In this episode of the M365.FM Podcast, the host challenges the traditional belief that deploying modern security controls (like MFA, EDR, Conditional Access, and Zero Trust checklists) makes an organization “secure.” Instead, true security comes from engineering trust as a system and building resilience — especially in a world where AI accelerates both attacks and defensive response.
Key insights include:
Coverage ≠ Control — Having lots of security tools and green dashboards does not mean you’re actually secure; dashboards show deployment, not risk reality.
Identity is the new control plane — Authorization (who can do what) is now where real breaches happen, not just authentication (who can log in).
Breaches often occur through “normal business behavior” thanks to over-permissioned identities and silent privilege creep.
Resilience is the goal, not prevention — Leadership should shift from trying to stop every incident to minimizing impact when incidents inevitably occur.
Mean Time to Respond (MTTR) becomes a core metric for security effectiveness, replacing traditional SOC metrics.
The episode emphasizes orchestration, automation, and governance (e.g., dynamic trust decisions, fast revocation, and automated containment), which together make security adaptive rather than static.
In short, security is no longer about stacking controls — it’s about designing systems that make trust enforceable, measurable, and recoverable when threats evolve and AI speeds everything up.
Security needs to evolve from a prevention mindset to a resilience discipline, especially in the age of AI where speed and automation redefine risk.
🧠 Key Concepts Covered
1. The Illusion of Control
Tools and dashboards give a false sense of security.
Security maturity is not measured by technology deployment.
2. Identity as the Control Plane
Authentication isn’t enough — authorization decisions govern access everywhere.
Human and machine identities (e.g., service accounts, automation, AI agents) must be controlled intentionally.
3. Authorization Failures vs. Authentication Failures
Real incidents often look like legitimate business actions, not classic attacks.
Legacy assumptions about network perimeters and permissions are outdated.
4. From Prevention to Resilience
No-breach goals are unrealistic; instead aim to:
Limit blast radius
Reduce recovery time
Preserve business continuity
5. Mean Time to Respond (MTTR) as a KPI
Traditional security metrics (e.g., controls deployed, alerts generated) are less meaningful than time-to-contain and recover.
6. Zero Trust as Operating Model
Zero Trust isn’t a product switch — it requires continuous evaluation and enforceable trust decisions.
7. Automation & Decision Speed
Tactical automation (e.g., governance workflows, containment playbooks) beats manual response in reducing latency.
🔑 Takeaway for Leaders
Executives should shift focus away from checkbox security compliance toward measurable resilience outcomes — specifically reducing decision and response latency in identity-driven incidents.
🛠️ Practical Security Principles Highlighted
Enforce scoped, time-bound access
Promote identity governance with ownership and accountability
Build pre-defined reversible containment actions
Use automation to shorten human latency
Treat trust decisions as a continuous process, not a one-off setup
1
00:00:00,000 --> 00:00:02,960
Most organizations think securities are checklist, MFA,
2
00:00:02,960 --> 00:00:06,680
EDR, a pile of policies, and a dashboard that's mostly green.
3
00:00:06,680 --> 00:00:09,560
That setup feels like control, it isn't, it's coverage,
4
00:00:09,560 --> 00:00:11,360
and coverage doesn't equal resilience.
5
00:00:11,360 --> 00:00:14,640
This episode is about the uncomfortable shift leaders have to make,
6
00:00:14,640 --> 00:00:16,840
from buying controls to designing trust
7
00:00:16,840 --> 00:00:19,040
and from chasing no incidents to engineering,
8
00:00:19,040 --> 00:00:21,000
fast containment and recovery.
9
00:00:21,000 --> 00:00:23,080
We'll anchor it in three Microsoft realities,
10
00:00:23,080 --> 00:00:25,560
intra-governance and identity threat detection,
11
00:00:25,560 --> 00:00:27,400
continuous access evaluation,
12
00:00:27,400 --> 00:00:29,960
and defender signals routed into service now,
13
00:00:29,960 --> 00:00:33,480
because the goal is decision speed, not feature completeness.
14
00:00:33,480 --> 00:00:36,760
Why well-secured organizations still get breached?
15
00:00:36,760 --> 00:00:38,200
Here's what most people miss.
16
00:00:38,200 --> 00:00:41,400
Breaches don't happen because an organization forgot to buy a product.
17
00:00:41,400 --> 00:00:44,600
They happen because the organization never updated its trust model,
18
00:00:44,600 --> 00:00:46,680
security teams deploy controls.
19
00:00:46,680 --> 00:00:50,200
The business keeps operating on assumptions that were true 10 years ago,
20
00:00:50,200 --> 00:00:53,600
that the network is a boundary, that authentication is a finish line,
21
00:00:53,600 --> 00:00:55,440
that permissions represent intent,
22
00:00:55,440 --> 00:00:58,000
and that alerts are the same thing as response.
23
00:00:58,000 --> 00:01:01,440
Those assumptions don't fail loudly, they decay quietly.
24
00:01:01,440 --> 00:01:03,240
And attackers don't need to break in anymore.
25
00:01:03,240 --> 00:01:05,160
They walk the pathways you already built.
26
00:01:05,160 --> 00:01:07,480
A modern breach story usually starts with identity,
27
00:01:07,480 --> 00:01:10,200
not because identity is weak, but because identity is everywhere.
28
00:01:10,200 --> 00:01:13,520
Cloud, SAS, API's, automation, contractors, service accounts,
29
00:01:13,520 --> 00:01:15,680
and now agents, identity isn't the directory,
30
00:01:15,680 --> 00:01:17,640
it's the control plane, that distinction matters
31
00:01:17,640 --> 00:01:21,200
because your control plane isn't protected by the existence of controls.
32
00:01:21,200 --> 00:01:24,320
It's protected by whether those controls enforce your intent.
33
00:01:24,320 --> 00:01:28,080
Most well-secured environments are rich in prevention and poor in constraint.
34
00:01:28,080 --> 00:01:31,320
You see it in the gap between authentication and authorization.
35
00:01:31,320 --> 00:01:34,760
They might have fishing-resistant MFA and still have reckless entitlements.
36
00:01:34,760 --> 00:01:36,720
They might have conditional access policies
37
00:01:36,720 --> 00:01:39,680
and still allow broad access packages that never expire.
38
00:01:39,680 --> 00:01:41,360
They might have privileged access tooling
39
00:01:41,360 --> 00:01:42,800
and still tolerate standing power
40
00:01:42,800 --> 00:01:45,320
because approvals are slow and exceptions are easier.
41
00:01:45,320 --> 00:01:46,600
Attackers understand this.
42
00:01:46,600 --> 00:01:50,360
They don't fight your MFA head-on if they can steal a token after the MFA challenge.
43
00:01:50,360 --> 00:01:52,320
They don't brute force a firewall
44
00:01:52,320 --> 00:01:55,560
if they can use a perfectly valid identity to call an API.
45
00:01:55,560 --> 00:01:57,720
They don't need to exploit a vulnerability
46
00:01:57,720 --> 00:02:00,880
if the environment already grants the privileges that do the damage.
47
00:02:00,880 --> 00:02:02,760
So when leaders ask, "How did this happen?"
48
00:02:02,760 --> 00:02:04,080
We had everything turned on.
49
00:02:04,080 --> 00:02:07,560
The correct answer is, "You had controls, but you didn't have enforced trust."
50
00:02:07,560 --> 00:02:09,400
Then there's the green dashboard problem.
51
00:02:09,400 --> 00:02:12,520
Dashboards show deployment state, not risk reality.
52
00:02:12,520 --> 00:02:15,000
We enabled feature X is not the same as feature X
53
00:02:15,000 --> 00:02:17,040
is constraining the right pathways.
54
00:02:17,040 --> 00:02:18,640
Attendant can show high compliance
55
00:02:18,640 --> 00:02:21,040
while still carrying structural exposure.
56
00:02:21,040 --> 00:02:23,800
Dormant accounts, stale guest access,
57
00:02:23,800 --> 00:02:25,560
over-permissioned applications,
58
00:02:25,560 --> 00:02:27,480
service principles with broad rights
59
00:02:27,480 --> 00:02:30,200
and exception policies that never die.
60
00:02:30,200 --> 00:02:32,440
Controls drift because organizations drift.
61
00:02:32,440 --> 00:02:35,800
Entitlements accumulate, policy exceptions become permanent
62
00:02:35,800 --> 00:02:37,280
and the system keeps working,
63
00:02:37,280 --> 00:02:39,400
which is exactly why the risk stays invisible.
64
00:02:39,400 --> 00:02:41,160
This is why compliance isn't the finish line.
65
00:02:41,160 --> 00:02:44,880
It's a snapshot and snapshots don't stop moving systems from eroding.
66
00:02:44,880 --> 00:02:47,120
A breach in that sense is not a moral failure.
67
00:02:47,120 --> 00:02:48,680
It's system behavior.
68
00:02:48,680 --> 00:02:50,240
Systems optimize for throughput.
69
00:02:50,240 --> 00:02:52,000
People optimize for getting work done.
70
00:02:52,000 --> 00:02:54,480
Security teams optimize for what they can measure.
71
00:02:54,480 --> 00:02:57,160
If the organization measures how many controls are deployed,
72
00:02:57,160 --> 00:02:58,600
it will get deployed controls.
73
00:02:58,600 --> 00:03:02,000
If it measures how fast can we contain identity-driven incidents
74
00:03:02,000 --> 00:03:04,920
end to end, it will build the ability to contain them.
75
00:03:04,920 --> 00:03:08,080
That is the difference between prevention, theater and resilience.
76
00:03:08,080 --> 00:03:09,480
And AI doesn't make this easier.
77
00:03:09,480 --> 00:03:10,440
It makes it faster.
78
00:03:10,440 --> 00:03:13,680
AI amplifies the speed of both offense and defense.
79
00:03:13,680 --> 00:03:15,600
It reduces the cost of generating fishing,
80
00:03:15,600 --> 00:03:17,600
social engineering and automation.
81
00:03:17,600 --> 00:03:20,200
But it also reduces the cost of correlating signals
82
00:03:20,200 --> 00:03:22,520
summarizing incidents and orchestrating response
83
00:03:22,520 --> 00:03:24,760
if you design the system to act on those signals.
84
00:03:24,760 --> 00:03:27,880
And if you don't, AI just accelerates your alert volume.
85
00:03:27,880 --> 00:03:30,320
You end up with higher telemetry, more noise
86
00:03:30,320 --> 00:03:31,920
and the same decision latency.
87
00:03:31,920 --> 00:03:32,920
That is not progress.
88
00:03:32,920 --> 00:03:34,240
That is expensive confusion.
89
00:03:34,240 --> 00:03:38,160
So what does well-secured but still breached look like in executive terms?
90
00:03:38,160 --> 00:03:42,000
It looks like an organization that can detect but can't decide.
91
00:03:42,000 --> 00:03:45,480
Or can decide but can't enforce or can enforce but can't recover quickly.
92
00:03:45,480 --> 00:03:46,800
Each hand of ads time.
93
00:03:46,800 --> 00:03:48,520
Each manual step adds delay.
94
00:03:48,520 --> 00:03:50,040
Each exception adds ambiguity.
95
00:03:50,040 --> 00:03:52,720
Over time you don't have a deterministic security model anymore.
96
00:03:52,720 --> 00:03:53,960
You have conditional chaos.
97
00:03:53,960 --> 00:03:56,440
And that's why organizations still get breached.
98
00:03:56,440 --> 00:03:58,000
Not because they lacked tools.
99
00:03:58,000 --> 00:04:01,200
Because the trust system was never engineered as a closed loop.
100
00:04:01,200 --> 00:04:04,440
Identity signals into policy decisions, decisions into enforcement,
101
00:04:04,440 --> 00:04:08,040
enforcement into response, response into recovery and recovery into learning.
102
00:04:08,040 --> 00:04:12,840
Without that loop, every control is just a static gate on a dynamic highway.
103
00:04:12,840 --> 00:04:14,280
Redefining success.
104
00:04:14,280 --> 00:04:16,880
From prevention fantasy to resilience discipline,
105
00:04:16,880 --> 00:04:20,360
leaders keep getting trapped by a definition of success that sounds reasonable
106
00:04:20,360 --> 00:04:22,160
but collapses in practice.
107
00:04:22,160 --> 00:04:23,600
Fewer incidents.
108
00:04:23,600 --> 00:04:24,480
It's a nice headline.
109
00:04:24,480 --> 00:04:25,720
It's also not a strategy.
110
00:04:25,720 --> 00:04:26,600
Prevention matters.
111
00:04:26,600 --> 00:04:28,800
Nobody is arguing for neglect.
112
00:04:28,800 --> 00:04:30,600
But prevention is probability management.
113
00:04:30,600 --> 00:04:32,640
It reduces the likelihood of an incident.
114
00:04:32,640 --> 00:04:34,720
Resilience is impact management.
115
00:04:34,720 --> 00:04:36,680
It reduces the cost, the downtime,
116
00:04:36,680 --> 00:04:39,480
and the organizational confusion when the incident happens anyway.
117
00:04:39,480 --> 00:04:42,400
That distinction matters because probability is never zero
118
00:04:42,400 --> 00:04:45,040
and the business still has to operate while you're cleaning up.
119
00:04:45,040 --> 00:04:48,760
The uncomfortable truth is that the goal is not no breaches.
120
00:04:48,760 --> 00:04:50,240
The goal is bounded failure.
121
00:04:50,240 --> 00:04:53,240
Bounded failure means the system anticipates compromise
122
00:04:53,240 --> 00:04:55,400
and limits what a compromise identity can do,
123
00:04:55,400 --> 00:04:58,080
how far it can move and how long it can persist.
124
00:04:58,080 --> 00:05:00,800
It treats incidents as inevitable system states,
125
00:05:00,800 --> 00:05:03,040
not unexpected moral violations.
126
00:05:03,040 --> 00:05:07,040
And it builds the muscle to contain those states quickly and repeatedly.
127
00:05:07,040 --> 00:05:08,960
This is where security programs get honest.
128
00:05:08,960 --> 00:05:11,320
A prevention first program tends to behave like this.
129
00:05:11,320 --> 00:05:13,840
Deploy more controls, tighten policies, increase friction,
130
00:05:13,840 --> 00:05:15,400
and hope the incident curve goes down.
131
00:05:15,400 --> 00:05:16,480
Sometimes it does.
132
00:05:16,480 --> 00:05:18,440
But the second order effect shows up later.
133
00:05:18,440 --> 00:05:20,920
The business finds workarounds, the exceptions pile up,
134
00:05:20,920 --> 00:05:23,040
and security becomes a cue.
135
00:05:23,040 --> 00:05:25,200
You've improved security in the dashboard sense
136
00:05:25,200 --> 00:05:28,080
while increasing organizational entropy in the real sense.
137
00:05:28,080 --> 00:05:30,440
A resilience first program behaves differently.
138
00:05:30,440 --> 00:05:33,200
It assumes compromise designs for rapid revocation,
139
00:05:33,200 --> 00:05:35,880
reduces standing privilege, automates containment steps,
140
00:05:35,880 --> 00:05:37,520
and rehearses decision making.
141
00:05:37,520 --> 00:05:39,280
It doesn't chase perfect defense.
142
00:05:39,280 --> 00:05:40,720
It builds repeatable recovery.
143
00:05:40,720 --> 00:05:42,560
If you want board-facing language for this,
144
00:05:42,560 --> 00:05:43,960
don't talk about products.
145
00:05:43,960 --> 00:05:45,080
Talk about three outcomes.
146
00:05:45,080 --> 00:05:48,040
Continuity, trust preservation, and decision speed.
147
00:05:48,040 --> 00:05:49,480
Continuity is obvious.
148
00:05:49,480 --> 00:05:50,840
Can the business keep operating?
149
00:05:50,840 --> 00:05:53,480
Or does an identity incident turn into a multi-day outage
150
00:05:53,480 --> 00:05:55,440
because nobody can tell what access is safe?
151
00:05:55,440 --> 00:05:57,920
Trust preservation is less obvious, but more expensive.
152
00:05:57,920 --> 00:05:59,720
Can customers, partners, and regulators
153
00:05:59,720 --> 00:06:01,840
believe you're in control during the incident?
154
00:06:01,840 --> 00:06:04,600
Or does the story become, we didn't know what we had,
155
00:06:04,600 --> 00:06:06,520
so we shut everything down?
156
00:06:06,520 --> 00:06:08,760
Decision speed is the actual multiplier.
157
00:06:08,760 --> 00:06:11,280
How fast can the organization detect, decide,
158
00:06:11,280 --> 00:06:14,440
and enforce, end to end without a dozen handoffs and three committees?
159
00:06:14,440 --> 00:06:16,520
This is why MTTR is not SOC trivia.
160
00:06:16,520 --> 00:06:18,480
It's executive telemetry.
161
00:06:18,480 --> 00:06:21,680
Mean time to respond or recover depending on how you define it
162
00:06:21,680 --> 00:06:23,400
turns an abstract security posture
163
00:06:23,400 --> 00:06:25,440
into a measurable operating capability.
164
00:06:25,440 --> 00:06:27,320
It forces the right conversations.
165
00:06:27,320 --> 00:06:29,480
Who has authority to disable an identity?
166
00:06:29,480 --> 00:06:31,720
Who can revoke access across critical apps?
167
00:06:31,720 --> 00:06:33,120
Which actions are automated?
168
00:06:33,120 --> 00:06:35,120
Which require approval and why?
169
00:06:35,120 --> 00:06:36,480
Where are the manual steps?
170
00:06:36,480 --> 00:06:39,920
And what risk are those steps supposedly managing?
171
00:06:39,920 --> 00:06:41,320
And it exposes the usual lie.
172
00:06:41,320 --> 00:06:42,760
We can respond quickly.
173
00:06:42,760 --> 00:06:44,800
Most organizations can respond quickly
174
00:06:44,800 --> 00:06:47,600
if the right person is awake, available, and empowered.
175
00:06:47,600 --> 00:06:50,040
That is not a capability, that is a dependency.
176
00:06:50,040 --> 00:06:52,600
Resilience discipline replaces heroics with design.
177
00:06:52,600 --> 00:06:55,280
It builds the response pathways before the incident.
178
00:06:55,280 --> 00:06:56,880
When everyone is calm and rational,
179
00:06:56,880 --> 00:06:58,560
instead of inventing their mid-breach
180
00:06:58,560 --> 00:07:00,880
when fear and politics take over.
181
00:07:00,880 --> 00:07:02,880
It also acknowledges a basic system law.
182
00:07:02,880 --> 00:07:05,000
Every manual handoff is a latency generator.
183
00:07:05,000 --> 00:07:07,200
Every exception is an ambiguity generator.
184
00:07:07,200 --> 00:07:09,120
Every ambiguity increases blast radius
185
00:07:09,120 --> 00:07:11,600
because people hesitate and attackers don't.
186
00:07:11,600 --> 00:07:14,840
This is also where AI is either your advantage or your tax.
187
00:07:14,840 --> 00:07:16,760
If AI is only used to summarize alerts,
188
00:07:16,760 --> 00:07:18,920
you get prettier descriptions of the same delays.
189
00:07:18,920 --> 00:07:21,840
If AI is used to compress the detect to decide phase
190
00:07:21,840 --> 00:07:24,880
and trigger auditable, reversible containment actions,
191
00:07:24,880 --> 00:07:27,480
then you get something that looks like real resilience.
192
00:07:27,480 --> 00:07:30,040
Less time spent arguing about what's happening,
193
00:07:30,040 --> 00:07:32,160
more time spent making it stop.
194
00:07:32,160 --> 00:07:34,080
So success needs a different definition.
195
00:07:34,080 --> 00:07:36,520
Success is not, we didn't have incidents this quarter.
196
00:07:36,520 --> 00:07:39,080
That's whether or not engineering success is,
197
00:07:39,080 --> 00:07:41,800
when identity-driven incidents occur and they will,
198
00:07:41,800 --> 00:07:43,680
the organization contains them in business time
199
00:07:43,680 --> 00:07:45,520
recovers without panic and learns
200
00:07:45,520 --> 00:07:47,320
without repeating the same failure mode.
201
00:07:47,320 --> 00:07:48,800
That's resilience.
202
00:07:48,800 --> 00:07:50,680
And once you adopt that definition,
203
00:07:50,680 --> 00:07:52,520
the rest of the strategy becomes obvious.
204
00:07:52,520 --> 00:07:54,120
You stop chasing control coverage
205
00:07:54,120 --> 00:07:55,680
and start designing the trust system
206
00:07:55,680 --> 00:07:57,680
that controls are supposed to enforce.
207
00:07:57,680 --> 00:08:00,320
Identity is the control plane, not a directory.
208
00:08:00,320 --> 00:08:02,320
Most organizations still talk about identity
209
00:08:02,320 --> 00:08:04,840
like it's a shared phone book, a place where users live,
210
00:08:04,840 --> 00:08:06,840
a place where groups live, a place you sync to,
211
00:08:06,840 --> 00:08:08,360
so Microsoft 365 works.
212
00:08:08,360 --> 00:08:09,800
That mental model is obsolete.
213
00:08:09,800 --> 00:08:11,240
Identity is not a directory.
214
00:08:11,240 --> 00:08:13,240
It is the control plane for the enterprise.
215
00:08:13,240 --> 00:08:14,960
It is the distributed decision engine
216
00:08:14,960 --> 00:08:16,720
that decides who can touch what,
217
00:08:16,720 --> 00:08:18,560
from where, using which device,
218
00:08:18,560 --> 00:08:21,360
under which conditions, with which level of confidence.
219
00:08:21,360 --> 00:08:23,040
Every time an employee opens a file,
220
00:08:23,040 --> 00:08:24,680
a workload calls an API,
221
00:08:24,680 --> 00:08:26,920
a contractor accesses a project site
222
00:08:26,920 --> 00:08:29,000
or an admin attempts a privileged action.
223
00:08:29,000 --> 00:08:30,920
The business is not logging in.
224
00:08:30,920 --> 00:08:33,400
The business is running an authorization decision.
225
00:08:33,400 --> 00:08:35,320
And the uncomfortable part is that the system
226
00:08:35,320 --> 00:08:37,000
makes those decisions continuously
227
00:08:37,000 --> 00:08:39,240
at scale across hundreds of services
228
00:08:39,240 --> 00:08:41,960
with a default posture that does not care about your intent.
229
00:08:41,960 --> 00:08:43,680
It cares about your configuration.
230
00:08:43,680 --> 00:08:46,360
This is why identity strategy is not an IT topic.
231
00:08:46,360 --> 00:08:47,880
It's operational architecture.
232
00:08:47,880 --> 00:08:49,760
The control plane is where business workflows
233
00:08:49,760 --> 00:08:51,120
become enforceable rules.
234
00:08:51,120 --> 00:08:53,480
If you design it well, autonomy becomes safe.
235
00:08:53,480 --> 00:08:56,040
If you design it poorly, autonomy becomes an incident.
236
00:08:56,040 --> 00:08:58,360
But this is also why the network stop being your boundary.
237
00:08:58,360 --> 00:08:59,840
Networks are still useful.
238
00:08:59,840 --> 00:09:02,600
They still matter for segmentation, routing, inspection,
239
00:09:02,600 --> 00:09:03,920
and reducing exposure.
240
00:09:03,920 --> 00:09:06,920
But they are no longer the thing that defines inside.
241
00:09:06,920 --> 00:09:09,640
Cloud and SAS dissolve that assumption years ago.
242
00:09:09,640 --> 00:09:12,040
Users sit on unmanaged networks, devices,
243
00:09:12,040 --> 00:09:14,280
roam, apps live outside your perimeter,
244
00:09:14,280 --> 00:09:17,240
and internal traffic often never touches your infrastructure.
245
00:09:17,240 --> 00:09:18,440
So trust moved.
246
00:09:18,440 --> 00:09:20,200
Not because Microsoft had a marketing moment,
247
00:09:20,200 --> 00:09:22,760
but because the architecture forced it to move.
