One morning you wake up and realize that you can no longer travel in that old car that took you for years: you spend too much, it sounds weird and no longer inspires confidence. The transition from password-based authentication to a password system follows the same feeling of relief and vertigo: it is an update that improves experience and reduces many risks, but requires planning and some investments in infrastructure and processes.
Passwords have been the dominant form of authentication for decades But the numbers show their limits. Verizon's latest report of data violations indicates that a very high proportion of incidents involve committed credentials, and common practices such as password reuse multiply attack surfaces. Consult sources such as Verizon DBIR 2023 helps understand why change is urgent.

Passkeys are the modern version of cryptographic keys: instead of memorizing secrets, the user device generates a couple of cryptographic keys, keeping the computer private and recording the public in the service. When the user log in, the service launches a challenge that the device signs with the private key; the server verifies that signature and grants access. This eliminates the classic vector of credentials theft because the private key never leaves the device.
This way of authenticating rests on open standards such as FIDO2 and WebAuthn, and its maturity has driven a rapid adoption: organizations and technology have already reported billions of accounts compatible with passwords. To see adoption data and the boost of the ecosystem, the work of the FIDO Alliance It's a good starting point. In addition, NIST's digital identity guides provide the framework for classifying guarantees (AAL2 / AAL3) and detail how synchronized authenticators fit into an identity program: NIST SP 800-63.
For certified organisations under ISO / IEC 27001, the introduction of passwords is not only a technical decision, but an adaptation of the safety management system. The standard is a map that requires the documentation and justification of controls, risk treatments and operational procedures. In particular, the access control, authentication information management and secure authentication sections should reflect how passwords meet or exceed existing control objectives. Consult the official ISO page on the standard helps maintain the right approach: ISO / IEC 27001 - ISO.
Migration requires explicit risk analysis. In documenting risk treatment, you have to show which threats are removed - such as traditional phishing, the filling of credentials or brute-force attacks - and what new risks appear, for example the loss of devices, supplier units for synchronized passwords or complex recovery scenarios. The auditors will want to see clear procedures for the recovery of accounts, reregistration of keys after incidents and access controls to authentication data.
It is important not to break the solution: the passwords increase safety, but do not make it invulnerable. There are vectors that take advantage of implementation or social engineering failures - for example, degradation attempts that force the return to passwords, or attacks on OAuth flows and device codes - and therefore it is appropriate to rely on practical guides on good implementation; the OWASP project offers useful resources on authentication patterns and associated risks: OWASP Authentication Cheat Sheet.
From the operational point of view, the benefits can be real and quantifiable. Technology companies that have driven the use of passwords report reduced access attempts with stolen credentials, improved login success rate and lower burden for support teams. Microsoft, for example, has detailed its strategy to push the passwords as a default method and operational motives behind that movement: Microsoft Security Blog. In addition, ecosystem analysis shows that adoption improves user experience and reduces costs associated with password rebeginnings.
In terms of compliance, moving to passwords can help to meet multiple regulatory and audit frameworks. The phishing-resistant and categorized authentication at NIST guarantee levels fits with PCI DSS requirements on multifactor authentication, reduces the exposure of personal data in the GDPR context and provides evidence for SOC 2 audits, provided the implementation includes well-defined records, access controls and recovery processes. For references on specific frameworks, it is useful to consult the official pages of each standard, such as the PCI Security Standards Council or information on GDPR.
Operational reality often requires a gradual transition. A business environment can rarely leave the passwords immediately: legalized applications, external suppliers and users who do not have modern hardware create a mixed period. During that time, policies must be documented to explain which systems require passkeys, which tolerate inherited methods and how the principle of lesser privilege is applied to avoid security gaps. Tracability is key: keeping clear records of passwords, changes and use makes it easier to investigate incidents and demonstrate controls to auditors.
Another critical aspect is the recovery of accounts. If a user loses his device and there is no backrest of passwords, the organization must have secure processes to reestablish access without re-introducing attack vectors. The alternatives range from cloud-encrypted recovery codes and backups to manual identity verification procedures; each with its risk implications and operational costs to be described in the SGSI documentation.
For migration to work, business platforms and credentials management solutions should provide solid support for WebAuthn, allow flexible policies by user groups, manage mail checks for recovery where appropriate and generate audit records that show registrations and authentication. The combination of passwords with additional controls - session management, device security requirements and pattern monitoring - maintains the in-depth defense required by a mature organization.

Where to start? A practical and consistent route with ISO / IEC 27001 is to prioritize by risk: start with the accounts with more privileges and sensitive data, document the reasoning that led to that prioritization and validate the changes with risk analysis and recovery tests. Complementing implementation with staff training reduces friction and helps to detect social engineering attempts to exploit the transition.
In the end, moving to passwords is not a luxury: it is a necessary modernization for many companies that seek to reduce exposure and operating costs without renouncing the user experience. It is not the panacea, but it is a powerful lever to improve the security position if it is accompanied by change management, rigorous documentation and appropriate technical controls. For organisations subject to ISO / IEC 27001 audits, success will not only be achieved by deploying technology: it will be achieved when implementation is reflected in the management system, risk treatment and operational procedures.
If you want to deepen more on adoption of passwords and case studies, the FIDO Alliance notes on adoption growth and sector analysis are recommended reading: FIDO Alliance - Passkey Adoption. To better understand the impact of the credentials committed in security incidents, review Verizon's report: Verizon DBIR 2023. And if your goal is to align migration with good identity practices, the NIST guide is an essential reference: NIST SP 800-63.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...