Sponsored by. Identity has long been the load-bearing wall of cybersecurity. The logic was simple: verify the employee, secure the access. But as professionalized threat actors weaponize AI and sophisticated phishing kits, that wall is cracking. Identity is being forced to carry a structural burden it was never designed to support.. While identity isn’t obsolete, in ecosystems defined by SaaS sprawl, BYOD, and hybrid work, a valid credential is no longer a guarantee of a safe connection. The real danger is not authentication failure, but whether the right signals are being verified. Without real-time device checks, a legitimate login could just as easily be a compromised session.. The post-authentication blind spot. Multi-factor authentication (MFA) was supposed to close this gap. However, phishing kits now let attackers sit between a user and the real login portal, proxying the authentication in real time and stealing the session token that gets issued after MFA succeeds. The victim completes every security check exactly as intended. The attacker walks away with the cookie that proves it.. NIST Special Publication 800-207, the foundational framework for Zero Trust architecture, anticipated this problem. It warns against relying on implied trustworthiness once a subject has met a base authentication level, and specifies that access decisions should account for whether the device used for the request has the proper security posture.. In practice, most organizations still treat authentication as a one-time check. Identity is verified, MFA passes, a session begins, and trust holds until the token expires. But a session token in an attacker’s browser looks identical to the same token in the user’s browser. Traditional authentication logs cannot tell them apart.. Verizon’s Data Breach Investigation Report found stolen credentials are involved in 44.7% of breaches.. Effortlessly secure Active Directory with compliant password policies, blocking 4+ billion compromised passwords, boosting security, and slashing support hassles!. Try it for free. Where Zero Trust breaks down. Most Zero Trust implementations have ended up heavily identity centric. They focus on strengthening authentication, enforcing MFA, reducing password reliance, and introducing risk-based sign-in policies. Device verification, meanwhile, is inconsistently applied. It often stops at the point of login, or it applies only to browser-based workflows inside modern conditional access frameworks. Legacy protocols, remote access tools, and API integrations tend to inherit trust implicitly once identity has been established.. The result is a fragmented model. Personal and third-party devices may be loosely controlled or entirely unmanaged. Session trust persists even if device posture degrades mid-session. Identity signals and endpoint signals sit in separate tools with limited integration. Identity gets scrutinized heavily at login, and then access is rarely reassessed in any meaningful way.. The device is the other half of the answer. A stolen password used from an attacker-controlled laptop should not be treated the same as the same password used from an enrolled, encrypted, compliant corporate endpoint. Yet that is exactly what happens when identity alone governs access.. Device posture answers questions identity cannot. Is the device encrypted? Is endpoint protection active and healthy? Is the operating system patched? Has the configuration drifted from policy? Is this approved hardware?. More importantly, those answers have to stay current beyond the initial login and across the entire session. An update can be delayed, endpoint protection can be disabled, unapproved software can be installed. Conditions at login are not conditions at hour three of a session. Continuous device verification reduces the value of stolen credentials and intercepted tokens, because access becomes bound not just to an identity, but to a trusted, healthy endpoint.. Four principles for a stronger model. A more defensible approach combines identity with continuous device verification. In practice, that looks like this:. Continuously verify both the user and the device: Access should stay conditional on device health, not just identity proof. If endpoint protection is turned off or encryption is disabled mid-session, trust should adjust in real time. This reduces the effectiveness of stolen credentials, token replay, MFA fatigue, and attacker-operated endpoints in one move.. Bind access to approved hardware: Device-based controls let organizations enroll trusted hardware and differentiate between corporate, personal, and third-party endpoints. Valid credentials used from an unrecognized device should not simply proceed because MFA succeeded.. Apply proportionate enforcement: Rigid controls create workarounds. A mature posture strategy can apply conditional restrictions, reduced privileges, or time-bound grace periods instead of defaulting to a hard block. That balance matters for hybrid and remote teams.. Enable self-service remediation: If trust is tied to device health, users need a way to restore that trust. Guided fixes for encryption, OS updates, or endpoint protection let employees resolve posture issues without filing a ticket or losing access unnecessarily.. Solutions like Specops Device Trust operationalize this model by extending trust decisions beyond identity and maintaining enforcement as conditions change. It authenticates users and verifies their devices continuously across Windows, macOS, Linux, and mobile platforms, not just at the point of login.. Identity still matters. It just can no longer carry the full weight of an access decision on its own.. If you’re looking to evolve your identity security strategy to include device trust, contact Specops today or book a demo to see how our solutions could work in your environment.. Sponsored and written by Specops Software.
BleepingComputer