248
00:09:22,760 --> 00:09:25,320
Trust now attaches to claims who the subject is,
249
00:09:25,320 --> 00:09:26,520
what the device looks like,
250
00:09:26,520 --> 00:09:28,280
how risky the behavior appears,
251
00:09:28,280 --> 00:09:31,000
what the session is doing, and what the resource is.
252
00:09:31,000 --> 00:09:33,080
In this terms, every access flow becomes
253
00:09:33,080 --> 00:09:36,040
subject policy decision, policy enforcement resource.
254
00:09:36,040 --> 00:09:37,480
Leaders don't need the diagram.
255
00:09:37,480 --> 00:09:38,760
They need the implication.
256
00:09:38,760 --> 00:09:41,480
Authorization is now the primary business risk surface.
257
00:09:41,480 --> 00:09:42,760
And that surface is huge.
258
00:09:42,760 --> 00:09:43,960
It's humans, yes.
259
00:09:43,960 --> 00:09:45,960
But it's also service principles,
260
00:09:45,960 --> 00:09:47,800
managed identities, automation accounts,
261
00:09:47,800 --> 00:09:49,320
connectors, third party apps,
262
00:09:49,320 --> 00:09:52,680
and increasingly AI agents that act on behalf of users.
263
00:09:52,680 --> 00:09:55,320
This is where the human machine blur becomes a governance problem,
264
00:09:55,320 --> 00:09:57,160
not a futuristic curiosity.
265
00:09:57,160 --> 00:09:59,560
Machine identities can outnumber humans dramatically
266
00:09:59,560 --> 00:10:00,840
in real enterprises,
267
00:10:00,840 --> 00:10:03,000
and they don't complain when you over-permission them.
268
00:10:03,000 --> 00:10:05,000
They just keep running, quietly.
269
00:10:05,000 --> 00:10:07,160
Perfectly, until they're abused.
270
00:10:07,160 --> 00:10:09,800
When identity is the control plane,
271
00:10:09,800 --> 00:10:12,680
then security maturity becomes less about how many tools you bought
272
00:10:12,680 --> 00:10:15,800
and more about how accurately you can answer a few basic questions.
273
00:10:15,800 --> 00:10:16,760
Who has access?
274
00:10:16,760 --> 00:10:17,640
Why do they have it?
275
00:10:17,640 --> 00:10:19,320
For how long? Under what conditions?
276
00:10:19,320 --> 00:10:21,400
And what happens when those conditions change?
277
00:10:21,400 --> 00:10:23,800
Most organizations can answer the first question
278
00:10:23,800 --> 00:10:25,640
incompletely, the second question,
279
00:10:25,640 --> 00:10:27,320
narratively, the third question,
280
00:10:27,320 --> 00:10:28,760
rarely, and the fourth question
281
00:10:28,760 --> 00:10:31,000
with a policy document, nobody enforces.
282
00:10:31,000 --> 00:10:33,880
The last question is the one that decides whether you have resilience
283
00:10:33,880 --> 00:10:35,080
or just optimism,
284
00:10:35,080 --> 00:10:37,320
because identity isn't only about allowing access,
285
00:10:37,320 --> 00:10:39,160
it's about revoking it, fast.
286
00:10:39,160 --> 00:10:40,280
In a directory mindset,
287
00:10:40,280 --> 00:10:42,520
revocation is an administrative event.
288
00:10:42,520 --> 00:10:43,800
Someone disables an account,
289
00:10:43,800 --> 00:10:45,240
someone removes a group membership,
290
00:10:45,240 --> 00:10:46,600
someone closes a ticket.
291
00:10:46,600 --> 00:10:47,880
In a control plane mindset,
292
00:10:47,880 --> 00:10:50,200
revocation is a containment mechanism.
293
00:10:50,200 --> 00:10:51,800
It is part of incident response.
294
00:10:51,800 --> 00:10:53,480
It is supposed to happen in business time,
295
00:10:53,480 --> 00:10:54,600
not IT time.
296
00:10:54,600 --> 00:10:57,240
This is also why the identity plane is where governance
297
00:10:57,240 --> 00:10:58,760
either exists or it doesn't.
298
00:10:58,760 --> 00:11:01,160
Governance isn't a compliance activity you do annually.
299
00:11:01,160 --> 00:11:02,440
Governance is the mechanism
300
00:11:02,440 --> 00:11:04,280
that prevents entitlement drift
301
00:11:04,280 --> 00:11:06,200
from turning into permanent over-pimission.
302
00:11:06,200 --> 00:11:08,120
Drift is what happens when every joiner,
303
00:11:08,120 --> 00:11:09,560
mover, lever, contractor,
304
00:11:09,560 --> 00:11:12,520
and exception creates a small, reasonable access decision
305
00:11:12,520 --> 00:11:14,040
and nobody ever takes it back.
306
00:11:14,040 --> 00:11:17,000
Over time, the organization doesn't have access by design.
307
00:11:17,000 --> 00:11:18,440
It has access by archaeology
308
00:11:18,440 --> 00:11:20,440
and the control plane preserves all of it.
309
00:11:20,440 --> 00:11:22,280
So when leaders say we trust our people,
310
00:11:22,280 --> 00:11:24,360
that's fine, but the system doesn't trust people.
311
00:11:24,360 --> 00:11:25,880
It trusts claims and permissions.
312
00:11:25,880 --> 00:11:27,960
If permissions don't reflect business intent,
313
00:11:27,960 --> 00:11:29,480
then the system will authorize things
314
00:11:29,480 --> 00:11:31,480
the business never consciously approved.
315
00:11:31,480 --> 00:11:33,000
That's not a security failure.
316
00:11:33,000 --> 00:11:34,520
That's predictable system behavior.
317
00:11:34,520 --> 00:11:36,360
Once identity becomes the control plane,
318
00:11:36,360 --> 00:11:38,520
you stop asking, did they authenticate?
319
00:11:38,520 --> 00:11:39,880
And you start asking,
320
00:11:39,880 --> 00:11:42,120
what does this identity allow them to change,
321
00:11:42,120 --> 00:11:44,760
exfiltrate, approve, disable or persist?
322
00:11:44,760 --> 00:11:46,120
That's where business impact lives.
323
00:11:46,120 --> 00:11:48,600
And that is the transition point for the rest of this episode.
324
00:11:48,600 --> 00:11:50,520
The failure mode is not login.
325
00:11:50,520 --> 00:11:53,000
It's authorization and entitlement drift.
326
00:11:53,000 --> 00:11:55,640
Authorization failures beat authentication failures.
327
00:11:55,640 --> 00:11:57,640
MFA can be perfect and you can still lose.
328
00:11:57,640 --> 00:11:59,080
That sentence annoys people
329
00:11:59,080 --> 00:12:02,120
because MFA is the sacred cow of identity security.
330
00:12:02,120 --> 00:12:02,920
And it should be.
331
00:12:02,920 --> 00:12:06,040
Strong authentication removes an entire class of cheap attacks.
332
00:12:06,040 --> 00:12:07,800
But authentication is a gate.
333
00:12:07,800 --> 00:12:09,080
Authorization is the map.
334
00:12:09,080 --> 00:12:10,840
If the map is wrong, the gate doesn't matter.
335
00:12:10,840 --> 00:12:13,400
Most incident reviews obsess over how the attacker got in.
336
00:12:13,400 --> 00:12:15,560
The more useful question is what the attacker could do
337
00:12:15,560 --> 00:12:16,600
after they were in.
338
00:12:16,600 --> 00:12:17,640
That's authorization.
339
00:12:17,640 --> 00:12:18,600
That's entitlements.
340
00:12:18,600 --> 00:12:20,360
That's the permissions graph you built
341
00:12:20,360 --> 00:12:23,240
over years of reasonable decisions and never revisited.
342
00:12:23,240 --> 00:12:24,680
And the real failure mode is that
343
00:12:24,680 --> 00:12:26,840
authorization errors look like normal business.
344
00:12:26,840 --> 00:12:28,360
A privileged user downloads data.
345
00:12:28,360 --> 00:12:30,360
An automation account exports content.
346
00:12:30,360 --> 00:12:32,040
A service principle reads a directory.
347
00:12:32,040 --> 00:12:33,560
An admin disables a control.
348
00:12:33,560 --> 00:12:36,280
These are all legitimate actions in the right context.
349
00:12:36,280 --> 00:12:39,880
That's why authorization failures beat authentication failures.
350
00:12:39,880 --> 00:12:41,720
They hide inside allowed behavior.
351
00:12:41,720 --> 00:12:43,720
They're not break class events.
352
00:12:43,720 --> 00:12:45,800
They are business as usual events performed
353
00:12:45,800 --> 00:12:48,680
by the wrong actor at the wrong time for the wrong reason.
354
00:12:48,680 --> 00:12:50,840
This is also why token theft is so effective.
355
00:12:50,840 --> 00:12:53,160
The attacker doesn't need to defeat authentication
356
00:12:53,160 --> 00:12:55,880
if they can reuse the session after authentication.
357
00:12:55,880 --> 00:12:57,560
Now the system sees a valid token
358
00:12:57,560 --> 00:12:59,960
and the policy engine does what it was configured to do.
359
00:12:59,960 --> 00:13:02,840
Authorize your expensive identity controls become irrelevant
360
00:13:02,840 --> 00:13:04,920
because the attacker is no longer trying to log in.
361
00:13:04,920 --> 00:13:07,240
They're trying to act which brings us to privilege creep.
362
00:13:07,240 --> 00:13:09,000
Privileged creep is not a misconfiguration.
363
00:13:09,000 --> 00:13:10,440
It is an organizational default.
364
00:13:10,440 --> 00:13:13,560
Every organization hires, promotes, reorganizes,
365
00:13:13,560 --> 00:13:15,960
uses contractors, launches projects
366
00:13:15,960 --> 00:13:18,840
and grants temporary access to get work done.
367
00:13:18,840 --> 00:13:21,800
Access accumulates because removing access costs time
368
00:13:21,800 --> 00:13:23,480
and creates risk of breaking something.
369
00:13:23,480 --> 00:13:24,440
So people avoid it.
370
00:13:24,440 --> 00:13:26,840
Over time the default posture becomes
371
00:13:26,840 --> 00:13:29,240
keep access unless there's a reason to remove it.
372
00:13:29,240 --> 00:13:31,720
That is backwards but it feels safe operationally
373
00:13:31,720 --> 00:13:32,680
so it persists.
374
00:13:32,680 --> 00:13:35,080
This is where least privilege becomes a slogan
375
00:13:35,080 --> 00:13:36,440
instead of a system property.
376
00:13:36,440 --> 00:13:38,280
Least privilege is not something you declare.
377
00:13:38,280 --> 00:13:41,080
It is something you enforce through life cycle design,
378
00:13:41,080 --> 00:13:44,520
time limits, approvals, reviews and clear ownership.
379
00:13:44,520 --> 00:13:47,560
If those mechanisms aren't built into the way access is granted,
380
00:13:47,560 --> 00:13:50,920
the organization will drift toward maximum privilege over time.
381
00:13:50,920 --> 00:13:51,560
Always.
382
00:13:51,560 --> 00:13:52,680
That's not cynicism.
383
00:13:52,680 --> 00:13:53,720
That's entropy.
384
00:13:53,720 --> 00:13:55,640
And privilege creep isn't limited to humans.
385
00:13:55,640 --> 00:13:57,880
Non-human identities accumulate faster
386
00:13:57,880 --> 00:13:59,640
because they don't show up in org charts
387
00:13:59,640 --> 00:14:01,320
and they don't rotate roles.
388
00:14:01,320 --> 00:14:03,400
An application gets permissions for a project.
389
00:14:03,400 --> 00:14:04,200
The project ends.
390
00:14:04,200 --> 00:14:05,240
The permissions remain.
391
00:14:05,240 --> 00:14:07,000
A connector gets broad graph access
392
00:14:07,000 --> 00:14:08,440
because it needed it once.
393
00:14:08,440 --> 00:14:09,720
Nobody narrows it later.
394
00:14:09,720 --> 00:14:12,680
These identities are quiet, powerful and rarely reviewed.
395
00:14:12,680 --> 00:14:14,440
They are ideal attack infrastructure.
396
00:14:14,440 --> 00:14:16,440
So when leaders think identity risk,
397
00:14:16,440 --> 00:14:18,760
they picture stolen passwords and fishing.
398
00:14:18,760 --> 00:14:20,680
That's the entry point, not the impact surface.
399
00:14:20,680 --> 00:14:23,080
The impact surface is who can approve spend,
400
00:14:23,080 --> 00:14:24,920
who can access regulated data,
401
00:14:24,920 --> 00:14:27,560
who can create or modify conditional access policies,
402
00:14:27,560 --> 00:14:29,000
who can grant app consent,
403
00:14:29,000 --> 00:14:30,520
who can create new identities,
404
00:14:30,520 --> 00:14:32,120
who can change audit settings,
405
00:14:32,120 --> 00:14:34,280
and who can disable the tools you rely on
406
00:14:34,280 --> 00:14:35,480
to detect compromise.
407
00:14:35,480 --> 00:14:38,680
In other words, the risk concentrates in change authority.
408
00:14:38,680 --> 00:14:40,600
If an identity can change the environment,
409
00:14:40,600 --> 00:14:43,320
then that identity is effectively part of your control plane.
410
00:14:43,320 --> 00:14:45,640
And control plane identities need different rules,
411
00:14:45,640 --> 00:14:46,920
reduced standing privilege,
412
00:14:46,920 --> 00:14:48,120
stronger session constraints,
413
00:14:48,120 --> 00:14:50,360
more scrutiny and faster revocation.
414
00:14:50,360 --> 00:14:51,960
This is also where over permission
415
00:14:51,960 --> 00:14:53,800
becomes business process debt.
416
00:14:53,800 --> 00:14:56,680
IT didn't accidentally grant broad access.
417
00:14:56,680 --> 00:14:57,960
The business demanded speed,
418
00:14:57,960 --> 00:14:59,560
and the easiest way to deliver speed
419
00:14:59,560 --> 00:15:01,000
was to grant access broadly
420
00:15:01,000 --> 00:15:02,360
and hope nobody abuses it.
421
00:15:02,360 --> 00:15:04,360
That decision doesn't show up as a line item.
422
00:15:04,360 --> 00:15:07,240
It shows up later as incident cost, audit friction,
423
00:15:07,240 --> 00:15:08,360
and emergency cleanup
424
00:15:08,360 --> 00:15:11,640
when the access graph is too messy to trust under pressure.
425
00:15:11,640 --> 00:15:14,680
And the most expensive moment to discover authorization debt
426
00:15:14,680 --> 00:15:15,880
is during an incident.
427
00:15:15,880 --> 00:15:17,720
Because now you can't answer simple questions
428
00:15:17,720 --> 00:15:19,560
if we disable this account, what breaks?
429
00:15:19,560 --> 00:15:21,720
If we revoke this app's permissions, what stops?
430
00:15:21,720 --> 00:15:24,360
If we remove this group, which business process fails?
431
00:15:24,360 --> 00:15:26,760
So you hesitate, you negotiate, you open tickets,
432
00:15:26,760 --> 00:15:27,880
you call the system owners,
433
00:15:27,880 --> 00:15:29,400
meanwhile the attacker keeps moving.
434
00:15:29,400 --> 00:15:31,960
That's why authorization failures beat authentication failures.
435
00:15:31,960 --> 00:15:33,560
They don't require sophistication.
436
00:15:33,560 --> 00:15:35,800
They require patience and a permission path.
437
00:15:35,800 --> 00:15:37,480
So the leadership take away is blunt.
438
00:15:37,480 --> 00:15:38,520
If you want resilience,
439
00:15:38,520 --> 00:15:41,160
you need to manage authorization as a first class asset.
440
00:15:41,160 --> 00:15:43,240
Not a byproduct, not a quarterly spreadsheet,
441
00:15:43,240 --> 00:15:44,440
a living decision model.
442
00:15:44,440 --> 00:15:45,880
And this is the transition point.
443
00:15:45,880 --> 00:15:47,480
If identity is the control plane,
444
00:15:47,480 --> 00:15:49,960
an authorization is the primary failure mode,
445
00:15:49,960 --> 00:15:52,600
then identity governance is where strategy becomes real
446
00:15:52,600 --> 00:15:54,360
because it is the mechanism that turns
447
00:15:54,360 --> 00:15:56,520
who should have access into enforceable,
448
00:15:56,520 --> 00:15:57,560
reviewable truth.
449
00:15:57,560 --> 00:16:01,240
Identity governance as a business discipline.
450
00:16:01,240 --> 00:16:03,960
Identity governance is where security stops being
451
00:16:03,960 --> 00:16:06,440
a collection of settings and becomes a management system.
452
00:16:06,440 --> 00:16:07,960
Not a tool, a discipline.
453
00:16:07,960 --> 00:16:10,440
Because governance answers the only questions
454
00:16:10,440 --> 00:16:11,720
that matter in a breach.
455
00:16:11,720 --> 00:16:12,920
Who should have access?
456
00:16:12,920 --> 00:16:13,800
Why do they have it?
457
00:16:13,800 --> 00:16:15,800
For how long, under what conditions?
458
00:16:15,800 --> 00:16:18,360
And who is accountable when those answers are wrong?
459
00:16:18,360 --> 00:16:21,240
Most organizations treat those as documentation questions.
460
00:16:21,240 --> 00:16:21,880
They are not.
461
00:16:21,880 --> 00:16:23,160
They are designed questions.
462
00:16:23,160 --> 00:16:25,560
If the organization can't express intent
463
00:16:25,560 --> 00:16:27,320
in a way the control plane can enforce,
464
00:16:27,320 --> 00:16:30,520
then the control plane will default to what it always defaults to.
465
00:16:30,520 --> 00:16:32,840
Whatever grants, access, and avoids outages,
466
00:16:32,840 --> 00:16:34,920
that's why governance has to be owned like finance,
467
00:16:34,920 --> 00:16:35,880
not like a project.
468
00:16:35,880 --> 00:16:38,840
Finance doesn't turn on budgeting and declare victory.
469
00:16:38,840 --> 00:16:42,440
It runs a cadence, controls, approvals, reconciliation,
470
00:16:42,440 --> 00:16:43,960
audits, and corrective actions.
471
00:16:43,960 --> 00:16:46,840
Identity governance needs the same shape.
472
00:16:46,840 --> 00:16:49,240
Otherwise, access becomes a one-way valve.
473
00:16:49,240 --> 00:16:51,960
Granted quickly, removed slowly, reviewed rarely.
474
00:16:51,960 --> 00:16:53,320
That's not a security posture.
475
00:16:53,320 --> 00:16:54,920
That's entitlement inflation.
476
00:16:54,920 --> 00:16:57,080
So start with the foundational misunderstanding.
477
00:16:57,080 --> 00:16:59,320
People think governance is about saying no.
478
00:16:59,320 --> 00:17:00,040
It isn't.
479
00:17:00,040 --> 00:17:02,280
Governance is about making yes, safe.
480
00:17:02,280 --> 00:17:04,520
It creates predictable pathways for access,
481
00:17:04,520 --> 00:17:06,760
so the business doesn't need informal workarounds,
482
00:17:06,760 --> 00:17:08,760
shared accounts, or permanent exceptions.
483
00:17:08,760 --> 00:17:12,280
It is the system that turns autonomy into something you can tolerate.
484
00:17:12,280 --> 00:17:15,720
This is also why joiner, mover, lever is not an HR workflow.
485
00:17:15,720 --> 00:17:17,080
It is the access supply chain.
486
00:17:17,080 --> 00:17:17,800
Joiners are easy.
487
00:17:17,800 --> 00:17:19,480
The organization knows they need something,
488
00:17:19,480 --> 00:17:20,760
so it provisions access.
489
00:17:20,760 --> 00:17:22,120
Movers are where damage starts.
490
00:17:22,120 --> 00:17:24,120
People change roles, projects overlap.
491
00:17:24,120 --> 00:17:26,280
People keep their old permissions just in case,
492
00:17:26,280 --> 00:17:28,360
because removing access might break a process.
493
00:17:28,360 --> 00:17:29,880
So access accumulates.
494
00:17:29,880 --> 00:17:31,320
Leavers are the obvious part.
495
00:17:31,320 --> 00:17:32,360
Accounts get disabled.
496
00:17:32,360 --> 00:17:33,640
That's table stakes.
497
00:17:33,640 --> 00:17:35,480
But the real governance failure is that
498
00:17:35,480 --> 00:17:38,440
movers and temporary workers are treated like edge cases.
499
00:17:38,440 --> 00:17:40,680
In most enterprises, contractors, partners,
500
00:17:40,680 --> 00:17:42,040
and vendors are not edge cases.
501
00:17:42,040 --> 00:17:43,720
They are core operating capacity.
502
00:17:43,720 --> 00:17:45,720
That means the identities are first-class risk.
503
00:17:45,720 --> 00:17:48,040
Their access has to be time-bound by default,
504
00:17:48,040 --> 00:17:50,440
with explicit sponsorship and an expiration date
505
00:17:50,440 --> 00:17:51,560
that actually expires.
506
00:17:51,560 --> 00:17:53,640
If access doesn't expire, it is not governed.
507
00:17:53,640 --> 00:17:54,840
It is merely granted.
508
00:17:54,840 --> 00:17:56,760
And that's the difference between access reviews
509
00:17:56,760 --> 00:17:59,400
as a checkbox and access reviews as a control loop.
510
00:17:59,400 --> 00:18:01,560
An access review is not a spreadsheet exercise.
511
00:18:01,560 --> 00:18:04,440
It is the mechanism that forces intent to be restated.
512
00:18:04,440 --> 00:18:07,640
If nobody can explain why an identity still needs access,
513
00:18:07,640 --> 00:18:09,000
that access is dead.
514
00:18:09,000 --> 00:18:11,320
If the reviewer can't confidently remove access
515
00:18:11,320 --> 00:18:12,840
because nobody knows what it impacts,
516
00:18:12,840 --> 00:18:14,520
that's not a reason to keep it.
517
00:18:14,520 --> 00:18:17,640
That is evidence the system has become ungovernable.
518
00:18:17,640 --> 00:18:20,440
Governance is also where least privilege becomes practical.
519
00:18:20,440 --> 00:18:22,440
Least privilege isn't achieved by telling people
520
00:18:22,440 --> 00:18:23,640
to have less access.
521
00:18:23,640 --> 00:18:26,120
It's achieved by designing access as a package.
522
00:18:26,120 --> 00:18:28,280
Scoped, conditional, and temporary.
523
00:18:28,280 --> 00:18:30,200
Access packages, approval parts,
524
00:18:30,200 --> 00:18:33,240
and periodic recertification are not extra-process.
525
00:18:33,240 --> 00:18:35,160
They are how an organization prevents
526
00:18:35,160 --> 00:18:38,280
privilege creep from becoming an incident-response problem.
527
00:18:38,280 --> 00:18:40,120
Now apply that logic to privileged access
528
00:18:40,120 --> 00:18:41,880
because that's where business impact concentrates.
529
00:18:41,880 --> 00:18:44,840
Privileged access governance is not just admin roles.
530
00:18:44,840 --> 00:18:46,920
It is any identity that can change data,
531
00:18:46,920 --> 00:18:49,560
change systems, change controls, or change other identities.
532
00:18:49,560 --> 00:18:52,120
Those identities must be designed around two truths.
533
00:18:52,120 --> 00:18:53,480
Standing privilege is risk,
534
00:18:53,480 --> 00:18:55,880
and manual elevation is a latency generator.
535
00:18:55,880 --> 00:18:58,200
So the discipline is reduce standing privilege,
536
00:18:58,200 --> 00:19:00,280
make elevation fast and auditable,
537
00:19:00,280 --> 00:19:02,520
and enforce expiration without negotiation.
538
00:19:02,520 --> 00:19:04,600
If elevation requires three days and five approvals,
539
00:19:04,600 --> 00:19:05,560
people will bypass it.
540
00:19:05,560 --> 00:19:07,720
If it requires five minutes and leaves a perfect audit,
541
00:19:07,720 --> 00:19:08,760
trail people will use it.
