When employees access resources from anywhere on any device, the one constant is who they are. IAM is the control plane for modern security.
Plus Federation (SSO, SAML, OIDC) and Lifecycle (joiner-mover-leaver provisioning).
| Method | Security | Weakness |
|---|---|---|
| SMS codes | Low | SIM swapping, SS7 attacks, social engineering of carriers |
| TOTP apps | Good | Phishable — user enters code on fake login page |
| Push notifications | Good | MFA fatigue — bombard until user approves |
| FIDO2 / WebAuthn | Excellent | Phishing-resistant. Crypto bound to legitimate domain. Gold standard. |
Google: 85,000 employees with hardware keys → zero successful phishing.
Start RBAC, add ABAC for high-sensitivity resources. Don't boil the ocean.
MFA blocks 99.9% of automated account compromise. Deploy it everywhere.
FIDO2 keys are phishing-resistant. Everything else is phishable to some degree.
Privileged accounts need JIT + vaulting + recording. Standing admin = breach waiting to happen.
The joiner-mover-leaver lifecycle is where access control fails. Automate it.