In many companies, identity teams continue to manage the incidents as if they were IT tickets: they serve by volume, because of the noise of a notice or because of the failure of an automatic check. This method works until the environment ceases to be mostly human and centralized: when local accounts, machine tokens, automatic flows and unmanaged assets appear, the simple sum of findings no longer reflect the real danger.
The risk of modern identity does not come from a single failure but the confluence of several factors: the position of controls, the hygiene of identities, the business context and the intention of use. Each can be tolerable separately; when inadequately combined, create clean routes for an attacker or an automatic agent to chain initial access with real impact.

The position of controls answers a clear operational question: if something goes wrong, can we prevent it, detect it and demonstrate what happened? It is not enough to mark a control as "activated"; it is necessary to understand what identity protects that control and what capacity that identity has to damage critical systems. Recommendations on authentication, such as NIST SP 800-63 and the good practices on meetings and management of credentials that it contains OWASP are a useful compass, but the real value is to weigh controls according to the critical asset they protect: an MFA-free access on an account with privileges in financial systems is not comparable to the same deficiency in a low-range account.
Identity hygiene is another vector that is often underestimated because it is not "visible" in a fast scan. Hygiene has to do with the property, the life cycle and the purpose of each identity: who responds on that account?, why does it exist?, is it still necessary? Local accounts without central control, non-human identities without declared owner, tokens that stopped rotating and orphan accounts are the material that attackers take advantage of because they are often less monitored and keep unnecessary permits. Agencies such as NCSC and secret management practices collected by OWASP describe how to reduce these vectors; the key is to treat them as structural factors, not as isolated incidents.
The business context makes a technical vulnerability a real risk. It is not enough to ask whether access is exploitable; the critical question is what is broken if it is exploited. Moderate exposure in a critical mission system or a repository with sensitive data can cause more damage than multiple findings in secondary systems. Risk management methodologies, such as those synthesized by NIST SP 800-30 they urge to prioritize according to impact, because effective risk reduction guides the resources where the organization is actually played continuity, income or reputation.
The most often missing dimension in identity programs is the intention of the user or agent. Today M2M patterns and automated flows flourish that, although using legitimate credentials, can run unusual sequences or access unintended destinations. To detect anomalies in the order of the invocation of tools, in the temporary frequency of access or in the actual use of privileges against the assigned one allows to distinguish legitimate activity from incipient abuse. Institutions and response teams recommend complementing static controls with behavior detection - as identity intelligence does in commercial solutions - and reference material for internal threats can be consulted in resources such as the CERT / SEI.
The most expensive error in prioritization is to treat the deficiencies as additive: counting findings and correcting by volume leads to closing tickets that do not reduce the actual exposure surface. The risk is non-linear and magnifies when several failures converge into the same attack route. For example, an orphan account without MFA that also awakens after a period of inactivity and presents attempts to login from new locations is a problem with immediate response; it is not just a point in a report, it is a vector in full use. The same is true of machine identities that maintain embedded secrets and lack audit: their combination of conditions creates persistent and silent accesses that are difficult to detect once they are exploited.
To decide what to fix first a priority model should be applied based on operational questions: what controls of prevention, detection and attestation are missing?; is there property and life-cycle clarity on this identity?; what impact would your commitment have on processes, data and customers?; does the current activity suggest a legitimate use or aim for a different purpose? To answer these issues means that actions are ordered for real risk reduction rather than for the appearance of compliance. An intervention that neutralizes a toxic combination may amount to eliminating the risk of dozens of isolated findings.

The goal, in practical terms, is for the organization's confidence chart to shrink: fewer climbing routes, fewer orphan elements and fewer points from which an attacker can channel initial access with data theft or operational interruption. This requires moving from dashboards that only show "quantity" to metrics that measure contextual exposure, and adopting processes that integrate continuous discovery, impact classification and intent detection.
In the market there are solutions that try to materialize this approach: they passively discover the telemetry of applications and accounts, build identity graphs that relate who agrees to what and cross posture, hygiene, business context and activity to generate contextual risk scores. These tools prioritize so-called "toxic combinations" and generate sequenced remediation plans to maximize exposure reduction in the shortest possible time, while facilitating code-free incorporation into governance and continuous monitoring policies. If you want to see a practical implementation of this approach, you can review how it is proposed. Orchid and compare that model with controls and public guides such as Microsoft Zero Trust or the recommendations of CISA on multifactor authentication.
In short, managing the risk of identity requires no longer pursuing the volume and starting to detect and mitigate the routes of greatest potential damage. The combination of the position of controls, hygiene, business context and a sign of intention is what gives priority and targeting resources towards the most dangerous combinations significantly reduces the likelihood of incidents with real impact. Changing the focus to contextual exposure is the most efficient way to turn an identity program into an effective barrier against commitment.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...