“MFA means accounts are safe”
MFA reduces password replay. It does not prevent token theft, session hijack, or privileged policy changes made using already-authenticated access.
MFA dramatically reduces commodity credential attacks. But modern compromises often avoid “beating MFA” entirely; by abusing sessions, tokens, OAuth consent, and legacy authentication paths that sit outside the login challenge you think you’re enforcing.
MFA is necessary. It is not sufficient.
When leadership hears “MFA enabled,” they assume identity risk is largely mitigated. In modern environments, attackers increasingly target what MFA does not govern: existing sessions, refresh tokens, app permissions, service principals, and “allowed” access paths.
MFA reduces password replay. It does not prevent token theft, session hijack, or privileged policy changes made using already-authenticated access.
The quietest path is to reuse what already works: active sessions, refresh tokens, OAuth grants, and trusted devices.
Teams optimize for login challenges while leaving long-lived access and consent paths under-instrumented and under-governed.
These patterns vary by environment, but the strategic goal is consistent: avoid triggering MFA at all.
If an attacker obtains tokens, they can act as the user without a fresh authentication event. Tokens often outlive password resets and many “containment” actions.
Trusted device states and session cookies can preserve access. If your detection relies on “new login events,” session abuse can remain low-signal.
Malicious or over-privileged apps can retain access without interactive login. Consent is often reviewed less rigorously than user accounts, despite equivalent impact.
Protocols and older clients can bypass modern policy enforcement. If legacy auth remains enabled for compatibility, it becomes a permanent weak lane.
MFA is visible and easy to report. Session and consent risk is harder to explain, and often ignored.
Teams alert on blocked sign-ins and suspicious failures, but do not baseline or monitor successful access patterns and token behavior.
OAuth grants, service principals, and API tokens often live outside security review, despite their ability to access mail, files, and administrative functions.
MFA does not help if privileged roles are over-assigned, used for daily work, or operate from unmanaged devices and networks.
Password resets and account disablement may not invalidate all access paths quickly enough. Without token strategy, attackers persist through “remediation.”
The objective is to govern sessions, consent, and privilege; not just logins.
Track anomalous token usage, device trust patterns, impossible travel signals, unusual app access, and role changes; especially successful ones.
Require approval for high-privilege consents, enforce periodic review, and alert on new grants and permission escalation.
Identify and remove legacy authentication dependencies. Where removal is impossible, isolate and monitor those paths as high-risk exceptions.
Admin accounts should be isolated, time-bounded, and constrained by device and location. Privilege is the actual risk surface.