542
00:19:08,760 --> 00:19:10,520
Systems train behavior.
543
00:19:10,520 --> 00:19:12,760
This is also where separation of duties
544
00:19:12,760 --> 00:19:14,280
stops being a policy statement
545
00:19:14,280 --> 00:19:16,280
and becomes a control plane property.
546
00:19:16,280 --> 00:19:17,640
The person who requests access
547
00:19:17,640 --> 00:19:19,240
should not be the person who approves it.
548
00:19:19,240 --> 00:19:21,400
The person who deploys should not be the only person
549
00:19:21,400 --> 00:19:22,520
who can disable logging.
550
00:19:22,520 --> 00:19:25,000
Governance is where those boundaries become enforceable,
551
00:19:25,000 --> 00:19:26,120
not aspirational.
552
00:19:26,120 --> 00:19:27,480
And one more uncomfortable truth,
553
00:19:27,480 --> 00:19:28,920
governance has a licensing model,
554
00:19:28,920 --> 00:19:30,600
but it also has an ownership model.
555
00:19:30,600 --> 00:19:32,120
Someone has to own access decisions
556
00:19:32,120 --> 00:19:33,480
the way someone own spend.
557
00:19:33,480 --> 00:19:35,320
That means business owners for resources.
558
00:19:35,320 --> 00:19:37,400
Not just IT, not the security team,
559
00:19:37,400 --> 00:19:39,000
the security team enforces.
560
00:19:39,000 --> 00:19:40,280
The business defines intent
561
00:19:40,280 --> 00:19:42,120
because when an identity incident happens,
562
00:19:42,120 --> 00:19:43,320
you don't need more dashboards.
563
00:19:43,320 --> 00:19:44,200
You need authority.
564
00:19:44,200 --> 00:19:46,280
So identity governance as a business discipline
565
00:19:46,280 --> 00:19:48,120
is the mechanism that turns identity
566
00:19:48,120 --> 00:19:49,560
from a sprawling permission graph
567
00:19:49,560 --> 00:19:51,320
into a manageable decision system.
568
00:19:51,320 --> 00:19:53,560
It creates bounded access, predictable change,
569
00:19:53,560 --> 00:19:54,760
and fast revocation.
570
00:19:54,760 --> 00:19:56,040
And that's the transition point.
571
00:19:56,040 --> 00:19:57,400
Once governance exists,
572
00:19:57,400 --> 00:19:59,960
identity becomes a foundation you can build on.
573
00:19:59,960 --> 00:20:02,040
Without it, every advance control you add
574
00:20:02,040 --> 00:20:04,520
is just another policy layered on top of drift.
575
00:20:04,520 --> 00:20:05,560
Scenario one,
576
00:20:05,560 --> 00:20:06,600
Entra ID,
577
00:20:06,600 --> 00:20:09,640
Identity governance plus ITDR as the foundation.
578
00:20:09,640 --> 00:20:11,480
Scenario one is Entra ID,
579
00:20:11,480 --> 00:20:13,880
done the way leadership assumes it already is.
580
00:20:13,880 --> 00:20:15,400
Governance plus identity,
581
00:20:15,400 --> 00:20:17,000
threat detection and response.
582
00:20:17,000 --> 00:20:19,000
Treat it as a control plane capability,
583
00:20:19,000 --> 00:20:21,560
not a portal someone logs into when they remember.
584
00:20:21,560 --> 00:20:23,240
Start with the clean definition.
585
00:20:23,240 --> 00:20:25,240
Entra is not where identities live.
586
00:20:25,240 --> 00:20:28,200
Entra is where trust decisions compile.
587
00:20:28,200 --> 00:20:30,520
It takes signals, applies policy intent,
588
00:20:30,520 --> 00:20:31,720
and issues the tokens
589
00:20:31,720 --> 00:20:34,360
that let humans and machines act inside your business.
590
00:20:34,360 --> 00:20:36,840
When that engine is governed, you get bounded access.
591
00:20:36,840 --> 00:20:38,920
When it isn't, you get an authorization lottery
592
00:20:38,920 --> 00:20:39,960
with a nice UI.
593
00:20:39,960 --> 00:20:42,040
So the foundation is two linked disciplines.
594
00:20:42,040 --> 00:20:43,320
First identity governance,
595
00:20:43,320 --> 00:20:46,360
this is the part that answers should this identity have this access
596
00:20:46,360 --> 00:20:48,040
and forces time into the equation.
597
00:20:48,040 --> 00:20:49,160
Access packages,
598
00:20:49,160 --> 00:20:51,800
expiration, sponsorship, reviews,
599
00:20:51,800 --> 00:20:54,040
privileged elevation with justification,
600
00:20:54,040 --> 00:20:55,400
the goal isn't bureaucracy,
601
00:20:55,400 --> 00:20:57,400
the goal is to stop entitlement drift
602
00:20:57,400 --> 00:20:59,800
from becoming your default security model.
603
00:20:59,800 --> 00:21:01,960
Second, ITDR identity threat,
604
00:21:01,960 --> 00:21:04,360
detection and response is the part that answers
605
00:21:04,360 --> 00:21:06,360
is this identity behaving like itself
606
00:21:06,360 --> 00:21:08,520
and how fast can we contain it when it doesn't.
607
00:21:08,920 --> 00:21:10,040
Not as a SO-key hobby,
608
00:21:10,040 --> 00:21:11,240
as an operating requirement.
609
00:21:11,240 --> 00:21:13,640
Most organizations treat identity telemetry
610
00:21:13,640 --> 00:21:14,920
like a forensic archive.
611
00:21:14,920 --> 00:21:17,800
Sign-in logs, audit logs, risky users, risky sign-ins.
612
00:21:17,800 --> 00:21:19,320
Useful, but not decisive.
613
00:21:19,320 --> 00:21:20,920
ITDR is decisive.
614
00:21:20,920 --> 00:21:21,880
It's the shift from,
615
00:21:21,880 --> 00:21:23,080
we can investigate later,
616
00:21:23,080 --> 00:21:24,280
to we can revoke now.
617
00:21:24,280 --> 00:21:26,680
Because identity incidents are not technical events.
618
00:21:26,680 --> 00:21:29,160
They are business events with business blast radius.
619
00:21:29,160 --> 00:21:30,840
The attacker doesn't want your login page.
620
00:21:30,840 --> 00:21:32,120
They want your approval chains,
621
00:21:32,120 --> 00:21:33,720
your data export paths,
622
00:21:33,720 --> 00:21:35,400
your automation identities,
623
00:21:35,400 --> 00:21:36,520
and your admin surface.
624
00:21:36,520 --> 00:21:39,400
So what does Entra governance pass ITDR actually look like
625
00:21:39,400 --> 00:21:41,240
in practical terms without turning this
626
00:21:41,240 --> 00:21:42,840
into a configuration tutorial?
627
00:21:42,840 --> 00:21:44,840
It looks like the organization treating access
628
00:21:44,840 --> 00:21:46,600
as a product with a life cycle.
629
00:21:46,600 --> 00:21:48,920
A new contractor needs access to a project space
630
00:21:48,920 --> 00:21:50,520
and they requested through an access package.
631
00:21:50,520 --> 00:21:53,000
The package is scoped to what the contractor should touch,
632
00:21:53,000 --> 00:21:54,600
not what's convenient to grant.
633
00:21:54,600 --> 00:21:56,680
It requires a sponsor who is accountable,
634
00:21:56,680 --> 00:21:58,440
it expires automatically.
635
00:21:58,440 --> 00:21:59,800
And there is a review cadence
636
00:21:59,800 --> 00:22:01,720
that doesn't depend on someone remembering.
637
00:22:01,720 --> 00:22:02,680
That seems simple.
638
00:22:02,680 --> 00:22:03,560
Here's the weird part.
639
00:22:03,560 --> 00:22:04,920
It is rare.
640
00:22:04,920 --> 00:22:07,080
Most contractors get access via group membership.
641
00:22:07,080 --> 00:22:08,360
The membership doesn't expire.
642
00:22:08,360 --> 00:22:09,560
The sponsor changes jobs.
643
00:22:09,560 --> 00:22:10,440
The project ends.
644
00:22:10,440 --> 00:22:11,560
The access remains.
645
00:22:11,560 --> 00:22:12,600
That's not malicious.
646
00:22:12,600 --> 00:22:13,400
That's drift.
647
00:22:13,400 --> 00:22:15,400
And drift is the raw material of breaches.
648
00:22:15,400 --> 00:22:16,920
Now layer in privileged access.
649
00:22:16,920 --> 00:22:18,920
Entra PIM is not a nice to have.
650
00:22:18,920 --> 00:22:21,000
It's the mechanism that prevents standing power
651
00:22:21,000 --> 00:22:22,840
from becoming standing exposure.
652
00:22:22,840 --> 00:22:24,840
If an identity can change conditional access,
653
00:22:24,840 --> 00:22:27,480
modify app consent, create new service principles,
654
00:22:27,480 --> 00:22:29,480
reset credentials, or turn off logging,
655
00:22:29,480 --> 00:22:31,400
that identity is part of your control plane.
656
00:22:31,400 --> 00:22:33,720
Control plane power cannot be permanently assigned
657
00:22:33,720 --> 00:22:35,880
and still be called least privilege.
658
00:22:35,880 --> 00:22:37,400
It becomes inherited risk.
659
00:22:37,400 --> 00:22:39,800
So the model is, eligible by default,
660
00:22:39,800 --> 00:22:42,360
active only when needed, time bound, always,
661
00:22:42,360 --> 00:22:43,800
and auditable without effort.
662
00:22:43,800 --> 00:22:45,640
If elevation is slow, people bypass.
663
00:22:45,640 --> 00:22:47,960
If elevation is fast and logged, people comply.
664
00:22:47,960 --> 00:22:49,400
Your design trains your culture.
665
00:22:49,400 --> 00:22:51,640
Now the ITDR half.
666
00:22:51,640 --> 00:22:53,800
Identity incidents rarely announce themselves
667
00:22:53,800 --> 00:22:56,120
with a single obvious alert.
668
00:22:56,120 --> 00:22:57,720
They show up as weak signals.
669
00:22:57,720 --> 00:23:00,520
Unusual token use, a sign in that's technically valid
670
00:23:00,520 --> 00:23:02,040
but behaviorally wrong,
671
00:23:02,040 --> 00:23:04,680
a new OAuth app consent that shouldn't exist,
672
00:23:04,680 --> 00:23:06,840
an admin role activation at an odd time
673
00:23:06,840 --> 00:23:09,160
an account that starts enumerating directory objects
674
00:23:09,160 --> 00:23:11,720
it never touched before, the system has those signals.
675
00:23:11,720 --> 00:23:14,040
The question is whether you connected them to response.
676
00:23:14,040 --> 00:23:16,040
This is where Entra becomes an execution layer,
677
00:23:16,040 --> 00:23:17,080
not a reporting layer.
678
00:23:17,080 --> 00:23:18,840
Risk signals can drive policy actions.
679
00:23:18,840 --> 00:23:21,160
Session risk can trigger step-up requirements.
680
00:23:21,160 --> 00:23:23,000
Compromised accounts can be disabled.
681
00:23:23,000 --> 00:23:24,440
Tokens can be invalidated.
682
00:23:24,440 --> 00:23:26,200
Privileged sessions can be constrained
683
00:23:26,200 --> 00:23:27,960
and the moment you can do that quickly,
684
00:23:27,960 --> 00:23:29,800
you change the economics of an attack.
685
00:23:29,800 --> 00:23:32,120
Because the attacker's best advantage is time
686
00:23:32,120 --> 00:23:34,280
and governance is what makes response safe.
687
00:23:34,280 --> 00:23:37,560
Without governance, every containment action becomes political.
688
00:23:37,560 --> 00:23:40,360
If we disable this account, we'll payroll break.
689
00:23:40,360 --> 00:23:43,160
If we revoke this app, will the sales team lose access?
690
00:23:43,160 --> 00:23:44,760
So the organization hesitates.
691
00:23:44,760 --> 00:23:46,280
Governance reduces that hesitation
692
00:23:46,280 --> 00:23:49,000
by making access intentional, scoped and owned.
693
00:23:49,000 --> 00:23:50,840
You can be decisive because you understand
694
00:23:50,840 --> 00:23:52,920
what normal access looks like.
695
00:23:52,920 --> 00:23:55,800
There's also a 2026 reality leaders should not ignore.
696
00:23:55,800 --> 00:23:58,600
Entra is tightening the rules around application identities
697
00:23:58,600 --> 00:24:01,800
and service principle less authentication behavior is being retired.
698
00:24:01,800 --> 00:24:02,760
That is not a nuisance.
699
00:24:02,760 --> 00:24:03,800
That is a forcing function.
700
00:24:03,800 --> 00:24:05,720
It's Microsoft telling you in policy
701
00:24:05,720 --> 00:24:08,360
that invisible identities don't get to exist anymore,
702
00:24:08,360 --> 00:24:09,640
which is the point.
703
00:24:09,640 --> 00:24:11,080
Scenario one is the foundation
704
00:24:11,080 --> 00:24:12,520
because it restores determinism.
705
00:24:12,520 --> 00:24:13,880
It makes access time-bound.
706
00:24:13,880 --> 00:24:15,240
It makes privilege temporary.
707
00:24:15,240 --> 00:24:16,840
It makes ownership explicit.
708
00:24:16,840 --> 00:24:19,560
And it turns identity signals into actions instead of evidence.
709
00:24:19,560 --> 00:24:21,000
Then you can build zero trust
710
00:24:21,000 --> 00:24:24,360
that actually works because now your trust model has teeth.
711
00:24:24,360 --> 00:24:26,280
Zero trust is not a product rollout.
712
00:24:26,280 --> 00:24:28,120
Zero trust is where a lot of security programs
713
00:24:28,120 --> 00:24:30,840
go to die because it gets treated like a procurement event.
714
00:24:30,840 --> 00:24:33,320
A vendor pitches a zero trust solution.
715
00:24:33,320 --> 00:24:35,080
The organization buys licenses.
716
00:24:35,080 --> 00:24:36,840
Someone turns on conditional access.
717
00:24:36,840 --> 00:24:38,360
A slide gets shown to the board.
718
00:24:38,360 --> 00:24:40,920
And everybody quietly agrees the journey is complete.
719
00:24:40,920 --> 00:24:42,440
It isn't zero trust is not a product.
720
00:24:42,440 --> 00:24:43,320
It is not a portal.
721
00:24:43,320 --> 00:24:44,840
It is not a single policy set.
722
00:24:44,840 --> 00:24:45,800
In architectural terms,
723
00:24:45,800 --> 00:24:49,000
it is a replacement for your old trust assumptions.
724
00:24:49,000 --> 00:24:51,160
The idea that inside means safe,
725
00:24:51,160 --> 00:24:53,080
that authenticated means trusted
726
00:24:53,080 --> 00:24:55,560
and that compliant means controlled.
727
00:24:55,560 --> 00:24:57,720
Zero trust says none of that is true by default.
728
00:24:57,720 --> 00:24:59,800
Trust has to be earned continuously
729
00:24:59,800 --> 00:25:02,360
per request and revoked when reality changes.
730
00:25:02,360 --> 00:25:03,480
That distinction matters
731
00:25:03,480 --> 00:25:06,200
because product rollouts create coverage.
732
00:25:06,200 --> 00:25:08,760
Zero trust requires behavior change in the system.
733
00:25:08,760 --> 00:25:11,560
The foundational misunderstanding is that people translate
734
00:25:11,560 --> 00:25:13,880
"Never trust, always verify"
735
00:25:13,880 --> 00:25:15,240
into "add more prompts".
736
00:25:15,240 --> 00:25:17,720
More MFA prompts, more approvals, more blocks,
737
00:25:17,720 --> 00:25:19,880
that's not zero trust, that's friction.
738
00:25:19,880 --> 00:25:22,680
Zero trust unproperly reduces friction for normal work
739
00:25:22,680 --> 00:25:24,840
and increases constraint for abnormal work.
740
00:25:24,840 --> 00:25:27,960
It does that by making policy decisions dynamic,
741
00:25:27,960 --> 00:25:30,280
contextual and enforceable close to the resource.
742
00:25:30,280 --> 00:25:32,040
That's the NIST model in plain language.
743
00:25:32,040 --> 00:25:33,480
A subject requests access,
744
00:25:33,480 --> 00:25:35,800
a policy decision happens using real signals
745
00:25:35,800 --> 00:25:38,200
and a policy enforcement point applies that decision.
746
00:25:38,200 --> 00:25:40,040
And that loop never stops existing
747
00:25:40,040 --> 00:25:42,040
just because the user passed a login screen once.
748
00:25:42,040 --> 00:25:44,360
This is why the phrase we turned on conditional access
749
00:25:44,360 --> 00:25:45,480
is such a warning sign.
750
00:25:45,480 --> 00:25:47,320
Conditional access is a policy engine.
751
00:25:47,320 --> 00:25:48,120
It's powerful.
752
00:25:48,120 --> 00:25:51,160
But if the program around it is built on exception culture,
753
00:25:51,160 --> 00:25:52,680
shared responsibility gaps,
754
00:25:52,680 --> 00:25:54,680
and unowned entitlements,
755
00:25:54,680 --> 00:25:57,320
then conditional access becomes conditional chaos,
756
00:25:57,320 --> 00:25:59,800
a pile of policies that look sophisticated
757
00:25:59,800 --> 00:26:01,640
and behave inconsistently.
758
00:26:01,640 --> 00:26:03,960
The system doesn't degrade because it's malicious.
759
00:26:03,960 --> 00:26:06,840
It degrades because organizations are, they merge, they reorganize,
760
00:26:06,840 --> 00:26:08,680
they acquire, they ship new apps,
761
00:26:08,680 --> 00:26:11,400
they onboard third parties, they add automation.
762
00:26:11,400 --> 00:26:14,600
And every one of those changes generates just one exception.
763
00:26:14,600 --> 00:26:16,760
Remember this detail, it's going to matter later.
764
00:26:16,760 --> 00:26:18,360
Exceptions are entropy generators.
765
00:26:18,360 --> 00:26:20,200
Every exception is a trust assumption
766
00:26:20,200 --> 00:26:21,880
you are choosing not to enforce.
767
00:26:21,880 --> 00:26:23,880
It becomes a permanent alternate pathway
768
00:26:23,880 --> 00:26:25,640
unless you govern it like a liability,
769
00:26:25,640 --> 00:26:27,560
expiration, justification, and review.
770
00:26:27,560 --> 00:26:29,240
If you don't, your zero trust program
771
00:26:29,240 --> 00:26:31,160
becomes a museum of past urgency.
772
00:26:31,160 --> 00:26:32,840
Nobody knows which policies still matter,
773
00:26:32,840 --> 00:26:35,000
nobody knows which applications rely on them.
774
00:26:35,000 --> 00:26:37,320
And when an incident hits, you cannot act decisively
775
00:26:37,320 --> 00:26:39,720
because you can't predict the blast radius of enforcement.
776
00:26:39,720 --> 00:26:41,880
That's why zero trust is not a technical rollout.
777
00:26:41,880 --> 00:26:43,000
It's an operating model.
778
00:26:43,000 --> 00:26:45,480
Operating model means ownership boundaries are explicit.
779
00:26:45,480 --> 00:26:47,160
Someone defines policy intent.
780
00:26:47,160 --> 00:26:49,240
Someone implements it, someone monitors drift,
781
00:26:49,240 --> 00:26:50,680
someone owns exceptions.
782
00:26:50,680 --> 00:26:53,240
Someone is accountable for outcomes, not configuration.
783
00:26:53,240 --> 00:26:56,360
And in most organizations, that's exactly where the program fails.
784
00:26:56,360 --> 00:26:59,960
Identity teams own identity, endpoint teams own devices,
785
00:26:59,960 --> 00:27:01,640
network teams own connectivity,
786
00:27:01,640 --> 00:27:03,400
application teams own uptime,
787
00:27:03,400 --> 00:27:06,040
security teams own alerts, nobody owns trust end to end.
788
00:27:06,040 --> 00:27:08,600
So the attacker gets gaps between teams, always.
789
00:27:08,600 --> 00:27:11,960
A real zero trust transformation collapses
790
00:27:11,960 --> 00:27:14,840
those gaps by defining the trust system as one loop.
791
00:27:14,840 --> 00:27:17,800
Signals into decision, decision into enforcement,
792
00:27:17,800 --> 00:27:19,480
enforcement into response.
793
00:27:19,480 --> 00:27:21,400
It becomes less about do we have the feature
794
00:27:21,400 --> 00:27:25,480
and more about does the system reliably constrain the pathways that matter?
795
00:27:25,480 --> 00:27:28,760
This is also where leadership has to stop rewarding the wrong behavior.
796
00:27:28,760 --> 00:27:31,400
If teams are punished for outages and not punished for drift,
797
00:27:31,400 --> 00:27:32,360
they will choose drift.
798
00:27:32,360 --> 00:27:34,680
If teams are rewarded for fast delivery
799
00:27:34,680 --> 00:27:37,000
and not rewarded for revocation discipline,
800
00:27:37,000 --> 00:27:38,440
they will accumulate permissions.
801
00:27:38,440 --> 00:27:41,320
If security is measured by how many requested blocks,
802
00:27:41,320 --> 00:27:42,520
it will block more.
803
00:27:42,520 --> 00:27:44,040
And the business will root around it.
804
00:27:44,040 --> 00:27:46,520
Zero trust done right has a different success condition.
805
00:27:46,520 --> 00:27:47,640
Safe autonomy.
806
00:27:47,640 --> 00:27:49,000
People should be able to work quickly
807
00:27:49,000 --> 00:27:50,920
because the system makes low-risk work easy
808
00:27:50,920 --> 00:27:52,280
and high-risk work controlled.
809
00:27:52,280 --> 00:27:53,480
That requires two things.
810
00:27:53,480 --> 00:27:55,000
Leaders rarely fund explicitly.
811
00:27:55,000 --> 00:27:56,600
Decision quality and enforcement speed.
812
00:27:56,600 --> 00:27:59,000
Decision quality comes from identity governance
813
00:27:59,000 --> 00:28:01,000
and clean entitlement design.
814
00:28:01,000 --> 00:28:03,080
Enforcement speed comes from capabilities
815
00:28:03,080 --> 00:28:05,000
like continuous access evaluation
816
00:28:05,000 --> 00:28:06,520
and automated response loops.
817
00:28:06,520 --> 00:28:09,240
Without those, zero trust stays a diagram.
818
00:28:09,240 --> 00:28:11,960
A beautiful policy model with no runtime authority.
819
00:28:11,960 --> 00:28:15,640
So the product rollout mindset needs to die.
820
00:28:15,640 --> 00:28:17,640
What replaces it is a program mindset.
821
00:28:17,640 --> 00:28:19,240
Trust assumptions are explicit,
822
00:28:19,240 --> 00:28:20,360
exceptions are governed,
823
00:28:20,360 --> 00:28:22,600
sessions are continuously evaluated
824
00:28:22,600 --> 00:28:25,560
and revocation happens fast enough that it matters.
825
00:28:25,560 --> 00:28:26,520
And once you accept that,
826
00:28:26,520 --> 00:28:28,040
the next point becomes obvious.
827
00:28:28,040 --> 00:28:29,480
Trust doesn't decay at login.
828
00:28:29,480 --> 00:28:31,960
It decays continuously inside the session.
829
00:28:31,960 --> 00:28:35,640
Trust decays continuously, not at login.
830
00:28:35,640 --> 00:28:37,720
Most organizations still design trust
831
00:28:37,720 --> 00:28:39,080
like it's a moment in time.
832
00:28:39,080 --> 00:28:41,240
You authenticate, you pass MFA, you're good.
833
00:28:41,240 --> 00:28:43,000
Then you get a token
834
00:28:43,000 --> 00:28:45,000
and that token becomes a little permission slip
835
00:28:45,000 --> 00:28:46,600
that travels with you for hours.
836
00:28:46,600 --> 00:28:48,920
That model made sense when the network was the boundary
837
00:28:48,920 --> 00:28:50,280
and sessions were short.
