AI tools are reducing the skill and cost required to execute credential-based attacks against organizational networks, making identity the most direct point of failure if controls are immature. Organizations with gaps in MFA coverage, privileged access governance, or zero trust implementation face elevated risk of unauthorized access that bypasses perimeter defenses entirely. For federal contractors and agencies, failure to align with OMB M-22-09 zero trust requirements creates both security exposure and potential compliance findings during audits or assessments.
You Are Affected If
Your organization has privileged or administrative accounts not enrolled in phishing-resistant MFA (FIDO2/WebAuthn)
Your identity provider or SSO platform does not enforce device trust or conditional access policies
You have not completed OMB M-22-09 zero trust milestones (applicable to federal agencies and contractors subject to those requirements)
Standing privileged access exists where just-in-time access controls have not been implemented
Your SIEM or XDR lacks active detection rules for MFA fatigue (T1621) or authentication configuration changes (T1556)
Board Talking Points
AI is making it faster and cheaper for attackers to steal login credentials — the White House has identified identity controls as the single most important defense to invest in now.
The board should request a status update on phishing-resistant multi-factor authentication coverage and zero trust implementation within the next 30 days.
Organizations that delay strengthening identity controls face higher likelihood of unauthorized network access that existing perimeter security cannot stop.
FISMA/OMB M-22-09 — federal agencies and contractors are subject to zero trust identity requirements with defined implementation milestones; gaps create compliance exposure