57:45,560 –> 00:57:49,360
And once MTR is visible, leadership can actually manage it.
1649
00:57:49,360 –> 00:57:51,400
Either resilience is an operating capability,
1650
00:57:51,400 –> 00:57:52,640
not an incident plan.
1651
00:57:52,640 –> 00:57:54,400
Resilience is what the organization can do
1652
00:57:54,400 –> 00:57:56,040
on a bad day without improvising,
1653
00:57:56,040 –> 00:57:58,200
not what it wrote down in a binder two years ago.
1654
00:57:58,200 –> 00:58:01,360
Most enterprises have an incident response plan.
1655
00:58:01,360 –> 00:58:04,760
It exists, it has owners, it has a PDF, it satisfies audits.
1656
00:58:04,760 –> 00:58:06,920
And it fails at the exact moment it’s needed,
1657
00:58:06,920 –> 00:58:08,880
because plans don’t execute themselves
1658
00:58:08,880 –> 00:58:11,320
and stressed humans don’t behave like flowcharts.
1659
00:58:11,320 –> 00:58:13,320
An incident plan is documentation.
1660
00:58:13,320 –> 00:58:15,840
Resilience is an operating capability, practiced,
1661
00:58:15,840 –> 00:58:18,480
funded, measured and continuously improved.
1662
00:58:18,480 –> 00:58:20,200
It lives in the muscle memory of teams
1663
00:58:20,200 –> 00:58:23,680
and the design of systems, not in the phrasing of a policy.
1664
00:58:23,680 –> 00:58:25,360
This is the uncomfortable truth.
1665
00:58:25,360 –> 00:58:28,040
Modern incidents are not puzzles, they are time games.
1666
00:58:28,040 –> 00:58:29,800
The attacker’s advantage is not brilliance.
1667
00:58:29,800 –> 00:58:31,600
It’s that your organization needs a meeting
1668
00:58:31,600 –> 00:58:32,800
before it can act.
1669
00:58:32,800 –> 00:58:34,960
Resilience is the decision to remove that meeting
1670
00:58:34,960 –> 00:58:36,240
from the critical path.
1671
00:58:36,240 –> 00:58:39,000
So resilience engineering starts with one stance,
1672
00:58:39,000 –> 00:58:42,680
expect failure, not as pessimism as design input.
1673
00:58:42,680 –> 00:58:44,640
Your human identity will be compromised,
1674
00:58:44,640 –> 00:58:46,760
your sumatoken will be stolen, your sumatown,
1675
00:58:46,760 –> 00:58:48,440
or O-Auth app will get consented,
1676
00:58:48,440 –> 00:58:50,600
your sumatement will make a mistake.
1677
00:58:50,600 –> 00:58:52,520
Then you design for bounded failure,
1678
00:58:52,520 –> 00:58:55,240
small blast radius, fast revocation
1679
00:58:55,240 –> 00:58:57,600
and recovery that doesn’t require heroics.
1680
00:58:57,600 –> 00:59:00,000
Bounded failure is the opposite of prevention fantasy.
1681
00:59:00,000 –> 00:59:02,640
It’s not nothing bad happens, it’s it’s it’s bad
1682
00:59:02,640 –> 00:59:05,440
things happen and the organization keeps operating.
1683
00:59:05,440 –> 00:59:08,120
That implies three capabilities leaders can actually fund.
1684
00:59:08,120 –> 00:59:09,840
First, containment readiness.
1685
00:59:09,840 –> 00:59:13,520
This is the existence of kill switches that work.
1686
00:59:13,520 –> 00:59:16,000
Rapid account disabling, privilege stripping,
1687
00:59:16,000 –> 00:59:18,880
session revocation, conditional access escalation,
1688
00:59:18,880 –> 00:59:21,920
device isolation and application level blocks,
1689
00:59:21,920 –> 00:59:26,040
pre-approved, auditable and reversible, where possible.
1690
00:59:26,040 –> 00:59:28,560
If containment actions require ad hoc approvals,
1691
00:59:28,560 –> 00:59:30,280
you don’t have containment readiness,
1692
00:59:30,280 –> 00:59:33,760
you have hope, second, recovery readiness.
1693
00:59:33,760 –> 00:59:36,760
Containment stops the bleeding, recovery restores the business.
1694
00:59:36,760 –> 00:59:39,640
Most organizations skip designing recovery as a system,
1695
00:59:39,640 –> 00:59:41,480
so they pay for it in chaos.
1696
00:59:41,480 –> 00:59:44,040
Recovery readiness means the organization knows
1697
00:59:44,040 –> 00:59:47,520
how to restore access safely, rebuild trust in identities
1698
00:59:47,520 –> 00:59:49,920
and reestablish clean operating conditions.
1699
00:59:49,920 –> 00:59:53,280
Credential resets with verification, reissuing tokens,
1700
00:59:53,280 –> 00:59:56,720
validating device posture, re-onboarding service accounts,
1701
00:59:56,720 –> 00:59:59,080
verifying that privileged roles are clean,
1702
00:59:59,080 –> 01:00:01,520
and proving that logging and controls are still intact.
1703
01:00:01,520 –> 01:00:03,520
If the org can’t reestablish trust quickly,
1704
01:00:03,520 –> 01:00:05,120
it will either stay offline too long
1705
01:00:05,120 –> 01:00:06,920
or come back online too early.
1706
01:00:06,920 –> 01:00:08,240
Both are expensive.
1707
01:00:08,240 –> 01:00:12,440
Third, learning loop discipline.
1708
01:00:12,440 –> 01:00:14,200
Resilience isn’t we survived.
1709
01:00:14,200 –> 01:00:17,480
Resilience is we survived and we made it harder next time.
1710
01:00:17,480 –> 01:00:19,240
That requires turning incident lessons
1711
01:00:19,240 –> 01:00:21,360
into owned backlog items with deadlines,
1712
01:00:21,360 –> 01:00:23,640
not we should review access,
1713
01:00:23,640 –> 01:00:26,200
not we should tighten conditional access,
1714
01:00:26,200 –> 01:00:28,800
specific changes, which entitlement gets rescoped,
1715
01:00:28,800 –> 01:00:31,960
which exception expires, which workflow becomes automated,
1716
01:00:31,960 –> 01:00:33,560
which app must support CAE,
1717
01:00:33,560 –> 01:00:36,080
which privileged role gets moved to eligible only,
1718
01:00:36,080 –> 01:00:38,560
which detection trigger now roots to action.
1719
01:00:38,560 –> 01:00:40,760
This is where most programs rot.
