The network perimeter — the firewall at the edge of the corporate network that separated trusted inside from untrusted outside — made intuitive sense when all valuable assets lived on premises and all work happened on company-managed devices in company-managed offices. Neither condition holds today. Assets live in SaaS applications, cloud infrastructure, and third-party systems. Work happens from home networks, personal devices, and airports. The perimeter is not blurry — it is functionally gone.
What replaced it? Identity. The authentication event is now the primary enforcement point for enterprise security. When an employee logs into Salesforce, GitHub, Workday, and AWS from their laptop at home, the only security control that mediates all of those access events is identity. The authentication system is the new perimeter, and compromising an identity is the new equivalent of breaching the firewall.
The numbers validate this completely. CrowdStrike's 2024 Global Threat Report found that 80% of cyberattacks use identity-based techniques. The Verizon DBIR put compromised credentials at 77% of initial access events for external breaches. These are not projections — they are measured realities from incident caseloads spanning thousands of actual intrusions.
The Anatomy of Modern Credential Attacks
Understanding why identity attacks have become dominant requires understanding how adversaries actually execute them. The tooling and techniques have evolved significantly beyond simple password guessing.
Credential stuffing at industrial scale. Billions of username/password pairs from historical data breaches are freely available on underground markets. Automated stuffing tools test these credentials against target applications at rates of hundreds of thousands of attempts per hour, using distributed infrastructure to evade rate limiting. The success rate is low per credential — typically 1 to 3% — but at volume, even 1% is thousands of valid logins. Every enterprise that uses email addresses as usernames and allows password reuse from consumer accounts is vulnerable to this attack continuously.
Adversary-in-the-middle phishing. Tools like Evilginx2 and Modlishka act as reverse proxies between the victim and the legitimate authentication page, capturing not just credentials but session cookies in real time. The attacker presents a convincing copy of the target's login page, the victim authenticates normally, and the proxy captures the authenticated session token before passing it through. This attack bypasses TOTP-based MFA entirely because the session token is captured after authentication completes. It does not bypass FIDO2/passkeys, which is a primary reason phishing-resistant MFA adoption matters.
MFA push fatigue. An attacker with a valid username and password for an Okta or Azure AD account protected by push notification MFA simply attempts authentication repeatedly, generating push notifications to the victim's phone. A fraction of users, confused by the notifications or pressing approve by mistake, grant access. Several high-profile 2023 and 2024 incidents — including the MGM Resorts compromise — were initiated through MFA fatigue against help desk staff.
OAuth and token-based attacks. Modern enterprise environments heavily use OAuth, SAML, and OIDC for federated authentication. These protocols introduce token management as an attack surface: stolen OAuth tokens persist longer than session cookies, refresh tokens can be used to generate new access tokens without user interaction, and overly broad OAuth scopes grant attackers access to more resources than the attacker's initial target application. The 2022 GitHub OAuth token exposure demonstrated how a single compromised token in the CI/CD pipeline could expose hundreds of customer repositories.
Where Traditional Identity Security Falls Short
Most enterprise identity programs have three layers: directory service (Active Directory, Azure AD), authentication (SSO with MFA), and access control (role-based access control). This architecture works correctly for authorizing legitimate users. It fails to address the threat model where the legitimate user's identity has been compromised.
Once an attacker has a valid session token or an authenticated session from a compromised account, all three layers trust them completely. The SSO system validates their token. The RBAC system grants them everything the legitimate user had access to. There is no control that asks "should this authenticated entity be doing this?" — just "is this authenticated entity allowed to do this?" The difference is everything.
This gap is exactly what Identity Threat Detection and Response (ITDR) is designed to address. ITDR applies behavioral analytics to post-authentication activity: evaluating what an authenticated entity is doing, comparing it to their established baseline, and flagging deviations that suggest the session belongs to an attacker rather than the legitimate user.
Building Detection Capability for Identity Threats
Effective ITDR requires telemetry from multiple identity system layers: authentication events from the identity provider (Okta, Azure AD, Ping), SaaS application access logs (Salesforce, Workday, GitHub), cloud API calls (AWS CloudTrail, Azure Activity Log), and endpoint activity correlated to the authenticated user session. Without multi-source correlation, detection coverage has systematic gaps.
The detection logic for credential-based attacks must account for multiple attack patterns simultaneously. Impossible travel detection — authenticating from New York and London within 20 minutes — is a well-known signal, but sophisticated attackers use residential proxy networks to authenticate from IP addresses in the victim's geographic region. Detection must go deeper than geolocation.
Behavioral deviation from established baseline is more reliable than geolocation-based rules: this user has never authenticated from a mobile device before; this account has never accessed the M&A folder in SharePoint; this service account has never generated API calls to the billing system. Each of these deviations, taken alone, might have an innocent explanation. Taken in combination, with timing and sequence analysis, they build a risk picture that accurately identifies compromised accounts without relying on attack-specific signatures.
AIFox AI's ITDR capability assigns a continuous identity risk score to every user and service account, updated in real time as authentication and access events occur. When the score crosses a configured threshold, the response is automatic: force MFA re-authentication, notify the account owner, page the on-call analyst, and open a pre-built investigation package with the full context of the triggering events. Average time from initial detection signal to analyst notification: under three minutes.
Practical Steps Toward Identity-Centric Security
Moving from network-perimeter thinking to identity-centric security requires changes at multiple levels: technology, process, and architecture.
The technology foundation: deploy phishing-resistant MFA (FIDO2 hardware keys or platform passkeys) for all privileged accounts and all accounts with access to regulated data. This single change closes the adversary-in-the-middle phishing vector that is responsible for a large fraction of identity-based initial access. The investment is significant — hardware keys cost between $25 and $60 per user — but the risk reduction is proportionally large.
The architecture shift: treat each SaaS application, cloud environment, and internal system as an independent trust boundary. Do not allow OAuth tokens or session cookies from one application to extend trust to another without explicit re-evaluation. Enforce session duration limits that match the sensitivity of the resource being accessed — a 30-day SSO session is appropriate for low-sensitivity applications and inappropriate for finance systems or source code repositories.
The process change: define a credential compromise response playbook before it is needed. Who gets notified? What gets revoked? How is the account owner contacted and through what channel if their corporate email is compromised? What forensic evidence is preserved? Organizations that define these steps in advance respond in minutes; organizations improvising during an active incident respond in hours or days.
The Attacker's Perspective
One of the more useful exercises for identity security programs is to approach the environment from an attacker's perspective. Given credential access to an entry-level employee account in your organization, what can an attacker reach? What is the blast radius of a compromised account at each privilege level? What would an attacker do in the first hour, day, and week with that access?
Organizations that work through these scenarios honestly find gaps they did not know existed: service accounts with overly broad permissions that can be accessed through OAuth grant mechanisms, inactive accounts with persistent access to critical systems that were never deprovisioned, shared credentials in developer environments that expose production system access. These are not exotic attack surface elements — they are standard features of enterprise environments that grew without systematic identity hygiene.
The identity perimeter is only as strong as the weakest credential in the environment. Understanding where those weak points are — and addressing them systematically before an adversary finds them — is the core discipline of identity-centric security.
Aisha Johnson is VP of Security Research at AIFox AI and a former NSA cybersecurity analyst specializing in advanced persistent threat tracking and AI-driven detection systems.