838
00:28:50,280 --> 00:28:51,880
In cloud and sass, it's backwards.
839
00:28:51,880 --> 00:28:54,200
The reality is that the session is the attack surface.
840
00:28:54,200 --> 00:28:55,480
Not the login screen,
841
00:28:55,480 --> 00:28:56,840
because the attacker doesn't care
842
00:28:56,840 --> 00:28:58,200
about proving who they are.
843
00:28:58,200 --> 00:29:00,440
They care about inheriting what you already proved.
844
00:29:00,440 --> 00:29:02,280
If they can get hold of the session token
845
00:29:02,280 --> 00:29:03,160
or the refresh token,
846
00:29:03,160 --> 00:29:04,920
they're not trying to authenticate anymore.
847
00:29:04,920 --> 00:29:06,600
They're trying to operate as you
848
00:29:06,600 --> 00:29:08,520
after the platform already granted trust.
849
00:29:08,520 --> 00:29:10,680
This is why we have strong MFA
850
00:29:10,680 --> 00:29:13,640
can be true and still irrelevant to the event that hurts you.
851
00:29:13,640 --> 00:29:15,960
It's also why leaders keep hearing the same sentence
852
00:29:15,960 --> 00:29:17,000
after incidents.
853
00:29:17,000 --> 00:29:19,080
The user successfully completed MFA.
854
00:29:19,080 --> 00:29:21,400
Yes, and then the session lived long enough to be abused.
855
00:29:21,400 --> 00:29:22,920
So the core shift is this.
856
00:29:22,920 --> 00:29:24,920
Authentication is not the end of trust.
857
00:29:24,920 --> 00:29:28,040
It's the beginning of a continuously evaluated relationship
858
00:29:28,040 --> 00:29:29,800
between an identity, a device,
859
00:29:29,800 --> 00:29:31,160
a session, and a resource.
860
00:29:31,160 --> 00:29:32,760
And that relationship decays.
861
00:29:32,760 --> 00:29:36,520
Sometimes it decays because the device posture changes.
862
00:29:36,520 --> 00:29:38,680
A laptop goes from compliant to not compliant.
863
00:29:38,680 --> 00:29:41,320
An endpoint alert fires, a risky sign in is detected.
864
00:29:41,320 --> 00:29:43,800
A user is disabled, a role assignment changes.
865
00:29:43,800 --> 00:29:46,760
Or a credential reset happens for suspected compromise.
866
00:29:46,760 --> 00:29:49,720
Those are all state changes that should alter trust immediately.
867
00:29:49,720 --> 00:29:51,960
But in a point in time model, none of them matter
868
00:29:51,960 --> 00:29:54,200
until the session naturally expires.
869
00:29:54,200 --> 00:29:57,320
That gap between the world changed and enforcement caught up
870
00:29:57,320 --> 00:29:58,840
is where modern incidents live.
871
00:29:58,840 --> 00:30:01,400
It's the difference between knowing a door should be locked
872
00:30:01,400 --> 00:30:03,960
and waiting eight hours for the lock to engage
873
00:30:03,960 --> 00:30:05,400
because the key card still works.
874
00:30:05,400 --> 00:30:07,480
This is where it gets uncomfortable for leadership
875
00:30:07,480 --> 00:30:10,360
because IT time is not the time unit that matters.
876
00:30:10,360 --> 00:30:11,480
Business time is.
877
00:30:11,480 --> 00:30:13,320
If it takes you six hours to revoke access
878
00:30:13,320 --> 00:30:15,400
because you rely on token expiration,
879
00:30:15,400 --> 00:30:17,400
the attacker has six hours of clean runway.
880
00:30:17,400 --> 00:30:18,600
They don't need persistence.
881
00:30:18,600 --> 00:30:21,240
They need time and your organization usually gives it to them
882
00:30:21,240 --> 00:30:23,320
because it designed trust as a single event,
883
00:30:23,320 --> 00:30:24,760
not a continuous state.
884
00:30:24,760 --> 00:30:26,680
Now, layer in the things leaders don't see.
885
00:30:26,680 --> 00:30:29,720
Sessions aren't only for humans, workloads have sessions,
886
00:30:29,720 --> 00:30:32,600
automation has sessions, integrations have sessions,
887
00:30:32,600 --> 00:30:34,360
third party apps have sessions.
888
00:30:34,360 --> 00:30:36,360
And these identities often have broader permissions
889
00:30:36,360 --> 00:30:39,160
because someone wanted the workflow to just work.
890
00:30:39,160 --> 00:30:40,360
When those sessions are abused,
891
00:30:40,360 --> 00:30:42,680
you don't get a helpful prompt or user complaint.
892
00:30:42,680 --> 00:30:44,760
You get silent high throughput actions
893
00:30:44,760 --> 00:30:46,840
that look like normal system activity.
894
00:30:46,840 --> 00:30:49,560
That's the human machine blur, operationalized.
895
00:30:49,560 --> 00:30:51,640
So when people say continuous verification,
896
00:30:51,640 --> 00:30:53,880
they tend to imagine constant MFA prompts.
897
00:30:53,880 --> 00:30:55,160
That's the wrong mental model.
898
00:30:55,160 --> 00:30:57,160
The system doesn't need to keep asking the user
899
00:30:57,160 --> 00:30:58,280
to prove their human.
900
00:30:58,280 --> 00:30:59,960
The system needs to keep validating
901
00:30:59,960 --> 00:31:03,000
whether the conditions that justified access still exist.
902
00:31:03,000 --> 00:31:05,080
In zero trust terms, the policy decision point
903
00:31:05,080 --> 00:31:07,160
should not be consulted once and then ignored.
904
00:31:07,160 --> 00:31:08,280
It should stay relevant.
905
00:31:08,280 --> 00:31:09,560
It should be able to say
906
00:31:09,560 --> 00:31:11,960
that session was valid, but now it isn't.
907
00:31:11,960 --> 00:31:14,040
Which implies something simple and brutal.
908
00:31:14,040 --> 00:31:15,480
Trust must be revocable,
909
00:31:15,480 --> 00:31:17,160
not in an annual access review,
910
00:31:17,160 --> 00:31:18,200
not in a ticket queue,
911
00:31:18,200 --> 00:31:19,400
not after a meeting,
912
00:31:19,400 --> 00:31:20,760
revocable in near real time
913
00:31:20,760 --> 00:31:23,080
and in a way, your critical apps actually honor.
914
00:31:23,080 --> 00:31:25,240
Because the most expensive form of security control
915
00:31:25,240 --> 00:31:26,440
is one that detects risk
916
00:31:26,440 --> 00:31:29,000
and cannot enforce consequences quickly enough to matter.
917
00:31:29,000 --> 00:31:31,880
This is also where exception culture quietly destroys you.
918
00:31:31,880 --> 00:31:34,680
If you've carved out bypasses for business critical apps
919
00:31:34,680 --> 00:31:36,920
or you allow legacy auth because it's complicated
920
00:31:36,920 --> 00:31:38,760
or you exempt privileged identities
921
00:31:38,760 --> 00:31:41,000
because they can't be disrupted,
922
00:31:41,000 --> 00:31:42,440
you have effectively declared
923
00:31:42,440 --> 00:31:45,480
that the most important pathways are the least governable.
924
00:31:45,480 --> 00:31:46,760
That's not a security program.
925
00:31:46,760 --> 00:31:48,840
That's a liability register you refuse to name.
926
00:31:48,840 --> 00:31:51,480
And the reason this matters to leaders is not philosophical.
927
00:31:51,480 --> 00:31:52,520
It's operational.
928
00:31:52,520 --> 00:31:54,440
If trust decays continuously,
929
00:31:54,440 --> 00:31:57,160
then your organization must be able to revoke continuously.
930
00:31:57,160 --> 00:31:59,480
Otherwise, you're running a probabilistic security model.
931
00:31:59,480 --> 00:32:01,160
Sometimes revocation happens fast,
932
00:32:01,160 --> 00:32:02,120
sometimes it doesn't,
933
00:32:02,120 --> 00:32:04,200
and you just hope the attacker lands in the slow lane.
934
00:32:04,200 --> 00:32:07,400
So the ahaha to hold on to is this.
935
00:32:07,400 --> 00:32:09,400
Resilience in identity-driven incidents
936
00:32:09,400 --> 00:32:11,080
is mostly about collapsing the time
937
00:32:11,080 --> 00:32:12,760
between a trust decision changing
938
00:32:12,760 --> 00:32:14,360
and enforcement taking effect.
939
00:32:14,360 --> 00:32:15,720
That's why the next scenario matters.
940
00:32:15,720 --> 00:32:18,120
Continuous access evaluation is where zero trust
941
00:32:18,120 --> 00:32:21,320
stops being a diagram and starts being lived reality.
942
00:32:21,320 --> 00:32:22,360
Scenario three.
943
00:32:22,360 --> 00:32:24,040
Continuous access evaluation.
944
00:32:24,040 --> 00:32:26,680
CAE as lived zero trust.
945
00:32:26,680 --> 00:32:29,000
CAE is what happens when an organization
946
00:32:29,000 --> 00:32:31,800
stops pretending that access granted is a permanent state.
947
00:32:31,800 --> 00:32:32,520
It is not.
948
00:32:32,520 --> 00:32:34,520
It is a temporary decision that should collapse
949
00:32:34,520 --> 00:32:36,360
the moment the conditions behind it change.
950
00:32:36,360 --> 00:32:39,080
CAE is the mechanism that makes that collapse real
951
00:32:39,080 --> 00:32:41,160
and fast in the Microsoft ecosystem,
952
00:32:41,160 --> 00:32:43,720
not as a concept as runtime behavior.
953
00:32:43,720 --> 00:32:44,920
Here's the simple version.
954
00:32:44,920 --> 00:32:48,120
CAE lets entra tell participating applications.
955
00:32:48,120 --> 00:32:50,200
This session is no longer acceptable.
956
00:32:50,200 --> 00:32:52,280
And have the app enforce that in near real time
957
00:32:52,280 --> 00:32:54,040
instead of waiting for token expiry.
958
00:32:54,040 --> 00:32:56,440
That's the gap it closes, decision versus enforcement.
959
00:32:56,440 --> 00:32:59,080
Most security programs have decent decision making.
960
00:32:59,080 --> 00:33:00,760
They know when something is risky,
961
00:33:00,760 --> 00:33:02,960
they can flag a user, they can disable an account,
962
00:33:02,960 --> 00:33:04,440
they can mark a sign in as high risk,
963
00:33:04,440 --> 00:33:06,920
they can detect a device falling out of compliance.
964
00:33:06,920 --> 00:33:09,160
But then nothing happens quickly enough to matter
965
00:33:09,160 --> 00:33:11,240
because the user's session keeps running.
966
00:33:11,240 --> 00:33:14,680
CAE is how you stop granting attackers the courtesy of time.
967
00:33:14,680 --> 00:33:17,000
Why leaders should care is straightforward.
968
00:33:17,000 --> 00:33:20,200
It converts trust revocation from an administrative workflow
969
00:33:20,200 --> 00:33:21,640
into an operational control.
970
00:33:21,640 --> 00:33:24,040
It turns we noticed into we contained
971
00:33:24,040 --> 00:33:26,680
without a help desk ticket and without waiting six hours
972
00:33:26,680 --> 00:33:27,960
for a token to die naturally.
973
00:33:27,960 --> 00:33:29,320
But CAE is not magic.
974
00:33:29,320 --> 00:33:30,040
It's a contract.
975
00:33:30,040 --> 00:33:31,240
Entra can emit the signal.
976
00:33:31,240 --> 00:33:32,920
The application has to honor it.
977
00:33:32,920 --> 00:33:34,440
And that's where reality shows up.
978
00:33:34,440 --> 00:33:37,640
Microsoft services like Exchange Online, SharePoint Online, Teams
979
00:33:37,640 --> 00:33:39,800
and others support CAE in specific ways.
980
00:33:39,800 --> 00:33:41,320
Many third party SaaS apps don't.
981
00:33:41,320 --> 00:33:44,280
Some claim they do, but implemented partially or inconsistently.
982
00:33:44,280 --> 00:33:46,680
So we enabled CAE is not an end state.
983
00:33:46,680 --> 00:33:50,680
It's the start of verifying which of your critical applications
984
00:33:50,680 --> 00:33:53,400
actually behave like they live in a zero trust system.
985
00:33:53,400 --> 00:33:55,800
That distinction matters because CAE creates
986
00:33:55,800 --> 00:33:57,560
an uncomfortable inventory problem.
987
00:33:57,560 --> 00:33:59,640
Which sessions can you actually revoke quickly
988
00:33:59,640 --> 00:34:00,840
across the apps that matter?
989
00:34:00,840 --> 00:34:02,360
This is where leaders get leverage
990
00:34:02,360 --> 00:34:05,080
because CAE forces a clean separation
991
00:34:05,080 --> 00:34:07,040
between two types of work.
992
00:34:07,040 --> 00:34:10,120
First, the policy work deciding which events should trigger
993
00:34:10,120 --> 00:34:12,440
revocation and for which resources.
994
00:34:12,440 --> 00:34:15,560
Account disabled, password reset, risk level elevated,
995
00:34:15,560 --> 00:34:18,800
device non-compliant, role change, those are business decisions
996
00:34:18,800 --> 00:34:20,520
framed are security conditions.
997
00:34:20,520 --> 00:34:23,280
Second, the application work, ensuring critical apps
998
00:34:23,280 --> 00:34:26,000
honor revocation signals and that your user experience
999
00:34:26,000 --> 00:34:28,440
doesn't collapse into constant reauthentication.
1000
00:34:28,440 --> 00:34:31,400
Now, the part nobody likes, exceptions.
1001
00:34:31,400 --> 00:34:34,280
CAE works exactly as well as your exception governance.
1002
00:34:34,280 --> 00:34:37,040
Every time someone says don't enforce this for executives
1003
00:34:37,040 --> 00:34:39,320
or exclude this app because it breaks,
1004
00:34:39,320 --> 00:34:40,840
you've created a permanent bypass
1005
00:34:40,840 --> 00:34:43,800
around your revocation model and bypasses don't stay rare.
1006
00:34:43,800 --> 00:34:44,720
They replicate.
1007
00:34:44,720 --> 00:34:47,440
This is where CAE exposes the program's maturity.
1008
00:34:47,440 --> 00:34:49,080
If exception handling is informal,
1009
00:34:49,080 --> 00:34:51,480
CAE becomes another half-deployed capability.
1010
00:34:51,480 --> 00:34:53,280
If exception handling is governed,
1011
00:34:53,280 --> 00:34:55,560
expiration justification, review cadence,
1012
00:34:55,560 --> 00:34:57,600
CAE becomes a control you can trust.
1013
00:34:57,600 --> 00:34:59,840
There's also a dependency most people miss.
1014
00:34:59,840 --> 00:35:03,280
CAE pushes you toward cleaner identity architecture.
1015
00:35:03,280 --> 00:35:05,000
If your environment still relies heavily
1016
00:35:05,000 --> 00:35:06,640
on legacy authentication patterns
1017
00:35:06,640 --> 00:35:08,600
or your application estate treats tokens
1018
00:35:08,600 --> 00:35:11,200
as long-lived entitlements, then CAE becomes
1019
00:35:11,200 --> 00:35:14,120
a compatibility argument instead of a security capability.
1020
00:35:14,120 --> 00:35:15,480
That's not a reason to avoid it.
1021
00:35:15,480 --> 00:35:17,680
That's a reason to treat application modernization
1022
00:35:17,680 --> 00:35:19,000
as part of security resilience
1023
00:35:19,000 --> 00:35:21,320
because the business depends on revocation speed.
1024
00:35:21,320 --> 00:35:23,760
A concrete scenario makes this obvious.
1025
00:35:23,760 --> 00:35:25,880
An employee's account gets flagged as high risk
1026
00:35:25,880 --> 00:35:27,640
after anomalous activity.
1027
00:35:27,640 --> 00:35:29,200
In the old model, the security team
1028
00:35:29,200 --> 00:35:30,200
disables the account,
1029
00:35:30,200 --> 00:35:32,000
but the attacker's token remains valid
1030
00:35:32,000 --> 00:35:34,000
in a browser session connected to SharePoint
1031
00:35:34,000 --> 00:35:35,600
or another SaaS service.
1032
00:35:35,600 --> 00:35:37,240
The attacker continues downloading data
1033
00:35:37,240 --> 00:35:38,520
until the session expires.
1034
00:35:38,520 --> 00:35:40,880
The organization responded, but impact continued.
1035
00:35:40,880 --> 00:35:42,520
With CAE, disabling the account
1036
00:35:42,520 --> 00:35:44,280
or changing the risk state can trigger
1037
00:35:44,280 --> 00:35:45,880
a near real-time re-evaluation.
1038
00:35:45,880 --> 00:35:47,840
The app receives the revocation signal.
1039
00:35:47,840 --> 00:35:49,880
The session is forced to re-authenticate
1040
00:35:49,880 --> 00:35:51,640
and the attacker's runway collapses.
1041
00:35:51,640 --> 00:35:53,760
The cost of compromise becomes bounded,
1042
00:35:53,760 --> 00:35:55,800
not because the attacker failed to get in,
1043
00:35:55,800 --> 00:35:57,040
but because they couldn't stay.
1044
00:35:57,040 --> 00:35:58,320
That is lived zero trust.
1045
00:35:58,320 --> 00:35:59,560
Not a poster, not a slide,
1046
00:35:59,560 --> 00:36:02,040
a system that revokes trust inside the session.
1047
00:36:02,040 --> 00:36:03,640
And CAE has a second order benefit
1048
00:36:03,640 --> 00:36:04,960
that leaders tend to miss.
1049
00:36:04,960 --> 00:36:07,320
It reduces the need for blanket shutdowns.
1050
00:36:07,320 --> 00:36:09,200
When you can revoke precisely
1051
00:36:09,200 --> 00:36:11,480
this identity, these sessions, these apps,
1052
00:36:11,480 --> 00:36:13,520
you stop reaching for the blunt instrument
1053
00:36:13,520 --> 00:36:16,920
of turn-off access for everyone until we figure it out.
1054
00:36:16,920 --> 00:36:20,120
Precision is how you preserve continuity while you contain.
1055
00:36:20,120 --> 00:36:22,320
That is resilience measured in business uptime,
1056
00:36:22,320 --> 00:36:23,760
not in policy documents.
1057
00:36:23,760 --> 00:36:26,800
So CAE is not a feature you enable to feel modern.
1058
00:36:26,800 --> 00:36:28,800
It is a forcing function that makes you prove
1059
00:36:28,800 --> 00:36:30,560
your trust model is enforceable.
1060
00:36:30,560 --> 00:36:32,880
Your app estate is compatible with revocation
1061
00:36:32,880 --> 00:36:34,760
and your exception culture is governed.
1062
00:36:34,760 --> 00:36:36,480
If you can't revoke trust quickly,
1063
00:36:36,480 --> 00:36:37,760
you don't have zero trust.
1064
00:36:37,760 --> 00:36:39,880
You have conditional chaos with nicer branding.
1065
00:36:39,880 --> 00:36:42,520
Why adding controls often slows the business.
1066
00:36:42,520 --> 00:36:45,000
Now here's the part leaders feel in their bones.
1067
00:36:45,000 --> 00:36:47,840
Every time security improves, the business feels slower,
1068
00:36:47,840 --> 00:36:50,320
more prompts, more tickets, more waiting,
1069
00:36:50,320 --> 00:36:52,720
more people saying, "I can't do my job."
1070
00:36:52,720 --> 00:36:54,360
And then the predictable conclusion,
1071
00:36:54,360 --> 00:36:56,520
security is the department of no.
1072
00:36:56,520 --> 00:36:58,520
That conclusion is convenient, it's also wrong.
1073
00:36:58,520 --> 00:37:00,920
The system is doing exactly what it was designed to do.
1074
00:37:00,920 --> 00:37:04,000
Most organizations add controls the way they add speed bumps,
1075
00:37:04,000 --> 00:37:07,040
reactively, locally, and without redesigning the road.
1076
00:37:07,040 --> 00:37:09,480
A fishing incident happens so MFA prompts increase.
1077
00:37:09,480 --> 00:37:12,040
A data leak happens so downloads get blocked
1078
00:37:12,040 --> 00:37:13,440
and audit finding appears.
1079
00:37:13,440 --> 00:37:15,720
So an approval step gets inserted.
1080
00:37:15,720 --> 00:37:17,080
None of these are irrational.
1081
00:37:17,080 --> 00:37:19,760
But stack together, they create a security program
1082
00:37:19,760 --> 00:37:21,200
that behaves like a queue.
1083
00:37:21,200 --> 00:37:23,040
Cue's create latency.
1084
00:37:23,040 --> 00:37:25,440
Latency creates workarounds.
1085
00:37:25,440 --> 00:37:27,440
This is where the real failure happens.
1086
00:37:27,440 --> 00:37:29,840
The business doesn't break security because it's malicious.
1087
00:37:29,840 --> 00:37:32,160
It roots around security because security behaves
1088
00:37:32,160 --> 00:37:34,400
like an obstacle course bolted onto workflows
1089
00:37:34,400 --> 00:37:35,560
that were never redesigned.
1090
00:37:35,560 --> 00:37:37,720
People will always optimize for outcomes.
1091
00:37:37,720 --> 00:37:39,040
If the system blocks outcomes,
1092
00:37:39,040 --> 00:37:40,960
people will find alternate pathways.
1093
00:37:40,960 --> 00:37:43,280
And the alternate pathways are never the safe ones.
1094
00:37:43,280 --> 00:37:45,920
This is also why security teams are stuck in a losing pattern.
1095
00:37:45,920 --> 00:37:48,040
They add a control, the business adapts,
1096
00:37:48,040 --> 00:37:51,080
exceptions multiply, the control loses force.
1097
00:37:51,080 --> 00:37:54,080
The dashboard stays green because the control exists.
1098
00:37:54,080 --> 00:37:57,320
But the organization is now operating on a shadow model.
1099
00:37:57,320 --> 00:38:00,240
What the policies say versus what people actually do
1100
00:38:00,240 --> 00:38:02,240
to get work done, that distinction matters
1101
00:38:02,240 --> 00:38:03,960
because leadership often measures security
1102
00:38:03,960 --> 00:38:05,160
by visible friction.
1103
00:38:05,160 --> 00:38:07,040
Look, we're blocking risky behavior.
1104
00:38:07,040 --> 00:38:08,720
Meanwhile, the most dangerous behaviors
1105
00:38:08,720 --> 00:38:10,400
are now happening invisibly.
1106
00:38:10,400 --> 00:38:13,120
Shared admin access because approvals are too slow,
1107
00:38:13,120 --> 00:38:15,680
unsanctioned SaaS because procurement takes months,
1108
00:38:15,680 --> 00:38:18,880
personal devices because corporate enrollment is painful,
1109
00:38:18,880 --> 00:38:21,640
or OAuth app consent because it's faster
1110
00:38:21,640 --> 00:38:23,560
than requesting integration support.
1111
00:38:23,560 --> 00:38:25,320
Security didn't prevent risk.
1112
00:38:25,320 --> 00:38:26,480
It displaced it.
1113
00:38:26,480 --> 00:38:28,600
This is what happens when controls aren't embedded
1114
00:38:28,600 --> 00:38:29,720
in the way work is done.
1115
00:38:29,720 --> 00:38:31,160
They become after the fact checkpoints
1116
00:38:31,160 --> 00:38:34,040
and checkpoints create backlogs, backlogs create pressure.
1117
00:38:34,040 --> 00:38:35,240
Pressure creates bypass.
1118
00:38:35,240 --> 00:38:37,440
Over time, you don't get higher security.
1119
00:38:37,440 --> 00:38:40,480
You get conditional compliance, people comply when it's easy
1120
00:38:40,480 --> 00:38:41,840
and evade when it's hard.
1121
00:38:41,840 --> 00:38:43,440
This is also why just add more approvals
1122
00:38:43,440 --> 00:38:45,040
is such a dangerous reflex.