1720
01:00:40,760 –> 01:00:42,840
The incident becomes a post-mortem presentation,
1721
01:00:42,840 –> 01:00:44,240
not an engineering input.
1722
01:00:44,240 –> 01:00:45,360
Now to make this real,
1723
01:00:45,360 –> 01:00:47,640
leaders need to stop treating tabletop exercises
1724
01:00:47,640 –> 01:00:48,760
as compliance theater.
1725
01:00:48,760 –> 01:00:50,040
A tabletop isn’t a quiz.
1726
01:00:50,040 –> 01:00:51,480
It’s a rehearsal of decisions.
1727
01:00:51,480 –> 01:00:53,960
Who has authority to disable an executive account?
1728
01:00:53,960 –> 01:00:56,840
Who can revoke access for a third party integration
1729
01:00:56,840 –> 01:00:57,880
that drives revenue?
1730
01:00:57,880 –> 01:01:00,680
Who can force reauthentication for a business critical SaaS app?
1731
01:01:00,680 –> 01:01:02,360
Who can approve isolating a device
1732
01:01:02,360 –> 01:01:04,000
used for production deployment?
1733
01:01:04,000 –> 01:01:04,960
Who talks to legal?
1734
01:01:04,960 –> 01:01:06,040
Who talks to customers?
1735
01:01:06,040 –> 01:01:07,120
Who owns the timeline?
1736
01:01:07,120 –> 01:01:08,480
Those are not technical questions.
1737
01:01:08,480 –> 01:01:10,800
They are governance questions under stress.
1738
01:01:10,800 –> 01:01:13,120
A good tabletop produces two outputs,
1739
01:01:13,120 –> 01:01:15,960
decision clarity and remediation backlog.
1740
01:01:15,960 –> 01:01:18,200
If it only produces, we learned a lot.
1741
01:01:18,200 –> 01:01:19,400
It produced nothing.
1742
01:01:19,400 –> 01:01:21,600
There’s also a structural implication to resilience
1743
01:01:21,600 –> 01:01:23,800
that security teams dislike admitting.
1744
01:01:23,800 –> 01:01:26,880
Resilience requires alignment between identity, IT,
1745
01:01:26,880 –> 01:01:29,600
and the business, not cooperation, alignment.
1746
01:01:29,600 –> 01:01:31,920
Because response actions always affect operations.
1747
01:01:31,920 –> 01:01:33,440
If the business refuses disruption,
1748
01:01:33,440 –> 01:01:35,120
the attacker gets persistence.
1749
01:01:35,120 –> 01:01:38,280
If security refuses accountability, the business gets chaos.
1750
01:01:38,280 –> 01:01:40,800
Resilience is the negotiated operating model
1751
01:01:40,800 –> 01:01:42,440
that makes decisive action possible
1752
01:01:42,440 –> 01:01:44,040
without endless escalation.
1753
01:01:44,040 –> 01:01:45,400
And AI doesn’t change this.
1754
01:01:45,400 –> 01:01:47,080
It accelerates it.
1755
01:01:47,080 –> 01:01:48,440
AI makes attacks faster,
1756
01:01:48,440 –> 01:01:50,200
but it also makes defense more scalable
1757
01:01:50,200 –> 01:01:51,680
if the organization has the workflow
1758
01:01:51,680 –> 01:01:53,360
to convert signals into action.
1759
01:01:53,360 –> 01:01:56,120
Without that, AI just increases the volume of insights
1760
01:01:56,120 –> 01:01:57,400
you fail to operationalize.
1761
01:01:57,400 –> 01:01:59,040
So resilience isn’t the binder.
1762
01:01:59,040 –> 01:01:59,960
It’s the loop.
1763
01:01:59,960 –> 01:02:01,760
Contain, recover, learn, repeat it
1764
01:02:01,760 –> 01:02:04,520
until the system becomes harder to break than it is to run.
1765
01:02:04,520 –> 01:02:07,160
And once you treat resilience as an operating capability,
1766
01:02:07,160 –> 01:02:10,280
you can finally put it on a scoreboard leadership understands.
1767
01:02:10,280 –> 01:02:12,440
The leadership metric, reduce MTTR
1768
01:02:12,440 –> 01:02:14,120
for identity-driven incidents.
1769
01:02:14,120 –> 01:02:16,480
This is where leadership usually asks for a dashboard
1770
01:02:16,480 –> 01:02:18,440
and security hands them the wrong one.
1771
01:02:18,440 –> 01:02:19,440
They get counts.
1772
01:02:19,440 –> 01:02:21,600
Number of incidents, number of blocked sign-ins,
1773
01:02:21,600 –> 01:02:24,080
number of risky users, number of alerts closed.
1774
01:02:24,080 –> 01:02:24,880
That’s activity.
1775
01:02:24,880 –> 01:02:26,120
It’s not capability.
1776
01:02:26,120 –> 01:02:28,960
Capability is what happens when an identity-driven incident
1777
01:02:28,960 –> 01:02:31,360
is already in motion and the business is bleeding time.
1778
01:02:31,360 –> 01:02:32,520
The only metric that translates
1779
01:02:32,520 –> 01:02:36,320
cleanly from security to operations to the board is MTTR.
1780
01:02:36,320 –> 01:02:37,880
Mean time to respond and to end.
1781
01:02:37,880 –> 01:02:39,480
Not time to create a ticket.
1782
01:02:39,480 –> 01:02:40,480
Not time to acknowledge.
1783
01:02:40,480 –> 01:02:42,280
Respond means containment has occurred
1784
01:02:42,280 –> 01:02:45,280
and the attack as ability to act has been materially reduced.
1785
01:02:45,280 –> 01:02:47,640
If you can’t define that moment, you can’t manage it.
1786
01:02:47,640 –> 01:02:48,960
That distinction matters.
1787
01:02:48,960 –> 01:02:51,320
Identity-driven incidents dominate business impact
1788
01:02:51,320 –> 01:02:53,760
because identity is the permission fabric for everything else.
1789
01:02:53,760 –> 01:02:56,400
When an endpoint is compromised, you might lose a machine.
1790
01:02:56,400 –> 01:02:57,960
When an identity is compromised,
1791
01:02:57,960 –> 01:03:01,040
you can lose data, approvals, code, financial workflows,
1792
01:03:01,040 –> 01:03:02,840
and the ability to trust your own systems.
1793
01:03:02,840 –> 01:03:05,280
It is the difference between a local fire
1794
01:03:05,280 –> 01:03:07,600
and a fire in the building’s electrical panel.
