Privileges are upstream of authentication
You can MFA a bad pattern into existence. If an app or automation retains broad privileges, identity hardening doesn’t matter.
MFA is powerful, but it is not architecture. Many identity compromises are not caused by weak authentication—they’re caused by flawed identity design. This note explores the structural mistakes that create systemic risk in Microsoft Entra ID and Google Workspace, and why “just turn on MFA” doesn’t solve them.
The problem isn’t a missing factor. The problem is that the wrong identities can do the wrong things in the wrong places.
When identity architecture is wrong, compensating controls—MFA, device trust, CASB, phishing gates—buy time, not safety. The key risk is who can act as whom, not how they sign in.
You can MFA a bad pattern into existence. If an app or automation retains broad privileges, identity hardening doesn’t matter.
Attackers don’t need to bypass MFA when automation, consented apps, or design flaws let them operate entirely inside your tenant.
Meaningful improvement comes from reshaping roles, delegations, and ownership, not piling more auth challenges on human logins.
These patterns enable durable compromise even when every user is forced to MFA on every login.
Automation should not impersonate humans. When it does, you’ve created a privileged service account disguised as a person.
You don’t need to “hack auth” when the user gives you admin-level scopes.
Shared identities remove the possibility of blame. They also remove the possibility of detection.
Attackers don’t care about your authentication policy. They care about leverage. Identity is the shortest path to it.
OAuth tokens, mailbox rules, apps scripts—no need to reinfect endpoints.
The riskiest entities never sign in: service accounts, shared mailboxes, integrations, and migration tooling.
Your best analysts ignore signals that don’t look like malware or brute force. Identity compromise often looks like “normal business automation.”
Recovery begins with design, not enforcement.
Require app/service accounts for all non-human processes. Assign least privilege scopes. Audit ownership quarterly.
Fewer people should be able to approve broad app scopes. Review all existing grants ≥ every 90 days.
Replace them with delegated access and traceable ownership or use a monitored automation identity.
If nobody can answer why an identity exists, it is an attacker beachhead.