1123
00:38:45,040 --> 00:38:46,840
Approvals feel like governance, but approvals
1124
00:38:46,840 --> 00:38:47,880
are just decision gates.
1125
00:38:47,880 --> 00:38:50,840
If those gates are slow, inconsistent, or unclear,
1126
00:38:50,840 --> 00:38:53,600
you've traded technical risk for operational risk.
1127
00:38:53,600 --> 00:38:55,560
Now the business can't execute quickly
1128
00:38:55,560 --> 00:38:57,360
and when the business can't execute quickly,
1129
00:38:57,360 --> 00:38:59,840
the business creates its own execution layer.
1130
00:38:59,840 --> 00:39:02,000
That is shadowite and it is not a moral problem.
1131
00:39:02,000 --> 00:39:03,200
It is a systems outcome.
1132
00:39:03,200 --> 00:39:04,440
So why does this keep happening?
1133
00:39:04,440 --> 00:39:07,240
Because controls are being deployed as independent artifacts
1134
00:39:07,240 --> 00:39:09,200
instead of as parts of a trust system,
1135
00:39:09,200 --> 00:39:11,560
each control is optimized for its own purpose.
1136
00:39:11,560 --> 00:39:13,520
The combined effect is rarely modeled.
1137
00:39:13,520 --> 00:39:15,640
Nobody asks the core question,
1138
00:39:15,640 --> 00:39:18,080
what decision latency are we introducing
1139
00:39:18,080 --> 00:39:20,800
and what behaviors will that latency incentivize?
1140
00:39:20,800 --> 00:39:23,480
Security teams also get trapped by the wrong success metric.
1141
00:39:23,480 --> 00:39:26,440
If success is reduced incidents, teams will add friction.
1142
00:39:26,440 --> 00:39:27,960
A friction reduces some incidents,
1143
00:39:27,960 --> 00:39:30,160
but friction also creates bypass and resentment
1144
00:39:30,160 --> 00:39:31,920
which creates new incidents later.
1145
00:39:31,920 --> 00:39:34,600
It's the same pattern as poorly designed compliance.
1146
00:39:34,600 --> 00:39:37,080
It produces paperwork, not capability.
1147
00:39:37,080 --> 00:39:38,760
The better metric is still MTTR
1148
00:39:38,760 --> 00:39:40,360
because when you measure MTTR,
1149
00:39:40,360 --> 00:39:42,080
you get forced to remove friction
1150
00:39:42,080 --> 00:39:43,560
that doesn't produce containment.
1151
00:39:43,560 --> 00:39:46,440
You start asking which steps are genuinely necessary
1152
00:39:46,440 --> 00:39:49,840
and which steps exist because we don't trust our own systems.
1153
00:39:49,840 --> 00:39:51,200
Which checks can be automated
1154
00:39:51,200 --> 00:39:52,360
and which require humans
1155
00:39:52,360 --> 00:39:54,440
because the decision is truly business sensitive.
1156
00:39:54,440 --> 00:39:56,200
That's where automation matters, not as a gadget
1157
00:39:56,200 --> 00:39:58,400
but as a way to restore human decision time.
1158
00:39:58,400 --> 00:40:00,600
Automation doesn't eliminate accountability.
1159
00:40:00,600 --> 00:40:02,520
It collapses the boring latency,
1160
00:40:02,520 --> 00:40:06,000
enrichment, correlation, ticket creation, routing
1161
00:40:06,000 --> 00:40:07,760
and reversible containment actions
1162
00:40:07,760 --> 00:40:10,280
that should not require a human to copy paste data
1163
00:40:10,280 --> 00:40:12,320
across tools at 2AM.
1164
00:40:12,320 --> 00:40:14,920
The human should be deciding intent and impact.
1165
00:40:14,920 --> 00:40:17,640
The system should be executing repeatable mechanics
1166
00:40:17,640 --> 00:40:19,480
and the reason leaders should care is simple.
1167
00:40:19,480 --> 00:40:22,880
When you make security slow, you make the business unsafe.
1168
00:40:22,880 --> 00:40:24,360
Not because users are careless
1169
00:40:24,360 --> 00:40:27,600
because the system taught them that speed requires evasion.
1170
00:40:27,600 --> 00:40:29,600
So the problem is not too many controls.
1171
00:40:29,600 --> 00:40:32,400
The problem is controls added without redesigning workflows
1172
00:40:32,400 --> 00:40:33,800
into safe autonomy.
1173
00:40:33,800 --> 00:40:35,760
Controls that don't create safe autonomy
1174
00:40:35,760 --> 00:40:37,720
will always be experienced as friction
1175
00:40:37,720 --> 00:40:38,840
and friction is not neutral.
1176
00:40:38,840 --> 00:40:40,280
It is an entropy generator.
1177
00:40:40,280 --> 00:40:41,600
If you want speed and security,
1178
00:40:41,600 --> 00:40:43,280
you don't negotiate with human nature.
1179
00:40:43,280 --> 00:40:44,480
You redesign the system
1180
00:40:44,480 --> 00:40:47,040
so the safe path is the fast path.
1181
00:40:47,040 --> 00:40:49,040
Human behavior is not the weak link.
1182
00:40:49,040 --> 00:40:52,160
Design is human behavior isn't the weak link.
1183
00:40:52,160 --> 00:40:52,920
That's the story.
1184
00:40:52,920 --> 00:40:55,240
Security tells itself when it can't admit the system
1185
00:40:55,240 --> 00:40:57,960
is poorly designed, people don't wake up wanting to create risk.
1186
00:40:57,960 --> 00:40:59,680
They wake up wanting to finish work,
1187
00:40:59,680 --> 00:41:02,240
ship the release, close the quarter, onboard the partner,
1188
00:41:02,240 --> 00:41:04,800
respond to the customer, unblock the executive.
1189
00:41:04,800 --> 00:41:06,160
When security makes that harder,
1190
00:41:06,160 --> 00:41:07,800
people don't ignore policy.
1191
00:41:07,800 --> 00:41:08,960
They optimize around it.
1192
00:41:08,960 --> 00:41:09,880
That's not negligence.
1193
00:41:09,880 --> 00:41:12,600
That's predictable behavior inside a constrained system.
1194
00:41:12,600 --> 00:41:15,040
This is why blaming users is such a comfortable mistake.
1195
00:41:15,040 --> 00:41:17,400
It turns a design failure into a training problem.
1196
00:41:17,400 --> 00:41:20,160
It converts architecture into morality.
1197
00:41:20,160 --> 00:41:22,120
And it lets leadership believe the solution
1198
00:41:22,120 --> 00:41:23,520
is another awareness module
1199
00:41:23,520 --> 00:41:25,720
instead of fixing the way access workflow
1200
00:41:25,720 --> 00:41:27,320
and response actually function.
1201
00:41:27,320 --> 00:41:30,040
The system creates the behavior, always.
1202
00:41:30,040 --> 00:41:32,800
If privileged access elevation takes two days,
1203
00:41:32,800 --> 00:41:35,000
people will find a standing admin account.
1204
00:41:35,000 --> 00:41:36,720
If app onboarding takes six weeks,
1205
00:41:36,720 --> 00:41:39,640
teams will use personal tokens and unsanctioned CES.
1206
00:41:39,640 --> 00:41:41,880
If approvals require three different managers,
1207
00:41:41,880 --> 00:41:44,280
someone will share credentials temporarily
1208
00:41:44,280 --> 00:41:45,960
and temporary will become permanent
1209
00:41:45,960 --> 00:41:48,560
because the business still needs to operate tomorrow.
1210
00:41:48,560 --> 00:41:50,760
Your policies don't fail because people are bad.
1211
00:41:50,760 --> 00:41:52,640
They fail because the path of least resistance
1212
00:41:52,640 --> 00:41:53,760
is the unsafe path.
1213
00:41:53,760 --> 00:41:57,000
This is where workarounds stop being a human failure
1214
00:41:57,000 --> 00:41:58,680
and start being system telemetry.
1215
00:41:58,680 --> 00:41:59,840
A workaround is a signal
1216
00:41:59,840 --> 00:42:02,200
that the intended workflow doesn't match reality.
1217
00:42:02,200 --> 00:42:03,760
It's evidence that the control plane
1218
00:42:03,760 --> 00:42:06,280
isn't aligned with how work actually happens.
1219
00:42:06,280 --> 00:42:09,280
And when security treats workarounds as insubordination,
1220
00:42:09,280 --> 00:42:10,880
it guarantees two outcomes.
1221
00:42:10,880 --> 00:42:12,160
Workarounds go underground
1222
00:42:12,160 --> 00:42:13,960
and the organization loses visibility
1223
00:42:13,960 --> 00:42:15,800
into its true operating model.
1224
00:42:15,800 --> 00:42:18,000
Silent non-compliance is the default state
1225
00:42:18,000 --> 00:42:19,720
of mature bureaucracies.
1226
00:42:19,720 --> 00:42:21,800
The policy exists, the dashboard is green,
1227
00:42:21,800 --> 00:42:24,080
the audit passes, the behavior diverges anyway
1228
00:42:24,080 --> 00:42:25,800
because the system rewards throughput
1229
00:42:25,800 --> 00:42:27,360
more than it rewards adherents.
1230
00:42:27,360 --> 00:42:29,760
Meanwhile, the organization tells itself a story.
1231
00:42:29,760 --> 00:42:31,640
We're secure because we have controls.
1232
00:42:31,640 --> 00:42:33,040
The attacker enjoys that story.
1233
00:42:33,040 --> 00:42:35,760
This is also why security fatigue is not a user problem.
1234
00:42:35,760 --> 00:42:36,720
It's a design problem.
1235
00:42:36,720 --> 00:42:38,240
If MFA prompts a constant,
1236
00:42:38,240 --> 00:42:40,440
users learn to approve without reading.
1237
00:42:40,440 --> 00:42:42,200
If warning banners appear on every email,
1238
00:42:42,200 --> 00:42:43,600
people stop seeing them.
1239
00:42:43,600 --> 00:42:45,680
If every request is treated like a crisis,
1240
00:42:45,680 --> 00:42:46,920
the workforce becomes numb.
1241
00:42:46,920 --> 00:42:48,360
The control becomes noise.
1242
00:42:48,360 --> 00:42:50,880
And noise is not protection, it's attacks.
1243
00:42:50,880 --> 00:42:53,200
A well-designed system doesn't require heroic attention.
1244
00:42:53,200 --> 00:42:55,840
It assumes attention is scarce and builds guardrails
1245
00:42:55,840 --> 00:42:58,640
that work even when people are tired, rushed or distracted.
1246
00:42:58,640 --> 00:43:01,360
That's not cynical, that's operational realism.
1247
00:43:01,360 --> 00:43:03,720
So when organizations say people are the weakest link,
1248
00:43:03,720 --> 00:43:05,320
they're usually describing a mismatch
1249
00:43:05,320 --> 00:43:07,920
between two speeds, the speed of business
1250
00:43:07,920 --> 00:43:09,440
and the speed of security.
1251
00:43:09,440 --> 00:43:11,400
Security responds by slowing the business
1252
00:43:11,400 --> 00:43:13,600
and the business responds by rooting around security.
1253
00:43:13,600 --> 00:43:14,440
That is the loop.
1254
00:43:14,440 --> 00:43:16,440
It repeats until either leadership intervenes
1255
00:43:16,440 --> 00:43:17,720
or the attacker does.
1256
00:43:17,720 --> 00:43:19,520
And AI makes the mismatch sharper.
1257
00:43:19,520 --> 00:43:21,040
AI accelerates work.
1258
00:43:21,040 --> 00:43:23,800
Drafting, coding, summarizing, automating, integrating,
1259
00:43:23,800 --> 00:43:26,440
the organization's appetite for speed increases.
1260
00:43:26,440 --> 00:43:29,000
If security remains a manual gate, tickets, approvals,
1261
00:43:29,000 --> 00:43:32,000
reviews done quarterly, then security becomes the bottleneck
1262
00:43:32,000 --> 00:43:33,400
that the business will circumvent,
1263
00:43:33,400 --> 00:43:35,040
not because it wants to, because it has to.
1264
00:43:35,040 --> 00:43:37,480
This is why secure by design is not a slogan.
1265
00:43:37,480 --> 00:43:39,400
It's a requirement for maintaining control
1266
00:43:39,400 --> 00:43:41,400
when the systems throughput doubles.
1267
00:43:41,400 --> 00:43:44,160
Design is how you scale trust without scaling friction.
1268
00:43:44,160 --> 00:43:47,360
Design means the safest path is also the fastest path.
1269
00:43:47,360 --> 00:43:49,520
Users shouldn't need to choose between compliance
1270
00:43:49,520 --> 00:43:50,600
and productivity.
1271
00:43:50,600 --> 00:43:52,360
If they do, they will choose productivity
1272
00:43:52,360 --> 00:43:54,960
because that's what the organization actually rewards.
1273
00:43:54,960 --> 00:43:57,120
So what does design look like in this context?
1274
00:43:57,120 --> 00:43:58,920
It looks like making identity governance
1275
00:43:58,920 --> 00:44:01,640
and privileged access not only strict but usable.
1276
00:44:01,640 --> 00:44:03,200
It looks like time-bound access
1277
00:44:03,200 --> 00:44:05,280
that can be requested and approved quickly
1278
00:44:05,280 --> 00:44:06,920
with clear accountability.
1279
00:44:06,920 --> 00:44:09,360
It looks like conditional access policies
1280
00:44:09,360 --> 00:44:11,000
that are consistent and predictable,
1281
00:44:11,000 --> 00:44:12,600
not a maze of exceptions.
1282
00:44:12,600 --> 00:44:14,480
It looks like continuous session revocation,
1283
00:44:14,480 --> 00:44:16,880
so compromised access doesn't linger.
1284
00:44:16,880 --> 00:44:18,320
It looks like response workflows
1285
00:44:18,320 --> 00:44:20,040
that trigger actions automatically.
1286
00:44:20,040 --> 00:44:21,920
So humans spend time deciding impact,
1287
00:44:21,920 --> 00:44:23,920
not moving data between portals.
1288
00:44:23,920 --> 00:44:26,600
And it looks like explicitly designing for failure,
1289
00:44:26,600 --> 00:44:28,720
assume compromise, reduce blast radius
1290
00:44:28,720 --> 00:44:30,160
and make containment normal.
1291
00:44:30,160 --> 00:44:32,680
If those properties exist, humans don't need to be perfect.
1292
00:44:32,680 --> 00:44:34,840
The system catches them, the system constrains them,
1293
00:44:34,840 --> 00:44:37,240
the system corrects quickly when reality changes.
1294
00:44:37,240 --> 00:44:39,720
If those properties don't exist, humans are asked
1295
00:44:39,720 --> 00:44:41,480
to compensate for architectural gaps
1296
00:44:41,480 --> 00:44:42,800
with attention and discipline.
1297
00:44:42,800 --> 00:44:43,800
That is not a strategy.
1298
00:44:43,800 --> 00:44:44,800
That is a fragile wish.
1299
00:44:44,800 --> 00:44:46,640
So stop saying the user is the problem.
1300
00:44:46,640 --> 00:44:48,040
The user is the environment
1301
00:44:48,040 --> 00:44:51,840
and your environment behaves exactly as you designed it to behave.
1302
00:44:51,840 --> 00:44:52,960
Safe autonomy.
1303
00:44:52,960 --> 00:44:55,320
The real objective of modern security.
1304
00:44:55,320 --> 00:44:57,880
Safe autonomy is the objective leaders actually want
1305
00:44:57,880 --> 00:44:59,400
even if they keep funding the opposite.
1306
00:44:59,400 --> 00:45:00,760
They want teams to move fast
1307
00:45:00,760 --> 00:45:02,720
without creating new existential risks.
1308
00:45:02,720 --> 00:45:05,040
They want developers shipping, finance approving,
1309
00:45:05,040 --> 00:45:06,760
sales sharing and operations running
1310
00:45:06,760 --> 00:45:09,080
without every meaningful action turning into a security
1311
00:45:09,080 --> 00:45:11,080
exception or a SOC incident.
1312
00:45:11,080 --> 00:45:13,400
And they want that speed to be reliable,
1313
00:45:13,400 --> 00:45:16,320
not dependent on which senior engineer happens to be awake.
1314
00:45:16,320 --> 00:45:18,640
Security that cannot produce safe autonomy
1315
00:45:18,640 --> 00:45:20,160
becomes a break you never tuned.
1316
00:45:20,160 --> 00:45:22,720
It still slows the car, but it doesn't prevent the crash.
1317
00:45:22,720 --> 00:45:25,240
It just makes everyone angry on the way there.
1318
00:45:25,240 --> 00:45:26,640
So define it cleanly.
1319
00:45:26,640 --> 00:45:29,160
Autonomy means people and systems can act
1320
00:45:29,160 --> 00:45:31,920
without waiting for a central authority on every decision.
1321
00:45:31,920 --> 00:45:33,880
It means access is available when needed.
1322
00:45:33,880 --> 00:45:35,440
It means change is possible.
1323
00:45:35,440 --> 00:45:37,240
It means the organization can execute.
1324
00:45:37,240 --> 00:45:40,440
But autonomy without guardrails is just distributed risk creation.
1325
00:45:40,440 --> 00:45:42,920
Safe autonomy is autonomy with constraints
1326
00:45:42,920 --> 00:45:45,760
that are dynamic, enforceable and fast.
1327
00:45:45,760 --> 00:45:48,160
Dynamic means the control plane uses context,
1328
00:45:48,160 --> 00:45:49,640
not static assumptions.
1329
00:45:49,640 --> 00:45:53,320
Identity and device posture, risk signals, session state,
1330
00:45:53,320 --> 00:45:56,360
resource sensitivity, those inputs shape the decision
1331
00:45:56,360 --> 00:45:57,200
continuously.
1332
00:45:57,200 --> 00:45:59,280
If the context changes, the decision changes.
1333
00:45:59,280 --> 00:46:00,120
That's not a feature.
1334
00:46:00,120 --> 00:46:02,160
That's the only model that survives modern SAS
1335
00:46:02,160 --> 00:46:03,560
and AI accelerated work.
1336
00:46:03,560 --> 00:46:06,400
Enforceable means the decision isn't just policy text.
1337
00:46:06,400 --> 00:46:08,600
It is honored by the system's people actually use.
1338
00:46:08,600 --> 00:46:10,600
If a privileged role requires elevation,
1339
00:46:10,600 --> 00:46:13,120
the elevation path has to exist and work.
1340
00:46:13,120 --> 00:46:15,520
If a session is revoked, the app has to comply.
1341
00:46:15,520 --> 00:46:17,720
If an access package expires, the access
1342
00:46:17,720 --> 00:46:19,560
must disappear without negotiation.
1343
00:46:19,560 --> 00:46:20,960
Otherwise, you don't have governance.
1344
00:46:20,960 --> 00:46:22,800
You have aspiration.
1345
00:46:22,800 --> 00:46:25,600
Fast means the safe path is the easy path.
1346
00:46:25,600 --> 00:46:27,800
This is the mistake security keeps making.
1347
00:46:27,800 --> 00:46:30,320
It builds a safe path that is correct but slow.
1348
00:46:30,320 --> 00:46:32,920
Then it acts surprised when the business roots around it.
1349
00:46:32,920 --> 00:46:35,240
If you want safe autonomy, your control mechanisms
1350
00:46:35,240 --> 00:46:36,960
must operate at business speed.
1351
00:46:36,960 --> 00:46:39,680
Access requests must be fulfilable without weeks of tickets.
1352
00:46:39,680 --> 00:46:42,280
Privilege elevation must be minutes, not days.
1353
00:46:42,280 --> 00:46:46,160
Revocation must be near real time, not when the token times out.
1354
00:46:46,160 --> 00:46:48,280
Response must be orchestrated, not tribal.
1355
00:46:48,280 --> 00:46:50,360
This is also where least privilege stops
1356
00:46:50,360 --> 00:46:53,280
being a purity test and becomes a design pattern.
1357
00:46:53,280 --> 00:46:55,040
These privilege in a safe autonomy model
1358
00:46:55,040 --> 00:46:57,560
is not, you get less access forever.
1359
00:46:57,560 --> 00:47:00,560
It's, you get exactly what you need, exactly when you need it,
1360
00:47:00,560 --> 00:47:02,520
and it disappears when you don't.
1361
00:47:02,520 --> 00:47:05,240
Time is the missing dimension in most access models.
1362
00:47:05,240 --> 00:47:07,320
At time and the whole system becomes easier
1363
00:47:07,320 --> 00:47:09,280
to secure without slowing work.
1364
00:47:09,280 --> 00:47:11,120
Remove time and privilege is accumulate
1365
00:47:11,120 --> 00:47:13,600
until your environment is permanently overauthorized
1366
00:47:13,600 --> 00:47:15,600
and autonomy doesn't just apply to humans.
1367
00:47:15,600 --> 00:47:17,960
Work loads, connectors, service principles
1368
00:47:17,960 --> 00:47:21,560
and increasingly AI agents are acting on behalf of the business.
1369
00:47:21,560 --> 00:47:23,280
If those identities aren't governed,
1370
00:47:23,280 --> 00:47:26,560
scoped permissions, explicit ownership, rotation, and monitoring,
1371
00:47:26,560 --> 00:47:27,840
you don't have autonomy.
1372
00:47:27,840 --> 00:47:29,280
You have unattended authority.
1373
00:47:29,280 --> 00:47:31,200
That is the fastest way to create a breach
1374
00:47:31,200 --> 00:47:33,720
with no obvious user mistake to blame.
1375
00:47:33,720 --> 00:47:36,120
So safe autonomy requires two loops
1376
00:47:36,120 --> 00:47:38,320
to be built into the platform experience.
1377
00:47:38,320 --> 00:47:41,640
Loop one is the trust loop signals to decision to enforcement
1378
00:47:41,640 --> 00:47:43,080
continuously.
1379
00:47:43,080 --> 00:47:45,080
This is where entra governance, conditional access,
1380
00:47:45,080 --> 00:47:46,440
and CAE live.
1381
00:47:46,440 --> 00:47:48,240
It's where trust is earned, constrained,
1382
00:47:48,240 --> 00:47:49,760
and revoked without drama.
1383
00:47:49,760 --> 00:47:53,280
Loop two is the response loop, detection to action to recovery.
1384
00:47:53,280 --> 00:47:56,040
Because safe autonomy doesn't mean nothing goes wrong.
1385
00:47:56,040 --> 00:47:57,280
It means when something goes wrong,
1386
00:47:57,280 --> 00:47:58,800
the system contains it fast enough
1387
00:47:58,800 --> 00:48:00,320
that the business can keep moving.
1388
00:48:00,320 --> 00:48:01,840
This is the part leaders often miss.
1389
00:48:01,840 --> 00:48:04,720
Autonomy increases the number of actions taken without oversight,
1390
00:48:04,720 --> 00:48:06,640
so the system must be able to correct quickly
1391
00:48:06,640 --> 00:48:08,840
when an action turns out to be risky.
1392
00:48:08,840 --> 00:48:11,560
The faster you can revoke, isolate, and remediate,
1393
00:48:11,560 --> 00:48:13,840
the more autonomy you can safely allow.
1394
00:48:13,840 --> 00:48:15,480
That's the trade.
1395
00:48:15,480 --> 00:48:16,960
If your response loop is slow,
1396
00:48:16,960 --> 00:48:19,480
you will inevitably compensate by reducing autonomy,
1397
00:48:19,480 --> 00:48:23,000
more approvals, more gates, more centralized control.
1398
00:48:23,000 --> 00:48:24,400
Not because it's philosophically better,
1399
00:48:24,400 --> 00:48:26,440
but because it's the only way to reduce blast radius
1400
00:48:26,440 --> 00:48:27,840
when you can't contain quickly.
1401
00:48:27,840 --> 00:48:30,480
That is the real reason security slows the business.
1402
00:48:30,480 --> 00:48:32,360
It is compensating for weak revocation
1403
00:48:32,360 --> 00:48:34,320
and weak response with human friction.
1404
00:48:34,320 --> 00:48:36,040
Safe autonomy flips that equation.