1795
01:03:07,600 –> 01:03:09,240
So the leadership mandate is simple.
1796
01:03:09,240 –> 01:03:11,680
Reduce the time window in which a compromise identity
1797
01:03:11,680 –> 01:03:12,520
can operate.
1798
01:03:12,520 –> 01:03:14,800
The 40-60% reduction target is not magic.
1799
01:03:14,800 –> 01:03:16,640
It is the difference between a system
1800
01:03:16,640 –> 01:03:19,320
that relies on humans to stitch context together
1801
01:03:19,320 –> 01:03:21,640
and a system that treats identity as a control plane
1802
01:03:21,640 –> 01:03:23,400
with enforcement and workflow.
1803
01:03:23,400 –> 01:03:26,160
If your current MTTR is measured in hours,
1804
01:03:26,160 –> 01:03:28,360
cutting it roughly in half is entirely plausible
1805
01:03:28,360 –> 01:03:31,080
when you move the first actions from manual to orchestrate it
1806
01:03:31,080 –> 01:03:34,000
and when you stop waiting for token expiry to do your job.
1807
01:03:34,000 –> 01:03:36,760
But leaders need to understand what they are actually measuring.
1808
01:03:36,760 –> 01:03:38,360
MTTR is not a single stopwatch.
1809
01:03:38,360 –> 01:03:40,840
It’s a chain and chains fail at the weakest link,
1810
01:03:40,840 –> 01:03:42,520
so break it into four timestamps
1811
01:03:42,520 –> 01:03:45,040
that are board legible and operationally honest.
1812
01:03:45,040 –> 01:03:46,080
Time to detect.
1813
01:03:46,080 –> 01:03:48,280
When did the system first have a credible signal
1814
01:03:48,280 –> 01:03:49,440
that something was wrong?
1815
01:03:49,440 –> 01:03:52,120
Not when someone looked at it, when it existed.
1816
01:03:52,120 –> 01:03:53,480
Time to decide.
1817
01:03:53,480 –> 01:03:56,520
How long did it take for a human or a policy engine to decide?
1818
01:03:56,520 –> 01:03:58,360
This is real enough to act?
1819
01:03:58,360 –> 01:04:02,000
This is where alert fatigue and unclear severity definitions
1820
01:04:02,000 –> 01:04:03,840
turn into business exposure.
1821
01:04:03,840 –> 01:04:04,960
Time to enforce.
1822
01:04:04,960 –> 01:04:07,360
How long did it take for the decision to change reality?
1823
01:04:07,360 –> 01:04:08,320
Disable the account.
1824
01:04:08,320 –> 01:04:10,960
Revoque sessions, block the sign in, remove privilege,
1825
01:04:10,960 –> 01:04:11,920
quarantine the device.
1826
01:04:11,920 –> 01:04:14,600
If it took two hours to get approval, that’s not governance.
1827
01:04:14,600 –> 01:04:15,920
That’s latency.
1828
01:04:15,920 –> 01:04:17,120
Time to recover.
1829
01:04:17,120 –> 01:04:20,320
How long until the business can operate safely again?
1830
01:04:20,320 –> 01:04:22,160
Not we stopped the attacker.
1831
01:04:22,160 –> 01:04:24,760
We restored trusted access and verified the control plane
1832
01:04:24,760 –> 01:04:25,680
is intact.
1833
01:04:25,680 –> 01:04:27,920
That model gives leaders something they can fund
1834
01:04:27,920 –> 01:04:29,640
because each stage has different blockers.
1835
01:04:29,640 –> 01:04:32,160
Time to detect is usually a signal coverage and correlation
1836
01:04:32,160 –> 01:04:33,040
problem.
1837
01:04:33,040 –> 01:04:35,720
Defender and entra can help, but only if the environment is
1838
01:04:35,720 –> 01:04:38,840
instrumented and identity signals aren’t treated as optional.
1839
01:04:38,840 –> 01:04:41,800
Time to decide is usually a clarity problem.
1840
01:04:41,800 –> 01:04:44,360
Who owns the call, what thresholds matter,
1841
01:04:44,360 –> 01:04:45,920
and what actions are pre-approved?
1842
01:04:45,920 –> 01:04:48,320
Ambiguity is the most expensive security control
1843
01:04:48,320 –> 01:04:49,320
you can deploy.
1844
01:04:49,320 –> 01:04:51,640
Time to enforce is an architecture problem.
1845
01:04:51,640 –> 01:04:53,760
If revocation depends on token expiry,
1846
01:04:53,760 –> 01:04:55,080
you chose slow enforcement.
1847
01:04:55,080 –> 01:04:57,360
If enforcement depends on three teams in a meeting,
1848
01:04:57,360 –> 01:04:58,880
you chose slow enforcement.
1849
01:04:58,880 –> 01:05:00,560
CAE and privileged access governance
1850
01:05:00,560 –> 01:05:02,280
exist to collapse this gap.
1851
01:05:02,280 –> 01:05:04,560
Time to recover is an operating model problem.
1852
01:05:04,560 –> 01:05:07,360
If recoveries at Hock, it is slow by design.
1853
01:05:07,360 –> 01:05:09,600
If recovery tasks are templated, owned,
1854
01:05:09,600 –> 01:05:12,520
and automated where possible, it becomes repeatable.
1855
01:05:12,520 –> 01:05:15,520
Now here’s what blocks MTTR improvement in real organizations,
1856
01:05:15,520 –> 01:05:16,680
unclear authority.
1857
01:05:16,680 –> 01:05:19,080
Nobody wants to be the person who disabled the CFO’s
1858
01:05:19,080 –> 01:05:21,200
account during quarter close, so they escalate
1859
01:05:21,200 –> 01:05:22,720
until the attacker is done.
1860
01:05:22,720 –> 01:05:23,720
Manual handoffs.
1861
01:05:23,720 –> 01:05:26,160
Signals move from defender to email to chat to ticket,
1862
01:05:26,160 –> 01:05:27,880
with context lost every time.
1863
01:05:27,880 –> 01:05:28,920
Exception sprawl.
1864
01:05:28,920 –> 01:05:30,600
The most critical identities and apps
1865
01:05:30,600 –> 01:05:33,080
are often the most exempt, which means your highest risk
1866
01:05:33,080 –> 01:05:34,960
pathways are your least governable ones.
1867
01:05:34,960 –> 01:05:36,480
An entitlement ambiguity.
1868
01:05:36,480 –> 01:05:38,000
If you don’t know what an identity can do,
1869
01:05:38,000 –> 01:05:39,440
you can’t contain it confidently.
1870
01:05:39,440 –> 01:05:40,080
You hesitate.
1871
01:05:40,080 –> 01:05:41,120
The attacker doesn’t.
1872
01:05:41,120 –> 01:05:44,200
So leadership should treat MTTR like a resilience KPI,
1873
01:05:44,200 –> 01:05:45,240
not a SOC KPI.
1874
01:05:45,240 –> 01:05:47,160
It’s how you measure whether the enterprise
1875
01:05:47,160 –> 01:05:50,280
can make trust decisions and enforce them in business time.
1876
01:05:50,280 –> 01:05:52,440
Everything you funded earlier, intra-governance,
1877
01:05:52,440 –> 01:05:55,040
ITDI discipline, CIE, and defender to service
1878
01:05:55,040 –> 01:05:56,840
now orchestration should show up here
1879
01:05:56,840 –> 01:05:59,800
as lower decision latency and faster enforcement.
1880
01:05:59,800 –> 01:06:01,880
And if it doesn’t, you don’t have a tooling problem.
1881
01:06:01,880 –> 01:06:03,480
You have an operating model that still
1882
01:06:03,480 –> 01:06:05,760
confuses visibility with control.
1883
01:06:05,760 –> 01:06:06,760
Composite incident.
1884
01:06:06,760 –> 01:06:07,440
Same tools.
1885
01:06:07,440 –> 01:06:08,520
Different outcome.
1886
01:06:08,520 –> 01:06:11,320
Now put all of this into a story that leaders recognize,
1887
01:06:11,320 –> 01:06:14,240
not a named breach, not a vendor fairy tale.
1888
01:06:14,240 –> 01:06:16,480
A composite incident built from the same patterns,
1889
01:06:16,480 –> 01:06:19,160
every SOC and identity team has seen.
1890
01:06:19,160 –> 01:06:20,160
Session abuse.
1891
01:06:20,160 –> 01:06:21,000
Over permission.
1892
01:06:21,000 –> 01:06:23,000
Slow revocation and manual response.
1893
01:06:23,000 –> 01:06:24,000
Same organization.
1894
01:06:24,000 –> 01:06:25,280
Same Microsoft stack.
1895
01:06:25,280 –> 01:06:27,320
Same green dashboards.
1896
01:06:27,320 –> 01:06:30,000
Two different outcomes determined entirely by design.
1897
01:06:30,000 –> 01:06:32,040
In the first version, the attacker doesn’t start
1898
01:06:32,040 –> 01:06:33,360
with some exotic exploit.
1899
01:06:33,360 –> 01:06:35,520
They start with an identity that has more authority
1900
01:06:35,520 –> 01:06:38,480
than anyone remembers approving, a contractor account,
1901
01:06:38,480 –> 01:06:40,840
a partner identity, or an internal user
1902
01:06:40,840 –> 01:06:43,760
who moved roles three times and kept access every time.
1903
01:06:43,760 –> 01:06:45,480
The initial foothold is boring.
1904
01:06:45,480 –> 01:06:48,960
A captured session token via a malicious browser extension.
1905
01:06:48,960 –> 01:06:50,920
A convincing OAuth consent.
1906
01:06:50,920 –> 01:06:53,840
Or straight credential theft followed by MFA completion.
1907
01:06:53,840 –> 01:06:55,960
It doesn’t matter which because the system’s failure mode
1908
01:06:55,960 –> 01:06:56,760
is the same.
1909
01:06:56,760 –> 01:06:58,880
The user successfully completed MFA.
1910
01:06:58,880 –> 01:07:00,760
So the attacker doesn’t fight authentication.
1911
01:07:00,760 –> 01:07:01,720
They inherit it.
1912
01:07:01,720 –> 01:07:03,760
From there, the attacker explores entitlements.
1913
01:07:03,760 –> 01:07:05,200
They don’t need to scan networks.
1914
01:07:05,200 –> 01:07:07,800
They just enumerate what the identity can reach.
1915
01:07:07,800 –> 01:07:09,040
SharePoint sites.
1916
01:07:09,040 –> 01:07:10,120
Teams files.
1917
01:07:10,120 –> 01:07:11,440
Mailbox rules.
1918
01:07:11,440 –> 01:07:12,960
Power BI workspaces.
1919
01:07:12,960 –> 01:07:14,080
Azure resources.
1920
01:07:14,080 –> 01:07:15,680
Third party SAS.
1921
01:07:15,680 –> 01:07:18,400
They look for the same things every attacker looks for.
1922
01:07:18,400 –> 01:07:19,560
Export paths.
1923
01:07:19,560 –> 01:07:20,640
Admin paths.
1924
01:07:20,640 –> 01:07:21,800
And trust paths.
1925
01:07:21,800 –> 01:07:23,160
Here’s the weird part.
1926
01:07:23,160 –> 01:07:25,320
Most of this activity doesn’t look like malware.
1927
01:07:25,320 –> 01:07:27,040
It looks like a busy employee.
1928
01:07:27,040 –> 01:07:27,920
Downloads.
1929
01:07:27,920 –> 01:07:28,760
List operations.
1930
01:07:28,760 –> 01:07:30,040
API calls.
1931
01:07:30,040 –> 01:07:30,840
Roll lookups.
1932
01:07:30,840 –> 01:07:31,800
Consent grants.
1933
01:07:31,800 –> 01:07:33,720
Maybe a few impossible travel hints.
1934
01:07:33,720 –> 01:07:35,240
But nothing that screams ransomware.
1935
01:07:35,240 –> 01:07:37,000
So the organization stays calm.
1936
01:07:37,000 –> 01:07:38,240
Defenders see signals.
1937
01:07:38,240 –> 01:07:39,600
Entracies risky behavior.
1938
01:07:39,600 –> 01:07:40,600
The logs are there.
1939
01:07:40,600 –> 01:07:42,600
But the decision loop isn’t connected to enforcement.
1940
01:07:42,600 –> 01:07:45,520
So what happens is the most common failure mode in identity
1941
01:07:45,520 –> 01:07:46,280
incidents.
1942
01:07:46,280 –> 01:07:48,960
People notice, but nothing changes fast enough to matter.
1943
01:07:48,960 –> 01:07:50,640
A ticket gets created and analysts
1944
01:07:50,640 –> 01:07:51,920
pings the identity team.
1945
01:07:51,920 –> 01:07:54,800
The identity team asks the business owner whether the account
1946
01:07:54,800 –> 01:07:55,480
is critical.