1405
00:48:36,040 --> 00:48:38,880
It says, invest in control, plane clarity, and response speed,
1406
00:48:38,880 --> 00:48:40,960
so the organization can decentralize execution
1407
00:48:40,960 --> 00:48:42,280
without decentralizing risk.
1408
00:48:42,280 --> 00:48:43,640
And the executive level marker
1409
00:48:43,640 --> 00:48:45,800
that you're building it correctly is simple,
1410
00:48:45,800 --> 00:48:48,840
fewer emergency exceptions, fewer escalations,
1411
00:48:48,840 --> 00:48:52,000
fewer security needs to approve this right now moments.
1412
00:48:52,000 --> 00:48:53,200
Not because you blocked more,
1413
00:48:53,200 --> 00:48:56,200
because you designed the trusted path to be the default path.
1414
00:48:56,200 --> 00:48:59,680
When safe autonomy exists, security stops being a queue.
1415
00:48:59,680 --> 00:49:02,120
It becomes an operating property of the business.
1416
00:49:02,120 --> 00:49:05,200
Detection without response is expensive telemetry.
1417
00:49:05,200 --> 00:49:07,640
Once you accept safe autonomy as the objective,
1418
00:49:07,640 --> 00:49:09,320
the next failure becomes obvious.
1419
00:49:09,320 --> 00:49:12,000
Most security programs are built like observatories.
1420
00:49:12,000 --> 00:49:13,840
They collect signals, they classify events,
1421
00:49:13,840 --> 00:49:16,080
they generate alerts, then they stop.
1422
00:49:16,080 --> 00:49:17,440
And then everyone acts surprised
1423
00:49:17,440 --> 00:49:19,880
when incidents still turn into business outages.
1424
00:49:19,880 --> 00:49:21,880
Detection by itself doesn't reduce impact,
1425
00:49:21,880 --> 00:49:23,280
it documents impact.
1426
00:49:23,280 --> 00:49:24,320
That distinction matters
1427
00:49:24,320 --> 00:49:26,720
because dashboards are emotionally comforting.
1428
00:49:26,720 --> 00:49:28,800
A high severity alert feels like progress,
1429
00:49:28,800 --> 00:49:32,040
a unified incident view feels like control.
1430
00:49:32,040 --> 00:49:33,680
But none of it changes the outcome
1431
00:49:33,680 --> 00:49:36,560
if the organization can't convert signal into action
1432
00:49:36,560 --> 00:49:37,760
fast enough to matter.
1433
00:49:37,760 --> 00:49:40,720
This is why so many well-secured organizations still fail.
1434
00:49:40,720 --> 00:49:42,360
Not because they lack detection,
1435
00:49:42,360 --> 00:49:45,160
because they lack decision speed and enforcement speed.
1436
00:49:45,160 --> 00:49:47,920
You can think of response as a pipeline with four stages.
1437
00:49:47,920 --> 00:49:50,600
Detect, decide, enforce, recover.
1438
00:49:50,600 --> 00:49:53,520
Most organizations over-invest in the first stage,
1439
00:49:53,520 --> 00:49:55,440
under-invest in the second and third
1440
00:49:55,440 --> 00:49:57,480
and treat the fourth as an annual exercise.
1441
00:49:57,480 --> 00:49:59,120
So the system behaves like a camera,
1442
00:49:59,120 --> 00:50:00,280
not like a control system.
1443
00:50:00,280 --> 00:50:02,080
A camera is valuable after the fact.
1444
00:50:02,080 --> 00:50:03,880
It tells you what happened, it can help you learn.
1445
00:50:03,880 --> 00:50:05,800
But it doesn't stop the car from hitting the wall.
1446
00:50:05,800 --> 00:50:07,240
For that, you need brakes.
1447
00:50:07,240 --> 00:50:09,440
In security terms, you need orchestration.
1448
00:50:09,440 --> 00:50:12,280
Consistent, auditable actions that reduce blast radius quickly.
1449
00:50:12,280 --> 00:50:15,240
The core issue is that response is usually human middleware
1450
00:50:15,240 --> 00:50:16,200
and alert fires.
1451
00:50:16,200 --> 00:50:17,160
It lands in a queue.
1452
00:50:17,160 --> 00:50:20,280
Someone triages it, they copy information from one portal to another,
1453
00:50:20,280 --> 00:50:22,440
they ask an app owner what the identity does.
1454
00:50:22,440 --> 00:50:24,480
They ask I'd to isolate a device.
1455
00:50:24,480 --> 00:50:27,160
They ask identity administrators to disable an account.
1456
00:50:27,160 --> 00:50:29,360
They ask messaging teams to purge an email.
1457
00:50:29,360 --> 00:50:31,360
They ask someone else to reset credentials.
1458
00:50:31,360 --> 00:50:33,080
Each step is rational in isolation.
1459
00:50:33,080 --> 00:50:34,680
Collectively, it's a latency engine.
1460
00:50:34,680 --> 00:50:36,400
An attacker's exploit latency.
1461
00:50:36,400 --> 00:50:37,480
They don't need to be brilliant.
1462
00:50:37,480 --> 00:50:38,520
They need you to be slow.
1463
00:50:38,520 --> 00:50:41,400
This is where leadership gets trapped in the wrong conversation.
1464
00:50:41,400 --> 00:50:43,360
They ask, do we have a sock?
1465
00:50:43,360 --> 00:50:45,000
They ask, are we monitoring?
1466
00:50:45,000 --> 00:50:47,040
They ask, how many alerts did we close out?
1467
00:50:47,040 --> 00:50:48,320
Those are activity metrics.
1468
00:50:48,320 --> 00:50:50,680
They don't tell you whether the organization can contain
1469
00:50:50,680 --> 00:50:52,840
an identity-driven incident in business time.
1470
00:50:52,840 --> 00:50:55,160
The question that matters is, how long does it take
1471
00:50:55,160 --> 00:50:57,720
from first signal to first meaningful containment?
1472
00:50:57,720 --> 00:51:00,600
Not to a ticket, not to a slack thread, to containment?
1473
00:51:00,600 --> 00:51:03,880
Because that's the moment you stop paying compounding interest on the breach.
1474
00:51:03,880 --> 00:51:07,160
Now, the uncomfortable part, detection without response is not neutral.
1475
00:51:07,160 --> 00:51:07,920
It's expensive.
1476
00:51:07,920 --> 00:51:09,160
It consumes licensing.
1477
00:51:09,160 --> 00:51:10,240
It consumes storage.
1478
00:51:10,240 --> 00:51:11,720
It consumes analyst time.
1479
00:51:11,720 --> 00:51:13,560
It consumes executive attention.
1480
00:51:13,560 --> 00:51:15,520
And when it's not connected to action,
1481
00:51:15,520 --> 00:51:17,800
it creates a worse outcome than ignorance.
1482
00:51:17,800 --> 00:51:22,400
A alert fatigue, where the organization learns to ignore its own warning systems.
1483
00:51:22,400 --> 00:51:24,840
Once that happens, you have telemetry theatre.
1484
00:51:24,840 --> 00:51:25,840
Lots of data.
1485
00:51:25,840 --> 00:51:27,120
Little control.
1486
00:51:27,120 --> 00:51:30,160
This is also why more sensors is a weak investment posture.
1487
00:51:30,160 --> 00:51:32,680
If you add more signals, without fixing the response loop,
1488
00:51:32,680 --> 00:51:33,600
you increase noise.
1489
00:51:33,600 --> 00:51:34,920
Noise reduces trust.
1490
00:51:34,920 --> 00:51:35,840
Reduced trust.
1491
00:51:35,840 --> 00:51:37,040
Slows decisions.
1492
00:51:37,040 --> 00:51:38,600
Slower decisions increase impact.
1493
00:51:38,600 --> 00:51:39,280
That's the loop.
1494
00:51:39,280 --> 00:51:42,360
It's the security equivalent of adding more gauges to a cockpit
1495
00:51:42,360 --> 00:51:44,880
while leaving the control surfaces unresponsive.
1496
00:51:44,880 --> 00:51:46,880
So what does a good response loop look like
1497
00:51:46,880 --> 00:51:48,720
without turning this into a tool demo?
1498
00:51:48,720 --> 00:51:52,320
It looks like the organization pre-defining a small set of reversible actions
1499
00:51:52,320 --> 00:51:55,360
that can happen fast with clear authority and clear logging.
1500
00:51:55,360 --> 00:51:58,320
If an identity exhibits a high confidence compromise signal,
1501
00:51:58,320 --> 00:52:02,120
the system can, revoke sessions, require reauthentication,
1502
00:52:02,120 --> 00:52:05,160
block risky sign-ins, disable the account,
1503
00:52:05,160 --> 00:52:08,240
remove standing privilege, quarantine a device,
1504
00:52:08,240 --> 00:52:11,360
suspend an OAuth app or route a case to the system owner
1505
00:52:11,360 --> 00:52:13,200
with context already attached.
1506
00:52:13,200 --> 00:52:14,640
Not all at once, not everywhere,
1507
00:52:14,640 --> 00:52:17,720
but as a designed set of bounded responses.
1508
00:52:17,720 --> 00:52:19,440
Bounded matters because leaders here
1509
00:52:19,440 --> 00:52:21,440
automation and picture chaos.
1510
00:52:21,440 --> 00:52:23,440
Accidental lockouts, business disruption,
1511
00:52:23,440 --> 00:52:25,720
the wrong account disabled at the wrong time.
1512
00:52:25,720 --> 00:52:29,040
That fear is rational when automation is built as an improvisation.
1513
00:52:29,040 --> 00:52:32,160
It becomes less rational when automation is built as policy.
1514
00:52:32,160 --> 00:52:34,960
Explicit triggers, reversible actions, audit trails,
1515
00:52:34,960 --> 00:52:37,320
and human approval where the blast radius is large.
1516
00:52:37,320 --> 00:52:41,320
That is how you turn response speed into a capability instead of a gamble.
1517
00:52:41,320 --> 00:52:43,800
And this ties directly back to identity as the control plane.
1518
00:52:43,800 --> 00:52:46,840
If your fastest containment actions live in identity,
1519
00:52:46,840 --> 00:52:49,640
session revocation, privilege reduction, access blocks,
1520
00:52:49,640 --> 00:52:51,440
then response becomes feasible.
1521
00:52:51,440 --> 00:52:54,000
If your containment requires days of coordination
1522
00:52:54,000 --> 00:52:57,480
across disconnected teams, response becomes aspirational.
1523
00:52:57,480 --> 00:52:58,880
So the takeaway is blunt.
1524
00:52:58,880 --> 00:53:00,960
You don't buy resilience with telemetry.
1525
00:53:00,960 --> 00:53:03,560
You buy resilience by funding the conversion layer
1526
00:53:03,560 --> 00:53:05,000
between signal and action.
1527
00:53:05,000 --> 00:53:06,800
And that conversion layer is not glamorous.
1528
00:53:06,800 --> 00:53:09,200
It's workflow, it's ownership, it's automation,
1529
00:53:09,200 --> 00:53:10,680
it's rehearsed authority.
1530
00:53:10,680 --> 00:53:12,960
Without it, you don't have a resilience program.
1531
00:53:12,960 --> 00:53:15,280
You have a very expensive record of how you lost.
1532
00:53:15,280 --> 00:53:18,760
Scenario 2, Microsoft Defender, ServiceNow Automation.
1533
00:53:18,760 --> 00:53:22,880
If identity is the control plane, and CAE is the revocation muscle,
1534
00:53:22,880 --> 00:53:25,640
then this scenario is the nervous system connection.
1535
00:53:25,640 --> 00:53:27,960
How signals become coordinated action
1536
00:53:27,960 --> 00:53:31,520
without turning your SOC into a human API.
1537
00:53:31,520 --> 00:53:34,640
Microsoft Defender gives you signals, ServiceNow gives you execution.
1538
00:53:34,640 --> 00:53:37,400
Most organizations own both categories of tooling,
1539
00:53:37,400 --> 00:53:39,240
but treat them like separate religions.
1540
00:53:39,240 --> 00:53:42,360
Security detects, IT operates, and the business weights.
1541
00:53:42,360 --> 00:53:44,280
That separation is where MTR is born.
1542
00:53:44,280 --> 00:53:46,080
Defender is already doing aggregation
1543
00:53:46,080 --> 00:53:49,440
across endpoint identity, email, SAS, and cloud activity.
1544
00:53:49,440 --> 00:53:53,120
It can correlate activity that looks unrelated in isolation,
1545
00:53:53,120 --> 00:53:56,000
a risky sign-in, a suspicious mailbox rule,
1546
00:53:56,000 --> 00:53:57,960
an endpoint alert and OAuth app consent,
1547
00:53:57,960 --> 00:53:59,800
a new admin role activation.
1548
00:53:59,800 --> 00:54:02,000
The value isn't that any single alert exists.
1549
00:54:02,000 --> 00:54:04,640
The value is that the platform can form an incident story
1550
00:54:04,640 --> 00:54:07,320
without asking an analyst to manually stitch it together.
1551
00:54:07,320 --> 00:54:09,160
But correlation doesn't contain anything.
1552
00:54:09,160 --> 00:54:10,840
Containment happens when the organization
1553
00:54:10,840 --> 00:54:14,280
executes a bounded set of actions fast with clear authority
1554
00:54:14,280 --> 00:54:17,840
and with an audit trail that survives the post-incident review.
1555
00:54:17,840 --> 00:54:20,640
That's where ServiceNow becomes useful, not as a ticket factory,
1556
00:54:20,640 --> 00:54:23,800
as the system of action that codifies decisions, approvals,
1557
00:54:23,800 --> 00:54:25,840
handoffs, and remediation steps
1558
00:54:25,840 --> 00:54:27,520
in a way that is repeatable under stress.
1559
00:54:27,520 --> 00:54:30,400
The simple version is Defender detects and enriches service.
1560
00:54:30,400 --> 00:54:31,440
Now roots and governs.
1561
00:54:31,440 --> 00:54:33,960
Automation executes the first response steps.
1562
00:54:33,960 --> 00:54:37,000
Humans handle the exceptions and the irreversible decisions.
1563
00:54:37,000 --> 00:54:39,680
That's the 1080-10 model in practice.
1564
00:54:39,680 --> 00:54:42,080
Without pretending the platform can replace judgment.
1565
00:54:42,080 --> 00:54:44,280
So what does good automation look like here?
1566
00:54:44,280 --> 00:54:46,400
It looks like defining a small number of playbooks
1567
00:54:46,400 --> 00:54:48,040
that are intentionally boring.
1568
00:54:48,040 --> 00:54:50,840
When Defender raises a high confidence identity incident,
1569
00:54:50,840 --> 00:54:53,360
the system can automatically create a ServiceNow Security
1570
00:54:53,360 --> 00:54:56,080
incident with the right context already attached.
1571
00:54:56,080 --> 00:55:00,600
Effected identity, impacted assets, correlated alerts, timestamps,
1572
00:55:00,600 --> 00:55:02,600
and suggested containment actions.
1573
00:55:02,600 --> 00:55:05,600
No copy-paste, no, what's the UPN back and forth?
1574
00:55:05,600 --> 00:55:08,280
No analyst spending 20 minutes collecting screenshots
1575
00:55:08,280 --> 00:55:09,560
for a ticket nobody will read.
1576
00:55:09,560 --> 00:55:11,760
Then automation does the first reversible moves.
1577
00:55:11,760 --> 00:55:14,160
Reversible means you can undo the action
1578
00:55:14,160 --> 00:55:16,680
without negotiating with half the organization.
1579
00:55:16,680 --> 00:55:19,440
Reauthentication prompts, session revocation,
1580
00:55:19,440 --> 00:55:22,640
blocking risky sign-ins, disabling a single account,
1581
00:55:22,640 --> 00:55:25,440
removing a role activation, isolating a device,
1582
00:55:25,440 --> 00:55:28,680
quarantining an email, suspending an OAuth app consent,
1583
00:55:28,680 --> 00:55:30,720
depending on what signal fired and what authority
1584
00:55:30,720 --> 00:55:31,920
you've pre-approved.
1585
00:55:31,920 --> 00:55:34,040
This is the key leadership decision,
1586
00:55:34,040 --> 00:55:36,160
which actions are allowed to happen automatically
1587
00:55:36,160 --> 00:55:37,760
and under what confidence threshold.
1588
00:55:37,760 --> 00:55:39,880
If everything requires a human you get latency,
1589
00:55:39,880 --> 00:55:41,240
if everything is automated,
1590
00:55:41,240 --> 00:55:44,520
you get accidental outages and political backlash.
1591
00:55:44,520 --> 00:55:47,160
The only stable model is a tiered model.
1592
00:55:47,160 --> 00:55:49,480
Automatic containment for high confidence,
1593
00:55:49,480 --> 00:55:51,760
low blast radius actions, human approval
1594
00:55:51,760 --> 00:55:53,400
for high blast radius actions,
1595
00:55:53,400 --> 00:55:55,160
and explicit escalation when the system
1596
00:55:55,160 --> 00:55:56,600
can't determine impact.
1597
00:55:56,600 --> 00:55:59,480
ServiceNow is where that tearing becomes enforceable.
1598
00:55:59,480 --> 00:56:00,960
It can embed approval workflows
1599
00:56:00,960 --> 00:56:02,400
in forced segregation of duties
1600
00:56:02,400 --> 00:56:05,040
and ensure every exception has an owner and an expiration.
1601
00:56:05,040 --> 00:56:07,560
It can also track recovery tasks as actual work,
1602
00:56:07,560 --> 00:56:10,160
not as tribal knowledge, credential resets,
1603
00:56:10,160 --> 00:56:13,080
access-reviewed triggers, device re-enrollment,
1604
00:56:13,080 --> 00:56:16,160
application owner confirmation, customer communications,
1605
00:56:16,160 --> 00:56:18,560
and post-incident backlog items.
1606
00:56:18,560 --> 00:56:19,880
That last part matters.
1607
00:56:19,880 --> 00:56:24,080
Most organizations can contain when the right people are awake.
1608
00:56:24,080 --> 00:56:25,480
They can't recover consistently
1609
00:56:25,480 --> 00:56:27,160
because recovery is treated as cleanup,
1610
00:56:27,160 --> 00:56:30,000
not as an engineered loop, service.
1611
00:56:30,000 --> 00:56:33,000
Now forces recovery to be legible, tasks, owners,
1612
00:56:33,000 --> 00:56:34,920
deadlines, evidence.
1613
00:56:34,920 --> 00:56:36,680
Now the counterintuitive part,
1614
00:56:36,680 --> 00:56:38,920
this automation isn't about speed for its own sake,
1615
00:56:38,920 --> 00:56:40,960
it's about restoring human decision time.
1616
00:56:40,960 --> 00:56:42,320
Humans should decide intent.
1617
00:56:42,320 --> 00:56:44,080
Is this identity business critical?
1618
00:56:44,080 --> 00:56:45,400
Is this activity expected?
1619
00:56:45,400 --> 00:56:46,360
Do we accept the risk?
1620
00:56:46,360 --> 00:56:47,520
Do we shut down a workflow?
1621
00:56:47,520 --> 00:56:48,680
Do we notify customers?
1622
00:56:48,680 --> 00:56:50,560
Do we escalate to legal?
1623
00:56:50,560 --> 00:56:52,320
The system should execute mechanics.
1624
00:56:52,320 --> 00:56:54,440
Collect data, correlate, create the case,
1625
00:56:54,440 --> 00:56:56,240
root it, apply reversible containment,
1626
00:56:56,240 --> 00:56:57,480
and maintain the audit trail.
1627
00:56:57,480 --> 00:57:00,080
If your analysts are doing mechanics, you don't have a so key.
1628
00:57:00,080 --> 00:57:02,080
You have a very expensive workflow gap.
1629
00:57:02,080 --> 00:57:04,040
And the reason this scenario belongs
1630
00:57:04,040 --> 00:57:06,440
in an executive briefing is that it changes
1631
00:57:06,440 --> 00:57:07,560
what leaders fund.
1632
00:57:07,560 --> 00:57:09,080
Instead of buying more detection,
1633
00:57:09,080 --> 00:57:11,880
you invest in the conversion layer, integrations,
1634
00:57:11,880 --> 00:57:15,720
playbooks, ownership models, and rehearsed authority.
1635
00:57:15,720 --> 00:57:17,320
You build the muscle that turns,
1636
00:57:17,320 --> 00:57:20,200
we saw something into, we contained something,
1637
00:57:20,200 --> 00:57:21,920
because the board doesn't care that you detected
1638
00:57:21,920 --> 00:57:24,160
an identity incident at 2.03 AM.
1639
00:57:24,160 --> 00:57:28,000
They care whether the attacker still had access at 2.33 AM.
1640
00:57:28,000 --> 00:57:29,920
This is also where you stop measuring success
1641
00:57:29,920 --> 00:57:31,560
by ticket volume and start measuring it
1642
00:57:31,560 --> 00:57:34,600
by decision latency, time to detect, time to decide,
1643
00:57:34,600 --> 00:57:36,680
time to enforce, time to recover.
1644
00:57:36,680 --> 00:57:39,400
Service now gives you the workflow time stamps.
1645
00:57:39,400 --> 00:57:41,240
Defender gives you the signal time stamps.
1646
00:57:41,240 --> 00:57:43,800
Together, they give you the only metric that matters.
1647
00:57:43,800 --> 00:57:45,560
MTR becomes visible.
1648
00:57:45,560 --> 00:57:49,360
And once MTR is visible, leadership can actually manage it.
1649
00:57:49,360 --> 00:57:51,400
Either resilience is an operating capability,
1650
00:57:51,400 --> 00:57:52,640
not an incident plan.
1651
00:57:52,640 --> 00:57:54,400
Resilience is what the organization can do
1652
00:57:54,400 --> 00:57:56,040
on a bad day without improvising,
1653
00:57:56,040 --> 00:57:58,200
not what it wrote down in a binder two years ago.
1654
00:57:58,200 --> 00:58:01,360
Most enterprises have an incident response plan.
1655
00:58:01,360 --> 00:58:04,760
It exists, it has owners, it has a PDF, it satisfies audits.
1656
00:58:04,760 --> 00:58:06,920
And it fails at the exact moment it's needed,
1657
00:58:06,920 --> 00:58:08,880
because plans don't execute themselves
1658
00:58:08,880 --> 00:58:11,320
and stressed humans don't behave like flowcharts.
1659
00:58:11,320 --> 00:58:13,320
An incident plan is documentation.
1660
00:58:13,320 --> 00:58:15,840
Resilience is an operating capability, practiced,
1661
00:58:15,840 --> 00:58:18,480
funded, measured and continuously improved.
1662
00:58:18,480 --> 00:58:20,200
It lives in the muscle memory of teams
1663
00:58:20,200 --> 00:58:23,680
and the design of systems, not in the phrasing of a policy.
1664
00:58:23,680 --> 00:58:25,360
This is the uncomfortable truth.
1665
00:58:25,360 --> 00:58:28,040
Modern incidents are not puzzles, they are time games.
1666
00:58:28,040 --> 00:58:29,800
The attacker's advantage is not brilliance.
1667
00:58:29,800 --> 00:58:31,600
It's that your organization needs a meeting
1668
00:58:31,600 --> 00:58:32,800
before it can act.
1669
00:58:32,800 --> 00:58:34,960
Resilience is the decision to remove that meeting
1670
00:58:34,960 --> 00:58:36,240
from the critical path.
1671
00:58:36,240 --> 00:58:39,000
So resilience engineering starts with one stance,
1672
00:58:39,000 --> 00:58:42,680
expect failure, not as pessimism as design input.
1673
00:58:42,680 --> 00:58:44,640
Your human identity will be compromised,
1674
00:58:44,640 --> 00:58:46,760
your sumatoken will be stolen, your sumatown,
1675
00:58:46,760 --> 00:58:48,440
or O-Auth app will get consented,
1676
00:58:48,440 --> 00:58:50,600
your sumatement will make a mistake.