1947
01:07:55,480 –> 01:07:56,960
The business owner isn’t sure.
1948
01:07:56,960 –> 01:07:58,320
Someone schedules a call.
1949
01:07:58,320 –> 01:07:59,920
Meanwhile, the attacker keeps operating
1950
01:07:59,920 –> 01:08:01,360
because the session remains valid.
1951
01:08:01,360 –> 01:08:03,160
Tokens don’t care about meetings.
1952
01:08:03,160 –> 01:08:04,800
Then the attacker finds the real value
1953
01:08:04,800 –> 01:08:07,360
an identity pathway that can change control.
1954
01:08:07,360 –> 01:08:09,280
A role that can read security settings.
1955
01:08:09,280 –> 01:08:11,760
An account that can create new app registrations.
1956
01:08:11,760 –> 01:08:14,440
A service principle with broad graph permissions.
1957
01:08:14,440 –> 01:08:15,960
Or a legacy admin group.
1958
01:08:15,960 –> 01:08:16,960
Nobody reviews.
1959
01:08:16,960 –> 01:08:19,840
Now the incident stops being suspicious user behavior
1960
01:08:19,840 –> 01:08:21,560
and becomes a business event.
1961
01:08:21,560 –> 01:08:24,480
Data exfiltration, control disablement, or persistence
1962
01:08:24,480 –> 01:08:25,520
creation.
1963
01:08:25,520 –> 01:08:27,520
And the root cause later reads like a checklist
1964
01:08:27,520 –> 01:08:28,840
of comfortable truths.
1965
01:08:28,840 –> 01:08:30,760
MFA was enabled.
1966
01:08:30,760 –> 01:08:32,760
Defender generated alerts.
1967
01:08:32,760 –> 01:08:33,880
We had logging.
1968
01:08:33,880 –> 01:08:35,200
We followed the process.
1969
01:08:35,200 –> 01:08:35,680
Yes.
1970
01:08:35,680 –> 01:08:38,240
And the attacker had time now rerun the same incident
1971
01:08:38,240 –> 01:08:39,480
in the redesigned environment.
1972
01:08:39,480 –> 01:08:41,880
Same tools, different outcome.
1973
01:08:41,880 –> 01:08:44,040
The attacker still gets the initial token.
1974
01:08:44,040 –> 01:08:45,320
That part is not fantasy.
1975
01:08:45,320 –> 01:08:46,200
Assume breach.
1976
01:08:46,200 –> 01:08:48,000
But the identity is governed differently.
1977
01:08:48,000 –> 01:08:49,200
The access is time bound.
1978
01:08:49,200 –> 01:08:51,000
Privilege is eligible, not standing.
1979
01:08:51,000 –> 01:08:52,280
Entitlements have owners.
1980
01:08:52,280 –> 01:08:54,960
And the first meaningful actions don’t require heroics.
1981
01:08:54,960 –> 01:08:57,680
The first sign of risk elevates the account state.
1982
01:08:57,680 –> 01:09:00,360
Entrance identity signals change the trust decision.
1983
01:09:00,360 –> 01:09:03,200
CAE forces re-evaluation inside the session.
1984
01:09:03,200 –> 01:09:05,240
The attacker’s borrowed trust collapses
1985
01:09:05,240 –> 01:09:07,160
while they’re still trying to explore.
1986
01:09:07,160 –> 01:09:08,600
Not because someone woke up faster
1987
01:09:08,600 –> 01:09:11,240
because the platform revoked trust in business time.
1988
01:09:11,240 –> 01:09:13,880
At the same moment, Defender correlates the incident
1989
01:09:13,880 –> 01:09:15,480
and pushes it into service now
1990
01:09:15,480 –> 01:09:17,160
with the context already attached.
1991
01:09:17,160 –> 01:09:21,120
Identity, device, SaaS artifacts, and recommended containment.
1992
01:09:21,120 –> 01:09:23,240
Service now isn’t used to start a conversation.
1993
01:09:23,240 –> 01:09:25,920
It’s used to execute a predefined response path.
1994
01:09:25,920 –> 01:09:28,400
Automation takes the reversible steps immediately.
1995
01:09:28,400 –> 01:09:30,640
Revoke sessions, block risky sign-ins,
1996
01:09:30,640 –> 01:09:32,800
remove active privilege role assignments,
1997
01:09:32,800 –> 01:09:34,120
isolate the device if needed,
1998
01:09:34,120 –> 01:09:37,040
suspend suspicious or author’s grounds if they exist.
1999
01:09:37,040 –> 01:09:38,640
Humans still decide the big calls.
2000
01:09:38,640 –> 01:09:40,200
Do we disable the account entirely?
2001
01:09:40,200 –> 01:09:41,520
Do we pause a business workflow?
2002
01:09:41,520 –> 01:09:42,400
Do we notify legal?
2003
01:09:42,400 –> 01:09:44,480
Do we trigger broader access reviews?
2004
01:09:44,480 –> 01:09:46,800
But humans are deciding while the attacker is contained.
2005
01:09:46,800 –> 01:09:48,560
Not while the attacker is still active.
2006
01:09:48,560 –> 01:09:50,000
That is the entire difference.
2007
01:09:50,000 –> 01:09:52,760
In the first environment, trust, drift, and decision-latency
2008
01:09:52,760 –> 01:09:55,760
turned a minor identity compromise into an enterprise incident.
2009
01:09:55,760 –> 01:09:57,560
In the second, the attacker still got in,
2010
01:09:57,560 –> 01:09:59,400
but they couldn’t stay, couldn’t escalate,
2011
01:09:59,400 –> 01:10:02,600
and couldn’t move fast enough to make the event existential.
2012
01:10:02,600 –> 01:10:05,400
Same tools, same tenant, same budget line items.
2013
01:10:05,400 –> 01:10:06,480
Different outcome?
2014
01:10:06,480 –> 01:10:08,920
Because the organization stopped measuring security
2015
01:10:08,920 –> 01:10:11,840
by coverage and started engineering it as a control loop,
2016
01:10:11,840 –> 01:10:14,800
identity governance to reduce reckless entitlements,
2017
01:10:14,800 –> 01:10:17,720
CAE to revoke sessions when reality changes,
2018
01:10:17,720 –> 01:10:19,560
and orchestration to collapse the time
2019
01:10:19,560 –> 01:10:21,280
between signal and action.
2020
01:10:21,280 –> 01:10:23,320
This is the moment leaders need to internalize.
2021
01:10:23,320 –> 01:10:25,760
Security isn’t the number of incidents you prevent.
2022
01:10:25,760 –> 01:10:28,000
It’s the size and duration of the incidents you allow.
2023
01:10:28,000 –> 01:10:31,000
The executive operating model for security beyond controls.
2024
01:10:31,000 –> 01:10:33,840
So if the story is same tools, different outcome,
2025
01:10:33,840 –> 01:10:36,400
the obvious executive question is what actually changed?
2026
01:10:36,400 –> 01:10:39,240
Not the product list, the operating model.
2027
01:10:39,240 –> 01:10:40,960
Because controls don’t run themselves,
2028
01:10:40,960 –> 01:10:43,480
they are executed through ownership, decision rights,
2029
01:10:43,480 –> 01:10:46,360
and a loop that converts intent into enforcement.
2030
01:10:46,360 –> 01:10:48,160
Without that, you’re just accumulating features
2031
01:10:48,160 –> 01:10:49,560
and calling it maturity.
2032
01:10:49,560 –> 01:10:51,920
Here’s the model leaders need to hold in their heads,
2033
01:10:51,920 –> 01:10:55,280
one loop, end to end, identity, trust decisions,
2034
01:10:55,280 –> 01:10:57,280
detection, response, recovery.
2035
01:10:57,280 –> 01:10:58,880
Identity is your control plane
2036
01:10:58,880 –> 01:11:00,640
because it’s where permissions live.
2037
01:11:00,640 –> 01:11:02,960
Trust decisions are the policies that decide
2038
01:11:02,960 –> 01:11:05,520
under what conditions is that identity allowed to act.
2039
01:11:05,520 –> 01:11:07,360
And detection is the sensing layer.
2040
01:11:07,360 –> 01:11:08,840
Response is the action layer.
2041
01:11:08,840 –> 01:11:11,880
Recovery is the process of restoring trusted operations
2042
01:11:11,880 –> 01:11:14,360
and proving the environment is clean enough to resume.
2043
01:11:14,360 –> 01:11:16,160
If any part of that loop is weak,
2044
01:11:16,160 –> 01:11:18,680
the whole enterprise becomes a probabilistic system.
2045
01:11:18,680 –> 01:11:20,840
And leaders should stop accepting probabilistic.
2046
01:11:20,840 –> 01:11:23,320
Now, most enterprises treat each part of that loop
2047
01:11:23,320 –> 01:11:25,200
as a separate department, identity team,
2048
01:11:25,200 –> 01:11:28,040
security operations, IT operations, application owners,
2049
01:11:28,040 –> 01:11:31,280
risk, legal audit, the attacker doesn’t care.
2050
01:11:31,280 –> 01:11:33,440
So the operating model has to align those pieces
2051
01:11:33,440 –> 01:11:37,040
without creating a bureaucracy that moves slower than the threat.
2052
01:11:37,040 –> 01:11:39,680
That starts with a clean split, policy intent
2053
01:11:39,680 –> 01:11:41,120
versus policy enforcement.
2054
01:11:41,120 –> 01:11:42,800
Policy intent belongs to the business,
2055
01:11:42,800 –> 01:11:45,080
not because the business writes conditional access rules,
2056
01:11:45,080 –> 01:11:47,920
but because the business defines the tolerable risk.
2057
01:11:47,920 –> 01:11:50,440
Who should have access to what, for how long,
2058
01:11:50,440 –> 01:11:52,440
with what approvals and under what conditions?
2059
01:11:52,440 –> 01:11:54,760
That’s governance, that’s not an IT preference.
2060
01:11:54,760 –> 01:11:56,680
That’s a business decision about trust.
2061
01:11:56,680 –> 01:11:59,040
Policy enforcement belongs to the platform teams.
2062
01:11:59,040 –> 01:12:01,520
Identity, endpoint, and security engineering
2063
01:12:01,520 –> 01:12:04,760
translate intent into deterministic mechanisms.
2064
01:12:04,760 –> 01:12:07,920
Conditional access, privileged access constraints,
2065
01:12:07,920 –> 01:12:12,360
entitlement packages, CAE triggers, and automation playbooks.
2066
01:12:12,360 –> 01:12:14,800
But the key is this, enforcement must be testable.
2067
01:12:14,800 –> 01:12:17,640
If a policy can’t be tested under realistic conditions,
2068
01:12:17,640 –> 01:12:20,520
it’s not a control, it’s a belief.
2069
01:12:20,520 –> 01:12:22,520
The second component of the operating model
2070
01:12:22,520 –> 01:12:23,720
is exception governance.
2071
01:12:23,720 –> 01:12:25,280
This is where most programs collapse.
2072
01:12:25,280 –> 01:12:28,320
Exceptions are not rare edge cases, they are entropy generators.
2073
01:12:28,320 –> 01:12:30,720
They accumulate because the business is trying to function
2074
01:12:30,720 –> 01:12:32,720
and because security is trying to accommodate,
2075
01:12:32,720 –> 01:12:34,720
overtime exceptions become the real policy
2076
01:12:34,720 –> 01:12:36,720
and the real policy becomes theater.
2077
01:12:36,720 –> 01:12:39,400
So executives need a non-negotiable rule.
2078
01:12:39,400 –> 01:12:41,920
Every exception must have an owner,
2079
01:12:41,920 –> 01:12:45,800
a justification, an expiration date, and a review cadence.
2080
01:12:45,800 –> 01:12:48,400
No expiration means you’re not granting an exception.
2081
01:12:48,400 –> 01:12:51,200
You’re redesigning the security model without admitting it.
2082
01:12:51,200 –> 01:12:54,000
And exceptions need to be treated as first class risk objects,
2083
01:12:54,000 –> 01:12:56,320
tracked, measured, and reduced over time.
2084
01:12:56,320 –> 01:12:58,280
Otherwise, you will always enable CAE,
2085
01:12:58,280 –> 01:13:00,560
enable governance, enable zero trust,
2086
01:13:00,560 –> 01:13:03,360
and then quietly bypass it everywhere it matters.
2087
01:13:03,360 –> 01:13:06,120
Third, decision speed requires decision rights.
2088
01:13:06,120 –> 01:13:07,920
Identity incidents become expensive
2089
01:13:07,920 –> 01:13:09,360
when nobody is allowed to act.
2090
01:13:09,360 –> 01:13:12,000
The SOCC signals but can’t revoke access.
2091
01:13:12,000 –> 01:13:14,920
It can isolate devices but can’t disable accounts.
2092
01:13:14,920 –> 01:13:18,000
App owners can approve access, but don’t understand blast radius.