1677
00:58:50,600 --> 00:58:52,520
Then you design for bounded failure,
1678
00:58:52,520 --> 00:58:55,240
small blast radius, fast revocation
1679
00:58:55,240 --> 00:58:57,600
and recovery that doesn't require heroics.
1680
00:58:57,600 --> 00:59:00,000
Bounded failure is the opposite of prevention fantasy.
1681
00:59:00,000 --> 00:59:02,640
It's not nothing bad happens, it's it's it's bad
1682
00:59:02,640 --> 00:59:05,440
things happen and the organization keeps operating.
1683
00:59:05,440 --> 00:59:08,120
That implies three capabilities leaders can actually fund.
1684
00:59:08,120 --> 00:59:09,840
First, containment readiness.
1685
00:59:09,840 --> 00:59:13,520
This is the existence of kill switches that work.
1686
00:59:13,520 --> 00:59:16,000
Rapid account disabling, privilege stripping,
1687
00:59:16,000 --> 00:59:18,880
session revocation, conditional access escalation,
1688
00:59:18,880 --> 00:59:21,920
device isolation and application level blocks,
1689
00:59:21,920 --> 00:59:26,040
pre-approved, auditable and reversible, where possible.
1690
00:59:26,040 --> 00:59:28,560
If containment actions require ad hoc approvals,
1691
00:59:28,560 --> 00:59:30,280
you don't have containment readiness,
1692
00:59:30,280 --> 00:59:33,760
you have hope, second, recovery readiness.
1693
00:59:33,760 --> 00:59:36,760
Containment stops the bleeding, recovery restores the business.
1694
00:59:36,760 --> 00:59:39,640
Most organizations skip designing recovery as a system,
1695
00:59:39,640 --> 00:59:41,480
so they pay for it in chaos.
1696
00:59:41,480 --> 00:59:44,040
Recovery readiness means the organization knows
1697
00:59:44,040 --> 00:59:47,520
how to restore access safely, rebuild trust in identities
1698
00:59:47,520 --> 00:59:49,920
and reestablish clean operating conditions.
1699
00:59:49,920 --> 00:59:53,280
Credential resets with verification, reissuing tokens,
1700
00:59:53,280 --> 00:59:56,720
validating device posture, re-onboarding service accounts,
1701
00:59:56,720 --> 00:59:59,080
verifying that privileged roles are clean,
1702
00:59:59,080 --> 01:00:01,520
and proving that logging and controls are still intact.
1703
01:00:01,520 --> 01:00:03,520
If the org can't reestablish trust quickly,
1704
01:00:03,520 --> 01:00:05,120
it will either stay offline too long
1705
01:00:05,120 --> 01:00:06,920
or come back online too early.
1706
01:00:06,920 --> 01:00:08,240
Both are expensive.
1707
01:00:08,240 --> 01:00:12,440
Third, learning loop discipline.
1708
01:00:12,440 --> 01:00:14,200
Resilience isn't we survived.
1709
01:00:14,200 --> 01:00:17,480
Resilience is we survived and we made it harder next time.
1710
01:00:17,480 --> 01:00:19,240
That requires turning incident lessons
1711
01:00:19,240 --> 01:00:21,360
into owned backlog items with deadlines,
1712
01:00:21,360 --> 01:00:23,640
not we should review access,
1713
01:00:23,640 --> 01:00:26,200
not we should tighten conditional access,
1714
01:00:26,200 --> 01:00:28,800
specific changes, which entitlement gets rescoped,
1715
01:00:28,800 --> 01:00:31,960
which exception expires, which workflow becomes automated,
1716
01:00:31,960 --> 01:00:33,560
which app must support CAE,
1717
01:00:33,560 --> 01:00:36,080
which privileged role gets moved to eligible only,
1718
01:00:36,080 --> 01:00:38,560
which detection trigger now roots to action.
1719
01:00:38,560 --> 01:00:40,760
This is where most programs rot.
1720
01:00:40,760 --> 01:00:42,840
The incident becomes a post-mortem presentation,
1721
01:00:42,840 --> 01:00:44,240
not an engineering input.
1722
01:00:44,240 --> 01:00:45,360
Now to make this real,
1723
01:00:45,360 --> 01:00:47,640
leaders need to stop treating tabletop exercises
1724
01:00:47,640 --> 01:00:48,760
as compliance theater.
1725
01:00:48,760 --> 01:00:50,040
A tabletop isn't a quiz.
1726
01:00:50,040 --> 01:00:51,480
It's a rehearsal of decisions.
1727
01:00:51,480 --> 01:00:53,960
Who has authority to disable an executive account?
1728
01:00:53,960 --> 01:00:56,840
Who can revoke access for a third party integration
1729
01:00:56,840 --> 01:00:57,880
that drives revenue?
1730
01:00:57,880 --> 01:01:00,680
Who can force reauthentication for a business critical SaaS app?
1731
01:01:00,680 --> 01:01:02,360
Who can approve isolating a device
1732
01:01:02,360 --> 01:01:04,000
used for production deployment?
1733
01:01:04,000 --> 01:01:04,960
Who talks to legal?
1734
01:01:04,960 --> 01:01:06,040
Who talks to customers?
1735
01:01:06,040 --> 01:01:07,120
Who owns the timeline?
1736
01:01:07,120 --> 01:01:08,480
Those are not technical questions.
1737
01:01:08,480 --> 01:01:10,800
They are governance questions under stress.
1738
01:01:10,800 --> 01:01:13,120
A good tabletop produces two outputs,
1739
01:01:13,120 --> 01:01:15,960
decision clarity and remediation backlog.
1740
01:01:15,960 --> 01:01:18,200
If it only produces, we learned a lot.
1741
01:01:18,200 --> 01:01:19,400
It produced nothing.
1742
01:01:19,400 --> 01:01:21,600
There's also a structural implication to resilience
1743
01:01:21,600 --> 01:01:23,800
that security teams dislike admitting.
1744
01:01:23,800 --> 01:01:26,880
Resilience requires alignment between identity, IT,
1745
01:01:26,880 --> 01:01:29,600
and the business, not cooperation, alignment.
1746
01:01:29,600 --> 01:01:31,920
Because response actions always affect operations.
1747
01:01:31,920 --> 01:01:33,440
If the business refuses disruption,
1748
01:01:33,440 --> 01:01:35,120
the attacker gets persistence.
1749
01:01:35,120 --> 01:01:38,280
If security refuses accountability, the business gets chaos.
1750
01:01:38,280 --> 01:01:40,800
Resilience is the negotiated operating model
1751
01:01:40,800 --> 01:01:42,440
that makes decisive action possible
1752
01:01:42,440 --> 01:01:44,040
without endless escalation.
1753
01:01:44,040 --> 01:01:45,400
And AI doesn't change this.
1754
01:01:45,400 --> 01:01:47,080
It accelerates it.
1755
01:01:47,080 --> 01:01:48,440
AI makes attacks faster,
1756
01:01:48,440 --> 01:01:50,200
but it also makes defense more scalable
1757
01:01:50,200 --> 01:01:51,680
if the organization has the workflow
1758
01:01:51,680 --> 01:01:53,360
to convert signals into action.
1759
01:01:53,360 --> 01:01:56,120
Without that, AI just increases the volume of insights
1760
01:01:56,120 --> 01:01:57,400
you fail to operationalize.
1761
01:01:57,400 --> 01:01:59,040
So resilience isn't the binder.
1762
01:01:59,040 --> 01:01:59,960
It's the loop.
1763
01:01:59,960 --> 01:02:01,760
Contain, recover, learn, repeat it
1764
01:02:01,760 --> 01:02:04,520
until the system becomes harder to break than it is to run.
1765
01:02:04,520 --> 01:02:07,160
And once you treat resilience as an operating capability,
1766
01:02:07,160 --> 01:02:10,280
you can finally put it on a scoreboard leadership understands.
1767
01:02:10,280 --> 01:02:12,440
The leadership metric, reduce MTTR
1768
01:02:12,440 --> 01:02:14,120
for identity-driven incidents.
1769
01:02:14,120 --> 01:02:16,480
This is where leadership usually asks for a dashboard
1770
01:02:16,480 --> 01:02:18,440
and security hands them the wrong one.
1771
01:02:18,440 --> 01:02:19,440
They get counts.
1772
01:02:19,440 --> 01:02:21,600
Number of incidents, number of blocked sign-ins,
1773
01:02:21,600 --> 01:02:24,080
number of risky users, number of alerts closed.
1774
01:02:24,080 --> 01:02:24,880
That's activity.
1775
01:02:24,880 --> 01:02:26,120
It's not capability.
1776
01:02:26,120 --> 01:02:28,960
Capability is what happens when an identity-driven incident
1777
01:02:28,960 --> 01:02:31,360
is already in motion and the business is bleeding time.
1778
01:02:31,360 --> 01:02:32,520
The only metric that translates
1779
01:02:32,520 --> 01:02:36,320
cleanly from security to operations to the board is MTTR.
1780
01:02:36,320 --> 01:02:37,880
Mean time to respond and to end.
1781
01:02:37,880 --> 01:02:39,480
Not time to create a ticket.
1782
01:02:39,480 --> 01:02:40,480
Not time to acknowledge.
1783
01:02:40,480 --> 01:02:42,280
Respond means containment has occurred
1784
01:02:42,280 --> 01:02:45,280
and the attack as ability to act has been materially reduced.
1785
01:02:45,280 --> 01:02:47,640
If you can't define that moment, you can't manage it.
1786
01:02:47,640 --> 01:02:48,960
That distinction matters.
1787
01:02:48,960 --> 01:02:51,320
Identity-driven incidents dominate business impact
1788
01:02:51,320 --> 01:02:53,760
because identity is the permission fabric for everything else.
1789
01:02:53,760 --> 01:02:56,400
When an endpoint is compromised, you might lose a machine.
1790
01:02:56,400 --> 01:02:57,960
When an identity is compromised,
1791
01:02:57,960 --> 01:03:01,040
you can lose data, approvals, code, financial workflows,
1792
01:03:01,040 --> 01:03:02,840
and the ability to trust your own systems.
1793
01:03:02,840 --> 01:03:05,280
It is the difference between a local fire
1794
01:03:05,280 --> 01:03:07,600
and a fire in the building's electrical panel.
1795
01:03:07,600 --> 01:03:09,240
So the leadership mandate is simple.
1796
01:03:09,240 --> 01:03:11,680
Reduce the time window in which a compromise identity
1797
01:03:11,680 --> 01:03:12,520
can operate.
1798
01:03:12,520 --> 01:03:14,800
The 40-60% reduction target is not magic.
1799
01:03:14,800 --> 01:03:16,640
It is the difference between a system
1800
01:03:16,640 --> 01:03:19,320
that relies on humans to stitch context together
1801
01:03:19,320 --> 01:03:21,640
and a system that treats identity as a control plane
1802
01:03:21,640 --> 01:03:23,400
with enforcement and workflow.
1803
01:03:23,400 --> 01:03:26,160
If your current MTTR is measured in hours,
1804
01:03:26,160 --> 01:03:28,360
cutting it roughly in half is entirely plausible
1805
01:03:28,360 --> 01:03:31,080
when you move the first actions from manual to orchestrate it
1806
01:03:31,080 --> 01:03:34,000
and when you stop waiting for token expiry to do your job.
1807
01:03:34,000 --> 01:03:36,760
But leaders need to understand what they are actually measuring.
1808
01:03:36,760 --> 01:03:38,360
MTTR is not a single stopwatch.
1809
01:03:38,360 --> 01:03:40,840
It's a chain and chains fail at the weakest link,
1810
01:03:40,840 --> 01:03:42,520
so break it into four timestamps
1811
01:03:42,520 --> 01:03:45,040
that are board legible and operationally honest.
1812
01:03:45,040 --> 01:03:46,080
Time to detect.
1813
01:03:46,080 --> 01:03:48,280
When did the system first have a credible signal
1814
01:03:48,280 --> 01:03:49,440
that something was wrong?
1815
01:03:49,440 --> 01:03:52,120
Not when someone looked at it, when it existed.
1816
01:03:52,120 --> 01:03:53,480
Time to decide.
1817
01:03:53,480 --> 01:03:56,520
How long did it take for a human or a policy engine to decide?
1818
01:03:56,520 --> 01:03:58,360
This is real enough to act?
1819
01:03:58,360 --> 01:04:02,000
This is where alert fatigue and unclear severity definitions
1820
01:04:02,000 --> 01:04:03,840
turn into business exposure.
1821
01:04:03,840 --> 01:04:04,960
Time to enforce.
1822
01:04:04,960 --> 01:04:07,360
How long did it take for the decision to change reality?
1823
01:04:07,360 --> 01:04:08,320
Disable the account.
1824
01:04:08,320 --> 01:04:10,960
Revoque sessions, block the sign in, remove privilege,
1825
01:04:10,960 --> 01:04:11,920
quarantine the device.
1826
01:04:11,920 --> 01:04:14,600
If it took two hours to get approval, that's not governance.
1827
01:04:14,600 --> 01:04:15,920
That's latency.
1828
01:04:15,920 --> 01:04:17,120
Time to recover.
1829
01:04:17,120 --> 01:04:20,320
How long until the business can operate safely again?
1830
01:04:20,320 --> 01:04:22,160
Not we stopped the attacker.
1831
01:04:22,160 --> 01:04:24,760
We restored trusted access and verified the control plane
1832
01:04:24,760 --> 01:04:25,680
is intact.
1833
01:04:25,680 --> 01:04:27,920
That model gives leaders something they can fund
1834
01:04:27,920 --> 01:04:29,640
because each stage has different blockers.
1835
01:04:29,640 --> 01:04:32,160
Time to detect is usually a signal coverage and correlation
1836
01:04:32,160 --> 01:04:33,040
problem.
1837
01:04:33,040 --> 01:04:35,720
Defender and entra can help, but only if the environment is
1838
01:04:35,720 --> 01:04:38,840
instrumented and identity signals aren't treated as optional.
1839
01:04:38,840 --> 01:04:41,800
Time to decide is usually a clarity problem.
1840
01:04:41,800 --> 01:04:44,360
Who owns the call, what thresholds matter,
1841
01:04:44,360 --> 01:04:45,920
and what actions are pre-approved?
1842
01:04:45,920 --> 01:04:48,320
Ambiguity is the most expensive security control
1843
01:04:48,320 --> 01:04:49,320
you can deploy.
1844
01:04:49,320 --> 01:04:51,640
Time to enforce is an architecture problem.
1845
01:04:51,640 --> 01:04:53,760
If revocation depends on token expiry,
1846
01:04:53,760 --> 01:04:55,080
you chose slow enforcement.
1847
01:04:55,080 --> 01:04:57,360
If enforcement depends on three teams in a meeting,
1848
01:04:57,360 --> 01:04:58,880
you chose slow enforcement.
1849
01:04:58,880 --> 01:05:00,560
CAE and privileged access governance
1850
01:05:00,560 --> 01:05:02,280
exist to collapse this gap.
1851
01:05:02,280 --> 01:05:04,560
Time to recover is an operating model problem.
1852
01:05:04,560 --> 01:05:07,360
If recoveries at Hock, it is slow by design.
1853
01:05:07,360 --> 01:05:09,600
If recovery tasks are templated, owned,
1854
01:05:09,600 --> 01:05:12,520
and automated where possible, it becomes repeatable.
1855
01:05:12,520 --> 01:05:15,520
Now here's what blocks MTTR improvement in real organizations,
1856
01:05:15,520 --> 01:05:16,680
unclear authority.
1857
01:05:16,680 --> 01:05:19,080
Nobody wants to be the person who disabled the CFO's
1858
01:05:19,080 --> 01:05:21,200
account during quarter close, so they escalate
1859
01:05:21,200 --> 01:05:22,720
until the attacker is done.
1860
01:05:22,720 --> 01:05:23,720
Manual handoffs.
1861
01:05:23,720 --> 01:05:26,160
Signals move from defender to email to chat to ticket,
1862
01:05:26,160 --> 01:05:27,880
with context lost every time.
1863
01:05:27,880 --> 01:05:28,920
Exception sprawl.
1864
01:05:28,920 --> 01:05:30,600
The most critical identities and apps
1865
01:05:30,600 --> 01:05:33,080
are often the most exempt, which means your highest risk
1866
01:05:33,080 --> 01:05:34,960
pathways are your least governable ones.
1867
01:05:34,960 --> 01:05:36,480
An entitlement ambiguity.
1868
01:05:36,480 --> 01:05:38,000
If you don't know what an identity can do,
1869
01:05:38,000 --> 01:05:39,440
you can't contain it confidently.
1870
01:05:39,440 --> 01:05:40,080
You hesitate.
1871
01:05:40,080 --> 01:05:41,120
The attacker doesn't.
1872
01:05:41,120 --> 01:05:44,200
So leadership should treat MTTR like a resilience KPI,
1873
01:05:44,200 --> 01:05:45,240
not a SOC KPI.
1874
01:05:45,240 --> 01:05:47,160
It's how you measure whether the enterprise
1875
01:05:47,160 --> 01:05:50,280
can make trust decisions and enforce them in business time.
1876
01:05:50,280 --> 01:05:52,440
Everything you funded earlier, intra-governance,
1877
01:05:52,440 --> 01:05:55,040
ITDI discipline, CIE, and defender to service
1878
01:05:55,040 --> 01:05:56,840
now orchestration should show up here
1879
01:05:56,840 --> 01:05:59,800
as lower decision latency and faster enforcement.
1880
01:05:59,800 --> 01:06:01,880
And if it doesn't, you don't have a tooling problem.
1881
01:06:01,880 --> 01:06:03,480
You have an operating model that still
1882
01:06:03,480 --> 01:06:05,760
confuses visibility with control.
1883
01:06:05,760 --> 01:06:06,760
Composite incident.
1884
01:06:06,760 --> 01:06:07,440
Same tools.
1885
01:06:07,440 --> 01:06:08,520
Different outcome.
1886
01:06:08,520 --> 01:06:11,320
Now put all of this into a story that leaders recognize,
1887
01:06:11,320 --> 01:06:14,240
not a named breach, not a vendor fairy tale.
1888
01:06:14,240 --> 01:06:16,480
A composite incident built from the same patterns,
1889
01:06:16,480 --> 01:06:19,160
every SOC and identity team has seen.
1890
01:06:19,160 --> 01:06:20,160
Session abuse.
1891
01:06:20,160 --> 01:06:21,000
Over permission.
1892
01:06:21,000 --> 01:06:23,000
Slow revocation and manual response.
1893
01:06:23,000 --> 01:06:24,000
Same organization.
1894
01:06:24,000 --> 01:06:25,280
Same Microsoft stack.
1895
01:06:25,280 --> 01:06:27,320
Same green dashboards.
1896
01:06:27,320 --> 01:06:30,000
Two different outcomes determined entirely by design.
1897
01:06:30,000 --> 01:06:32,040
In the first version, the attacker doesn't start
1898
01:06:32,040 --> 01:06:33,360
with some exotic exploit.
1899
01:06:33,360 --> 01:06:35,520
They start with an identity that has more authority
1900
01:06:35,520 --> 01:06:38,480
than anyone remembers approving, a contractor account,
1901
01:06:38,480 --> 01:06:40,840
a partner identity, or an internal user
1902
01:06:40,840 --> 01:06:43,760
who moved roles three times and kept access every time.
1903
01:06:43,760 --> 01:06:45,480
The initial foothold is boring.
1904
01:06:45,480 --> 01:06:48,960
A captured session token via a malicious browser extension.
1905
01:06:48,960 --> 01:06:50,920
A convincing OAuth consent.
1906
01:06:50,920 --> 01:06:53,840
Or straight credential theft followed by MFA completion.
1907
01:06:53,840 --> 01:06:55,960
It doesn't matter which because the system's failure mode
1908
01:06:55,960 --> 01:06:56,760
is the same.
1909
01:06:56,760 --> 01:06:58,880
The user successfully completed MFA.
1910
01:06:58,880 --> 01:07:00,760
So the attacker doesn't fight authentication.
1911
01:07:00,760 --> 01:07:01,720
They inherit it.
1912
01:07:01,720 --> 01:07:03,760
From there, the attacker explores entitlements.
1913
01:07:03,760 --> 01:07:05,200
They don't need to scan networks.
1914
01:07:05,200 --> 01:07:07,800
They just enumerate what the identity can reach.
1915
01:07:07,800 --> 01:07:09,040
SharePoint sites.
1916
01:07:09,040 --> 01:07:10,120
Teams files.
1917
01:07:10,120 --> 01:07:11,440
Mailbox rules.
1918
01:07:11,440 --> 01:07:12,960
Power BI workspaces.
1919
01:07:12,960 --> 01:07:14,080
Azure resources.
1920
01:07:14,080 --> 01:07:15,680
Third party SAS.
1921
01:07:15,680 --> 01:07:18,400
They look for the same things every attacker looks for.
1922
01:07:18,400 --> 01:07:19,560
Export paths.
1923
01:07:19,560 --> 01:07:20,640
Admin paths.
1924
01:07:20,640 --> 01:07:21,800
And trust paths.
1925
01:07:21,800 --> 01:07:23,160
Here's the weird part.
1926
01:07:23,160 --> 01:07:25,320
Most of this activity doesn't look like malware.
1927
01:07:25,320 --> 01:07:27,040
It looks like a busy employee.
1928
01:07:27,040 --> 01:07:27,920
Downloads.
1929
01:07:27,920 --> 01:07:28,760
List operations.
1930
01:07:28,760 --> 01:07:30,040
API calls.
1931
01:07:30,040 --> 01:07:30,840
Roll lookups.
1932
01:07:30,840 --> 01:07:31,800
Consent grants.
1933
01:07:31,800 --> 01:07:33,720
Maybe a few impossible travel hints.
1934
01:07:33,720 --> 01:07:35,240
But nothing that screams ransomware.
1935
01:07:35,240 --> 01:07:37,000
So the organization stays calm.
1936
01:07:37,000 --> 01:07:38,240
Defenders see signals.
1937
01:07:38,240 --> 01:07:39,600
Entracies risky behavior.
1938
01:07:39,600 --> 01:07:40,600
The logs are there.
1939
01:07:40,600 --> 01:07:42,600
But the decision loop isn't connected to enforcement.
1940
01:07:42,600 --> 01:07:45,520
So what happens is the most common failure mode in identity
1941
01:07:45,520 --> 01:07:46,280
incidents.
1942
01:07:46,280 --> 01:07:48,960
People notice, but nothing changes fast enough to matter.
1943
01:07:48,960 --> 01:07:50,640
A ticket gets created and analysts
1944
01:07:50,640 --> 01:07:51,920
pings the identity team.
1945
01:07:51,920 --> 01:07:54,800
The identity team asks the business owner whether the account
1946
01:07:54,800 --> 01:07:55,480
is critical.
1947
01:07:55,480 --> 01:07:56,960
The business owner isn't sure.
1948
01:07:56,960 --> 01:07:58,320
Someone schedules a call.
1949
01:07:58,320 --> 01:07:59,920
Meanwhile, the attacker keeps operating
1950
01:07:59,920 --> 01:08:01,360
because the session remains valid.
1951
01:08:01,360 --> 01:08:03,160
Tokens don't care about meetings.
1952
01:08:03,160 --> 01:08:04,800
Then the attacker finds the real value
1953
01:08:04,800 --> 01:08:07,360
an identity pathway that can change control.
1954
01:08:07,360 --> 01:08:09,280
A role that can read security settings.
1955
01:08:09,280 --> 01:08:11,760
An account that can create new app registrations.
1956
01:08:11,760 --> 01:08:14,440
A service principle with broad graph permissions.
1957
01:08:14,440 --> 01:08:15,960
Or a legacy admin group.
1958
01:08:15,960 --> 01:08:16,960
Nobody reviews.
1959
01:08:16,960 --> 01:08:19,840
Now the incident stops being suspicious user behavior
1960
01:08:19,840 --> 01:08:21,560
and becomes a business event.
1961
01:08:21,560 --> 01:08:24,480
Data exfiltration, control disablement, or persistence
1962
01:08:24,480 --> 01:08:25,520
creation.