2093
01:13:18,000 –> 01:13:21,120
Legal one certainty, the business one’s continuity.
2094
01:13:21,120 –> 01:13:23,720
So define three tiers of authority in advance.
2095
01:13:23,720 –> 01:13:26,080
Tier one, pre-approved, reversible actions
2096
01:13:26,080 –> 01:13:28,640
that can happen immediately when confidence is high,
2097
01:13:28,640 –> 01:13:31,720
session revocation, forcing reauthentication,
2098
01:13:31,720 –> 01:13:35,800
blocking risky sign-ins, suspending a suspicious O-orth grant.
2099
01:13:35,800 –> 01:13:37,600
These should not require a meeting.
2100
01:13:37,600 –> 01:13:39,640
Tier two, disruptive but bounded actions
2101
01:13:39,640 –> 01:13:41,280
that require fast approval,
2102
01:13:41,280 –> 01:13:43,600
disabling an account tied to revenue workflows,
2103
01:13:43,600 –> 01:13:45,560
locking down a sensitive sharepoint site,
2104
01:13:45,560 –> 01:13:48,640
removing privileged access from a production operator.
2105
01:13:48,640 –> 01:13:50,840
These need named approvals, not the team.
2106
01:13:50,840 –> 01:13:53,200
Tier three, enterprise impact actions
2107
01:13:53,200 –> 01:13:55,720
that trigger executive incident governance.
2108
01:13:55,720 –> 01:13:58,160
Broad access shutdowns, customer notifications,
2109
01:13:58,160 –> 01:13:59,680
regulatory disclosures.
2110
01:13:59,680 –> 01:14:01,800
These are rare but if you don’t pre-define them,
2111
01:14:01,800 –> 01:14:04,080
you’ll discover your authority model in real time.
2112
01:14:04,080 –> 01:14:06,160
That’s not leadership, that’s improvisation.
2113
01:14:06,160 –> 01:14:07,680
Fourth, investment posture.
2114
01:14:07,680 –> 01:14:10,000
Leaders need to fund the loop, not the sensors.
2115
01:14:10,000 –> 01:14:12,200
If the organization already detects plenty
2116
01:14:12,200 –> 01:14:13,560
but still bleeds time,
2117
01:14:13,560 –> 01:14:16,760
the gap is response, orchestration, and identity enforcement.
2118
01:14:16,760 –> 01:14:19,520
That means funding integration work, automation playbooks,
2119
01:14:19,520 –> 01:14:22,640
entitlement, cleanup, and application modernization
2120
01:14:22,640 –> 01:14:24,560
so that revocation is actually honored
2121
01:14:24,560 –> 01:14:27,480
that is not operational detail, that is the only path
2122
01:14:27,480 –> 01:14:29,720
to reducing MTTR, finally accountability,
2123
01:14:29,720 –> 01:14:31,720
not in the abstract, in the operating rhythm.
2124
01:14:31,720 –> 01:14:34,400
Every quarter leaders should demand three outputs.
2125
01:14:34,400 –> 01:14:37,160
Current MTTR for identity-driven incidents,
2126
01:14:37,160 –> 01:14:40,880
the top ten exception paths by risk and business criticality,
2127
01:14:40,880 –> 01:14:43,520
and the backlog of identity and response improvements
2128
01:14:43,520 –> 01:14:45,240
with owners and dates.
2129
01:14:45,240 –> 01:14:46,440
If those three are visible,
2130
01:14:46,440 –> 01:14:49,240
security stops being an argument and becomes a new problem
2131
01:14:49,240 –> 01:14:52,400
a system, that’s the executive operating model, one loop.
2132
01:14:52,400 –> 01:14:55,240
Explicit ownership, governed exceptions, pre-approved actions,
2133
01:14:55,240 –> 01:14:57,880
and a scoreboard that measures speed of containment.
2134
01:14:57,880 –> 01:14:59,360
Everything else is commentary.
2135
01:14:59,360 –> 01:15:00,680
Executive checklist.
2136
01:15:00,680 –> 01:15:02,440
What to ask your teams this quarter?
2137
01:15:02,440 –> 01:15:04,640
If leadership wants this to move from security
2138
01:15:04,640 –> 01:15:06,920
is complicated to security is operated,
2139
01:15:06,920 –> 01:15:09,360
the fastest way is to ask better questions.
2140
01:15:09,360 –> 01:15:12,080
Not more questions, better ones.
2141
01:15:12,080 –> 01:15:14,080
Here are the questions that cut through tooling
2142
01:15:14,080 –> 01:15:16,480
and land directly on system behavior.
2143
01:15:16,480 –> 01:15:18,440
First, where do we have authorization risk,
2144
01:15:18,440 –> 01:15:19,640
not authentication gaps?
2145
01:15:19,640 –> 01:15:21,600
Don’t accept we have MFA as an answer.
2146
01:15:21,600 –> 01:15:24,520
Asquare-accompromised identity could still do disproportionate damage
2147
01:15:24,520 –> 01:15:26,000
because the entitlements are wrong.
2148
01:15:26,000 –> 01:15:27,080
Who can export data?
2149
01:15:27,080 –> 01:15:28,680
Who can change sharing settings?
2150
01:15:28,680 –> 01:15:30,240
Who can create app registrations?
2151
01:15:30,240 –> 01:15:31,720
Who can grant admin consent?
2152
01:15:31,720 –> 01:15:33,160
Who can disable controls?
2153
01:15:33,160 –> 01:15:35,040
If the answer is we are not sure.
2154
01:15:35,040 –> 01:15:36,280
That’s not a visibility gap.
2155
01:15:36,280 –> 01:15:37,640
That’s unmanaged blast radius.
2156
01:15:37,640 –> 01:15:41,280
Second, which identities can change systems, data, or controls?
2157
01:15:41,280 –> 01:15:42,960
Humans and non-humans.
2158
01:15:42,960 –> 01:15:45,320
This is where most organizations lie to themselves.
2159
01:15:45,320 –> 01:15:46,360
They can list admins.
2160
01:15:46,360 –> 01:15:48,960
They can’t list service principles, automation accounts,
2161
01:15:48,960 –> 01:15:52,960
CIS, CD identities, connectors, or the new wave of agent identities.
2162
01:15:52,960 –> 01:15:55,800
If machine identities outnumber humans in your environment
2163
01:15:55,800 –> 01:15:57,760
and they usually do then governing only humans
2164
01:15:57,760 –> 01:15:59,400
is a decorative security program.
2165
01:15:59,400 –> 01:16:02,680
Ask for an inventory, ownership model, and rotation posture.
2166
01:16:02,680 –> 01:16:04,720
If nobody owns an identity, it owns you.
2167
01:16:04,720 –> 01:16:06,800
Third, how quickly can we revoke access
2168
01:16:06,800 –> 01:16:08,800
across our critical apps when risk changes?
2169
01:16:08,800 –> 01:16:10,840
Not can we disable the user?
2170
01:16:10,840 –> 01:16:13,360
How quickly can we actually remove effective access
2171
01:16:13,360 –> 01:16:14,680
in the apps that matter?
2172
01:16:14,680 –> 01:16:17,480
Email, files, collaboration, ERP finance,
2173
01:16:17,480 –> 01:16:20,200
ticketing code repos, and your top SAS platforms.
2174
01:16:20,200 –> 01:16:22,520
Ask for proof, not assurance, which of these apps
2175
01:16:22,520 –> 01:16:25,280
honor near real-time revocation signals,
2176
01:16:25,280 –> 01:16:28,160
and which will keep a session alive until token expiry.
2177
01:16:28,160 –> 01:16:30,680
If revocation is slow, you are granting attackers time
2178
01:16:30,680 –> 01:16:31,360
by design.
2179
01:16:31,360 –> 01:16:34,760
Fourth, how many response steps remain manual and why?
2180
01:16:34,760 –> 01:16:36,640
This is not a call to automate everything.
2181
01:16:36,640 –> 01:16:39,240
It’s a call to identify the latency you’ve normalized.
2182
01:16:39,240 –> 01:16:41,400
Ask your teams to map one identity incident
2183
01:16:41,400 –> 01:16:43,120
and to end and count the handoffs.
2184
01:16:43,120 –> 01:16:45,960
How many times does context get re-entered into a new system?
2185
01:16:45,960 –> 01:16:49,360
How many steps exist only because systems don’t talk to each other?
2186
01:16:49,360 –> 01:16:50,720
The goal is not fewer tickets.
2187
01:16:50,720 –> 01:16:53,640
The goal is fewer minutes between signal and containment.
2188
01:16:53,640 –> 01:16:55,360
Fifth, what exceptions exist?
2189
01:16:55,360 –> 01:16:57,120
Who owns them and when do they expire?
2190
01:16:57,120 –> 01:16:58,480
Executives are often the reason
2191
01:16:58,480 –> 01:17:02,040
exception culture survives, so ask for the uncomfortable list.
2192
01:17:02,040 –> 01:17:05,040
Exclusions in conditional access, bypasses for business
2193
01:17:05,040 –> 01:17:08,400
critical apps, accounts that never get access reviewed,
2194
01:17:08,400 –> 01:17:11,520
service principles with broad permissions temporarily,
2195
01:17:11,520 –> 01:17:15,360
and privileged roles that stay standing because it’s easier.
2196
01:17:15,360 –> 01:17:19,440
If an exception has no owner and no expiry, it is not an exception.
2197
01:17:19,440 –> 01:17:20,880
It is the real architecture.
2198
01:17:20,880 –> 01:17:24,160
Sixth, what is our current MTTR for identity-driven incidents
2199
01:17:24,160 –> 01:17:27,840
and to end, not a guess, not a slide, a measured baseline?
2200
01:17:27,840 –> 01:17:32,000
An MTTR broken into detect, decide, enforce, recover.
2201
01:17:32,000 –> 01:17:34,040
If your teams can’t produce those timestamps,
2202
01:17:34,040 –> 01:17:35,000
they can’t improve them.
2203
01:17:35,000 –> 01:17:37,600
If they can produce them, then leadership can fund
2204
01:17:37,600 –> 01:17:39,400
the stage that is actually slow.
2205
01:17:39,400 –> 01:17:43,880
Decision rights, enforcement mechanisms, or recovery workflows.
2206
01:17:43,880 –> 01:17:46,320
Seventh, and this is the one most leaders avoid.
2207
01:17:46,320 –> 01:17:49,160
Who has authority to act and how fast can they act
2208
01:17:49,160 –> 01:17:51,320
when the identity is politically sensitive?
2209
01:17:51,320 –> 01:17:53,320
Ask specifically about the hard cases,
2210
01:17:53,320 –> 01:17:56,000
an executive account, a production deployment identity,
2211
01:17:56,000 –> 01:17:58,400
a revenue workflow, a third party integration
2212
01:17:58,400 –> 01:18:02,360
that a business unit owns or a service principle nobody understands.
2213
01:18:02,360 –> 01:18:05,240
In those cases, does the organization have pre-approved actions
2214
01:18:05,240 –> 01:18:06,640
or does it have meetings?
2215
01:18:06,640 –> 01:18:09,120
Because an attacker doesn’t care that the identity is important,
2216
01:18:09,120 –> 01:18:10,440
they care that it is powerful.
2217
01:18:10,440 –> 01:18:12,600
If you ask these questions and you get vague answers,
2218
01:18:12,600 –> 01:18:14,440
that is not a failure of the security team.
2219
01:18:14,440 –> 01:18:16,760
That is a leadership problem, unclear intent,
2220
01:18:16,760 –> 01:18:20,600
unclear ownership, and no mandate to reduce decision latency.
2221
01:18:20,600 –> 01:18:23,240
So don’t ask your teams for a zero trust road map,
2222
01:18:23,240 –> 01:18:26,440
ask them for proof that the trust model is enforceable,
2223
01:18:26,440 –> 01:18:29,600
exceptions are governed, and response actions are pre-approved
2224
01:18:29,600 –> 01:18:30,280
and rehearsed.
2225
01:18:30,280 –> 01:18:33,640
That is what security maturity looks like when it’s real time.
2226
01:18:33,640 –> 01:18:35,840
Conclusion by security as an enabler.
2227
01:18:35,840 –> 01:18:38,480
Security maturity is safe autonomy plus fast recovery,
2228
01:18:38,480 –> 01:18:41,760
measured by MTTR, not by how many controls you can list.
2229
01:18:41,760 –> 01:18:43,440
If you want the practitioner version of this,
2230
01:18:43,440 –> 01:18:45,560
listen to the follow-up episode where we unpack
2231
01:18:45,560 –> 01:18:48,560
intra-governance, CAE, and Defender to Service
2232
01:18:48,560 –> 01:18:51,000
now responds loops in plain operational terms.
2233
01:18:51,000 –> 01:18:54,480
Subscribe to M365FM and queue that next episode now.