1963
01:08:25,520 --> 01:08:27,520
And the root cause later reads like a checklist
1964
01:08:27,520 --> 01:08:28,840
of comfortable truths.
1965
01:08:28,840 --> 01:08:30,760
MFA was enabled.
1966
01:08:30,760 --> 01:08:32,760
Defender generated alerts.
1967
01:08:32,760 --> 01:08:33,880
We had logging.
1968
01:08:33,880 --> 01:08:35,200
We followed the process.
1969
01:08:35,200 --> 01:08:35,680
Yes.
1970
01:08:35,680 --> 01:08:38,240
And the attacker had time now rerun the same incident
1971
01:08:38,240 --> 01:08:39,480
in the redesigned environment.
1972
01:08:39,480 --> 01:08:41,880
Same tools, different outcome.
1973
01:08:41,880 --> 01:08:44,040
The attacker still gets the initial token.
1974
01:08:44,040 --> 01:08:45,320
That part is not fantasy.
1975
01:08:45,320 --> 01:08:46,200
Assume breach.
1976
01:08:46,200 --> 01:08:48,000
But the identity is governed differently.
1977
01:08:48,000 --> 01:08:49,200
The access is time bound.
1978
01:08:49,200 --> 01:08:51,000
Privilege is eligible, not standing.
1979
01:08:51,000 --> 01:08:52,280
Entitlements have owners.
1980
01:08:52,280 --> 01:08:54,960
And the first meaningful actions don't require heroics.
1981
01:08:54,960 --> 01:08:57,680
The first sign of risk elevates the account state.
1982
01:08:57,680 --> 01:09:00,360
Entrance identity signals change the trust decision.
1983
01:09:00,360 --> 01:09:03,200
CAE forces re-evaluation inside the session.
1984
01:09:03,200 --> 01:09:05,240
The attacker's borrowed trust collapses
1985
01:09:05,240 --> 01:09:07,160
while they're still trying to explore.
1986
01:09:07,160 --> 01:09:08,600
Not because someone woke up faster
1987
01:09:08,600 --> 01:09:11,240
because the platform revoked trust in business time.
1988
01:09:11,240 --> 01:09:13,880
At the same moment, Defender correlates the incident
1989
01:09:13,880 --> 01:09:15,480
and pushes it into service now
1990
01:09:15,480 --> 01:09:17,160
with the context already attached.
1991
01:09:17,160 --> 01:09:21,120
Identity, device, SaaS artifacts, and recommended containment.
1992
01:09:21,120 --> 01:09:23,240
Service now isn't used to start a conversation.
1993
01:09:23,240 --> 01:09:25,920
It's used to execute a predefined response path.
1994
01:09:25,920 --> 01:09:28,400
Automation takes the reversible steps immediately.
1995
01:09:28,400 --> 01:09:30,640
Revoke sessions, block risky sign-ins,
1996
01:09:30,640 --> 01:09:32,800
remove active privilege role assignments,
1997
01:09:32,800 --> 01:09:34,120
isolate the device if needed,
1998
01:09:34,120 --> 01:09:37,040
suspend suspicious or author's grounds if they exist.
1999
01:09:37,040 --> 01:09:38,640
Humans still decide the big calls.
2000
01:09:38,640 --> 01:09:40,200
Do we disable the account entirely?
2001
01:09:40,200 --> 01:09:41,520
Do we pause a business workflow?
2002
01:09:41,520 --> 01:09:42,400
Do we notify legal?
2003
01:09:42,400 --> 01:09:44,480
Do we trigger broader access reviews?
2004
01:09:44,480 --> 01:09:46,800
But humans are deciding while the attacker is contained.
2005
01:09:46,800 --> 01:09:48,560
Not while the attacker is still active.
2006
01:09:48,560 --> 01:09:50,000
That is the entire difference.
2007
01:09:50,000 --> 01:09:52,760
In the first environment, trust, drift, and decision-latency
2008
01:09:52,760 --> 01:09:55,760
turned a minor identity compromise into an enterprise incident.
2009
01:09:55,760 --> 01:09:57,560
In the second, the attacker still got in,
2010
01:09:57,560 --> 01:09:59,400
but they couldn't stay, couldn't escalate,
2011
01:09:59,400 --> 01:10:02,600
and couldn't move fast enough to make the event existential.
2012
01:10:02,600 --> 01:10:05,400
Same tools, same tenant, same budget line items.
2013
01:10:05,400 --> 01:10:06,480
Different outcome?
2014
01:10:06,480 --> 01:10:08,920
Because the organization stopped measuring security
2015
01:10:08,920 --> 01:10:11,840
by coverage and started engineering it as a control loop,
2016
01:10:11,840 --> 01:10:14,800
identity governance to reduce reckless entitlements,
2017
01:10:14,800 --> 01:10:17,720
CAE to revoke sessions when reality changes,
2018
01:10:17,720 --> 01:10:19,560
and orchestration to collapse the time
2019
01:10:19,560 --> 01:10:21,280
between signal and action.
2020
01:10:21,280 --> 01:10:23,320
This is the moment leaders need to internalize.
2021
01:10:23,320 --> 01:10:25,760
Security isn't the number of incidents you prevent.
2022
01:10:25,760 --> 01:10:28,000
It's the size and duration of the incidents you allow.
2023
01:10:28,000 --> 01:10:31,000
The executive operating model for security beyond controls.
2024
01:10:31,000 --> 01:10:33,840
So if the story is same tools, different outcome,
2025
01:10:33,840 --> 01:10:36,400
the obvious executive question is what actually changed?
2026
01:10:36,400 --> 01:10:39,240
Not the product list, the operating model.
2027
01:10:39,240 --> 01:10:40,960
Because controls don't run themselves,
2028
01:10:40,960 --> 01:10:43,480
they are executed through ownership, decision rights,
2029
01:10:43,480 --> 01:10:46,360
and a loop that converts intent into enforcement.
2030
01:10:46,360 --> 01:10:48,160
Without that, you're just accumulating features
2031
01:10:48,160 --> 01:10:49,560
and calling it maturity.
2032
01:10:49,560 --> 01:10:51,920
Here's the model leaders need to hold in their heads,
2033
01:10:51,920 --> 01:10:55,280
one loop, end to end, identity, trust decisions,
2034
01:10:55,280 --> 01:10:57,280
detection, response, recovery.
2035
01:10:57,280 --> 01:10:58,880
Identity is your control plane
2036
01:10:58,880 --> 01:11:00,640
because it's where permissions live.
2037
01:11:00,640 --> 01:11:02,960
Trust decisions are the policies that decide
2038
01:11:02,960 --> 01:11:05,520
under what conditions is that identity allowed to act.
2039
01:11:05,520 --> 01:11:07,360
And detection is the sensing layer.
2040
01:11:07,360 --> 01:11:08,840
Response is the action layer.
2041
01:11:08,840 --> 01:11:11,880
Recovery is the process of restoring trusted operations
2042
01:11:11,880 --> 01:11:14,360
and proving the environment is clean enough to resume.
2043
01:11:14,360 --> 01:11:16,160
If any part of that loop is weak,
2044
01:11:16,160 --> 01:11:18,680
the whole enterprise becomes a probabilistic system.
2045
01:11:18,680 --> 01:11:20,840
And leaders should stop accepting probabilistic.
2046
01:11:20,840 --> 01:11:23,320
Now, most enterprises treat each part of that loop
2047
01:11:23,320 --> 01:11:25,200
as a separate department, identity team,
2048
01:11:25,200 --> 01:11:28,040
security operations, IT operations, application owners,
2049
01:11:28,040 --> 01:11:31,280
risk, legal audit, the attacker doesn't care.
2050
01:11:31,280 --> 01:11:33,440
So the operating model has to align those pieces
2051
01:11:33,440 --> 01:11:37,040
without creating a bureaucracy that moves slower than the threat.
2052
01:11:37,040 --> 01:11:39,680
That starts with a clean split, policy intent
2053
01:11:39,680 --> 01:11:41,120
versus policy enforcement.
2054
01:11:41,120 --> 01:11:42,800
Policy intent belongs to the business,
2055
01:11:42,800 --> 01:11:45,080
not because the business writes conditional access rules,
2056
01:11:45,080 --> 01:11:47,920
but because the business defines the tolerable risk.
2057
01:11:47,920 --> 01:11:50,440
Who should have access to what, for how long,
2058
01:11:50,440 --> 01:11:52,440
with what approvals and under what conditions?
2059
01:11:52,440 --> 01:11:54,760
That's governance, that's not an IT preference.
2060
01:11:54,760 --> 01:11:56,680
That's a business decision about trust.
2061
01:11:56,680 --> 01:11:59,040
Policy enforcement belongs to the platform teams.
2062
01:11:59,040 --> 01:12:01,520
Identity, endpoint, and security engineering
2063
01:12:01,520 --> 01:12:04,760
translate intent into deterministic mechanisms.
2064
01:12:04,760 --> 01:12:07,920
Conditional access, privileged access constraints,
2065
01:12:07,920 --> 01:12:12,360
entitlement packages, CAE triggers, and automation playbooks.
2066
01:12:12,360 --> 01:12:14,800
But the key is this, enforcement must be testable.
2067
01:12:14,800 --> 01:12:17,640
If a policy can't be tested under realistic conditions,
2068
01:12:17,640 --> 01:12:20,520
it's not a control, it's a belief.
2069
01:12:20,520 --> 01:12:22,520
The second component of the operating model
2070
01:12:22,520 --> 01:12:23,720
is exception governance.
2071
01:12:23,720 --> 01:12:25,280
This is where most programs collapse.
2072
01:12:25,280 --> 01:12:28,320
Exceptions are not rare edge cases, they are entropy generators.
2073
01:12:28,320 --> 01:12:30,720
They accumulate because the business is trying to function
2074
01:12:30,720 --> 01:12:32,720
and because security is trying to accommodate,
2075
01:12:32,720 --> 01:12:34,720
overtime exceptions become the real policy
2076
01:12:34,720 --> 01:12:36,720
and the real policy becomes theater.
2077
01:12:36,720 --> 01:12:39,400
So executives need a non-negotiable rule.
2078
01:12:39,400 --> 01:12:41,920
Every exception must have an owner,
2079
01:12:41,920 --> 01:12:45,800
a justification, an expiration date, and a review cadence.
2080
01:12:45,800 --> 01:12:48,400
No expiration means you're not granting an exception.
2081
01:12:48,400 --> 01:12:51,200
You're redesigning the security model without admitting it.
2082
01:12:51,200 --> 01:12:54,000
And exceptions need to be treated as first class risk objects,
2083
01:12:54,000 --> 01:12:56,320
tracked, measured, and reduced over time.
2084
01:12:56,320 --> 01:12:58,280
Otherwise, you will always enable CAE,
2085
01:12:58,280 --> 01:13:00,560
enable governance, enable zero trust,
2086
01:13:00,560 --> 01:13:03,360
and then quietly bypass it everywhere it matters.
2087
01:13:03,360 --> 01:13:06,120
Third, decision speed requires decision rights.
2088
01:13:06,120 --> 01:13:07,920
Identity incidents become expensive
2089
01:13:07,920 --> 01:13:09,360
when nobody is allowed to act.
2090
01:13:09,360 --> 01:13:12,000
The SOCC signals but can't revoke access.
2091
01:13:12,000 --> 01:13:14,920
It can isolate devices but can't disable accounts.
2092
01:13:14,920 --> 01:13:18,000
App owners can approve access, but don't understand blast radius.
2093
01:13:18,000 --> 01:13:21,120
Legal one certainty, the business one's continuity.
2094
01:13:21,120 --> 01:13:23,720
So define three tiers of authority in advance.
2095
01:13:23,720 --> 01:13:26,080
Tier one, pre-approved, reversible actions
2096
01:13:26,080 --> 01:13:28,640
that can happen immediately when confidence is high,
2097
01:13:28,640 --> 01:13:31,720
session revocation, forcing reauthentication,
2098
01:13:31,720 --> 01:13:35,800
blocking risky sign-ins, suspending a suspicious O-orth grant.
2099
01:13:35,800 --> 01:13:37,600
These should not require a meeting.
2100
01:13:37,600 --> 01:13:39,640
Tier two, disruptive but bounded actions
2101
01:13:39,640 --> 01:13:41,280
that require fast approval,
2102
01:13:41,280 --> 01:13:43,600
disabling an account tied to revenue workflows,
2103
01:13:43,600 --> 01:13:45,560
locking down a sensitive sharepoint site,
2104
01:13:45,560 --> 01:13:48,640
removing privileged access from a production operator.
2105
01:13:48,640 --> 01:13:50,840
These need named approvals, not the team.
2106
01:13:50,840 --> 01:13:53,200
Tier three, enterprise impact actions
2107
01:13:53,200 --> 01:13:55,720
that trigger executive incident governance.
2108
01:13:55,720 --> 01:13:58,160
Broad access shutdowns, customer notifications,
2109
01:13:58,160 --> 01:13:59,680
regulatory disclosures.
2110
01:13:59,680 --> 01:14:01,800
These are rare but if you don't pre-define them,
2111
01:14:01,800 --> 01:14:04,080
you'll discover your authority model in real time.
2112
01:14:04,080 --> 01:14:06,160
That's not leadership, that's improvisation.
2113
01:14:06,160 --> 01:14:07,680
Fourth, investment posture.
2114
01:14:07,680 --> 01:14:10,000
Leaders need to fund the loop, not the sensors.
2115
01:14:10,000 --> 01:14:12,200
If the organization already detects plenty
2116
01:14:12,200 --> 01:14:13,560
but still bleeds time,
2117
01:14:13,560 --> 01:14:16,760
the gap is response, orchestration, and identity enforcement.
2118
01:14:16,760 --> 01:14:19,520
That means funding integration work, automation playbooks,
2119
01:14:19,520 --> 01:14:22,640
entitlement, cleanup, and application modernization
2120
01:14:22,640 --> 01:14:24,560
so that revocation is actually honored
2121
01:14:24,560 --> 01:14:27,480
that is not operational detail, that is the only path
2122
01:14:27,480 --> 01:14:29,720
to reducing MTTR, finally accountability,
2123
01:14:29,720 --> 01:14:31,720
not in the abstract, in the operating rhythm.
2124
01:14:31,720 --> 01:14:34,400
Every quarter leaders should demand three outputs.
2125
01:14:34,400 --> 01:14:37,160
Current MTTR for identity-driven incidents,
2126
01:14:37,160 --> 01:14:40,880
the top ten exception paths by risk and business criticality,
2127
01:14:40,880 --> 01:14:43,520
and the backlog of identity and response improvements
2128
01:14:43,520 --> 01:14:45,240
with owners and dates.
2129
01:14:45,240 --> 01:14:46,440
If those three are visible,
2130
01:14:46,440 --> 01:14:49,240
security stops being an argument and becomes a new problem
2131
01:14:49,240 --> 01:14:52,400
a system, that's the executive operating model, one loop.
2132
01:14:52,400 --> 01:14:55,240
Explicit ownership, governed exceptions, pre-approved actions,
2133
01:14:55,240 --> 01:14:57,880
and a scoreboard that measures speed of containment.
2134
01:14:57,880 --> 01:14:59,360
Everything else is commentary.
2135
01:14:59,360 --> 01:15:00,680
Executive checklist.
2136
01:15:00,680 --> 01:15:02,440
What to ask your teams this quarter?
2137
01:15:02,440 --> 01:15:04,640
If leadership wants this to move from security
2138
01:15:04,640 --> 01:15:06,920
is complicated to security is operated,
2139
01:15:06,920 --> 01:15:09,360
the fastest way is to ask better questions.
2140
01:15:09,360 --> 01:15:12,080
Not more questions, better ones.
2141
01:15:12,080 --> 01:15:14,080
Here are the questions that cut through tooling
2142
01:15:14,080 --> 01:15:16,480
and land directly on system behavior.
2143
01:15:16,480 --> 01:15:18,440
First, where do we have authorization risk,
2144
01:15:18,440 --> 01:15:19,640
not authentication gaps?
2145
01:15:19,640 --> 01:15:21,600
Don't accept we have MFA as an answer.
2146
01:15:21,600 --> 01:15:24,520
Asquare-accompromised identity could still do disproportionate damage
2147
01:15:24,520 --> 01:15:26,000
because the entitlements are wrong.
2148
01:15:26,000 --> 01:15:27,080
Who can export data?
2149
01:15:27,080 --> 01:15:28,680
Who can change sharing settings?
2150
01:15:28,680 --> 01:15:30,240
Who can create app registrations?
2151
01:15:30,240 --> 01:15:31,720
Who can grant admin consent?
2152
01:15:31,720 --> 01:15:33,160
Who can disable controls?
2153
01:15:33,160 --> 01:15:35,040
If the answer is we are not sure.
2154
01:15:35,040 --> 01:15:36,280
That's not a visibility gap.
2155
01:15:36,280 --> 01:15:37,640
That's unmanaged blast radius.
2156
01:15:37,640 --> 01:15:41,280
Second, which identities can change systems, data, or controls?
2157
01:15:41,280 --> 01:15:42,960
Humans and non-humans.
2158
01:15:42,960 --> 01:15:45,320
This is where most organizations lie to themselves.
2159
01:15:45,320 --> 01:15:46,360
They can list admins.
2160
01:15:46,360 --> 01:15:48,960
They can't list service principles, automation accounts,
2161
01:15:48,960 --> 01:15:52,960
CIS, CD identities, connectors, or the new wave of agent identities.
2162
01:15:52,960 --> 01:15:55,800
If machine identities outnumber humans in your environment
2163
01:15:55,800 --> 01:15:57,760
and they usually do then governing only humans
2164
01:15:57,760 --> 01:15:59,400
is a decorative security program.
2165
01:15:59,400 --> 01:16:02,680
Ask for an inventory, ownership model, and rotation posture.
2166
01:16:02,680 --> 01:16:04,720
If nobody owns an identity, it owns you.
2167
01:16:04,720 --> 01:16:06,800
Third, how quickly can we revoke access
2168
01:16:06,800 --> 01:16:08,800
across our critical apps when risk changes?
2169
01:16:08,800 --> 01:16:10,840
Not can we disable the user?
2170
01:16:10,840 --> 01:16:13,360
How quickly can we actually remove effective access
2171
01:16:13,360 --> 01:16:14,680
in the apps that matter?
2172
01:16:14,680 --> 01:16:17,480
Email, files, collaboration, ERP finance,
2173
01:16:17,480 --> 01:16:20,200
ticketing code repos, and your top SAS platforms.
2174
01:16:20,200 --> 01:16:22,520
Ask for proof, not assurance, which of these apps
2175
01:16:22,520 --> 01:16:25,280
honor near real-time revocation signals,
2176
01:16:25,280 --> 01:16:28,160
and which will keep a session alive until token expiry.
2177
01:16:28,160 --> 01:16:30,680
If revocation is slow, you are granting attackers time
2178
01:16:30,680 --> 01:16:31,360
by design.
2179
01:16:31,360 --> 01:16:34,760
Fourth, how many response steps remain manual and why?
2180
01:16:34,760 --> 01:16:36,640
This is not a call to automate everything.
2181
01:16:36,640 --> 01:16:39,240
It's a call to identify the latency you've normalized.
2182
01:16:39,240 --> 01:16:41,400
Ask your teams to map one identity incident
2183
01:16:41,400 --> 01:16:43,120
and to end and count the handoffs.
2184
01:16:43,120 --> 01:16:45,960
How many times does context get re-entered into a new system?
2185
01:16:45,960 --> 01:16:49,360
How many steps exist only because systems don't talk to each other?
2186
01:16:49,360 --> 01:16:50,720
The goal is not fewer tickets.
2187
01:16:50,720 --> 01:16:53,640
The goal is fewer minutes between signal and containment.
2188
01:16:53,640 --> 01:16:55,360
Fifth, what exceptions exist?
2189
01:16:55,360 --> 01:16:57,120
Who owns them and when do they expire?
2190
01:16:57,120 --> 01:16:58,480
Executives are often the reason
2191
01:16:58,480 --> 01:17:02,040
exception culture survives, so ask for the uncomfortable list.
2192
01:17:02,040 --> 01:17:05,040
Exclusions in conditional access, bypasses for business
2193
01:17:05,040 --> 01:17:08,400
critical apps, accounts that never get access reviewed,
2194
01:17:08,400 --> 01:17:11,520
service principles with broad permissions temporarily,
2195
01:17:11,520 --> 01:17:15,360
and privileged roles that stay standing because it's easier.
2196
01:17:15,360 --> 01:17:19,440
If an exception has no owner and no expiry, it is not an exception.
2197
01:17:19,440 --> 01:17:20,880
It is the real architecture.
2198
01:17:20,880 --> 01:17:24,160
Sixth, what is our current MTTR for identity-driven incidents
2199
01:17:24,160 --> 01:17:27,840
and to end, not a guess, not a slide, a measured baseline?
2200
01:17:27,840 --> 01:17:32,000
An MTTR broken into detect, decide, enforce, recover.
2201
01:17:32,000 --> 01:17:34,040
If your teams can't produce those timestamps,
2202
01:17:34,040 --> 01:17:35,000
they can't improve them.
2203
01:17:35,000 --> 01:17:37,600
If they can produce them, then leadership can fund
2204
01:17:37,600 --> 01:17:39,400
the stage that is actually slow.
2205
01:17:39,400 --> 01:17:43,880
Decision rights, enforcement mechanisms, or recovery workflows.
2206
01:17:43,880 --> 01:17:46,320
Seventh, and this is the one most leaders avoid.
2207
01:17:46,320 --> 01:17:49,160
Who has authority to act and how fast can they act
2208
01:17:49,160 --> 01:17:51,320
when the identity is politically sensitive?
2209
01:17:51,320 --> 01:17:53,320
Ask specifically about the hard cases,
2210
01:17:53,320 --> 01:17:56,000
an executive account, a production deployment identity,
2211
01:17:56,000 --> 01:17:58,400
a revenue workflow, a third party integration
2212
01:17:58,400 --> 01:18:02,360
that a business unit owns or a service principle nobody understands.
2213
01:18:02,360 --> 01:18:05,240
In those cases, does the organization have pre-approved actions
2214
01:18:05,240 --> 01:18:06,640
or does it have meetings?
2215
01:18:06,640 --> 01:18:09,120
Because an attacker doesn't care that the identity is important,
2216
01:18:09,120 --> 01:18:10,440
they care that it is powerful.
2217
01:18:10,440 --> 01:18:12,600
If you ask these questions and you get vague answers,
2218
01:18:12,600 --> 01:18:14,440
that is not a failure of the security team.
2219
01:18:14,440 --> 01:18:16,760
That is a leadership problem, unclear intent,
2220
01:18:16,760 --> 01:18:20,600
unclear ownership, and no mandate to reduce decision latency.
2221
01:18:20,600 --> 01:18:23,240
So don't ask your teams for a zero trust road map,
2222
01:18:23,240 --> 01:18:26,440
ask them for proof that the trust model is enforceable,
2223
01:18:26,440 --> 01:18:29,600
exceptions are governed, and response actions are pre-approved
2224
01:18:29,600 --> 01:18:30,280
and rehearsed.
2225
01:18:30,280 --> 01:18:33,640
That is what security maturity looks like when it's real time.
2226
01:18:33,640 --> 01:18:35,840
Conclusion by security as an enabler.
2227
01:18:35,840 --> 01:18:38,480
Security maturity is safe autonomy plus fast recovery,
2228
01:18:38,480 --> 01:18:41,760
measured by MTTR, not by how many controls you can list.
2229
01:18:41,760 --> 01:18:43,440
If you want the practitioner version of this,
2230
01:18:43,440 --> 01:18:45,560
listen to the follow-up episode where we unpack
2231
01:18:45,560 --> 01:18:48,560
intra-governance, CAE, and Defender to Service
2232
01:18:48,560 --> 01:18:51,000
now responds loops in plain operational terms.
2233
01:18:51,000 --> 01:18:54,480
Subscribe to M365FM and queue that next episode now.
















