Skip to main content

Modernization Intel / Research

Security & Identity Modernization

90% of breaches start with a compromised identity. Independent research on Zero Trust implementation, IAM modernization, and stopping identity-based attacks.

90%
of breaches start with a compromised identity
$4.88M
average breach cost (IBM 2025)
250%
rise in ATO attacks since 2024
$680K
median Zero Trust implementation cost

The Active Directory "Kill Chain"

Attackers don't break in; they log in. A single compromised laptop with legacy Active Directory access allows attackers to move laterally, escalate privileges to Domain Admin, and deploy ransomware in less than 2 hours.

The 2026 Threat Landscape:

AD Involvement
90% of Breaches
Avg Breach Cost
$4.88 Million
ATO Scams
Up 250% in 2024
Deadline
Completed Aug 2025

Security and identity modernization replaces perimeter-based security — firewalls, VPNs, on-premises Active Directory, and basic password authentication — with Zero Trust models built on cloud-native identity providers, device health verification, and application-level access controls. The legacy model assumed anyone inside the corporate network was trusted; the modern model assumes breach by default and verifies every access request continuously.

+ Read full background

The 2026 threat landscape has fundamentally changed the risk calculus. Account takeover (ATO) attacks rose 250% in 2024 as AI-generated phishing and deepfake audio/video reduced the human judgment that previously caught social engineering. Ransomware groups now operate at industrial scale, with average dwell time measured in hours, not days. The IBM Cost of a Data Breach 2025 report put average breach cost at $4.88M — a number that makes a $680K Zero Trust implementation economically straightforward to justify.

The Active Directory modernization imperative is particularly acute. Microsoft's Entra ID (formerly Azure AD) is now the de facto enterprise identity standard. Legacy on-premises AD cannot assess device health, geolocation risk, or impossible travel without significant third-party add-ons. Microsoft completed its retirement of basic authentication protocols in 2025; organizations still using these protocols for ERP integrations are operating outside Microsoft's security model. See security modernization cost benchmarks.

Why Security Modernization Is Urgent in 2026

AI-Powered Attack Automation

Threat actors now use LLMs to generate personalized phishing emails at scale - 10,000 targeted emails per hour versus 100 with manual methods. Deepfake audio impersonating CFOs has successfully authorized wire transfers at multiple Fortune 500 companies. The only phishing-resistant authentication is FIDO2/Passkeys; SMS and app-based MFA can be bypassed in real time by adversary-in-the-middle proxies. If your organization does not have phishing-resistant MFA on all privileged accounts by Q3 2026, you are operating below the baseline security posture required by most cyber insurers.

Supply Chain & Software Bill of Materials

Following SolarWinds, Log4Shell, and XZ Utils backdoor incidents, the US federal government and major enterprise procurement standards now require Software Bill of Materials (SBOM) for any software sold to or used by regulated organizations. NIST SP 800-218 (Secure Software Development Framework) is increasingly cited in cyber insurance requirements. Organizations without SBOM generation in their CI/CD pipelines cannot win federal contracts post-2026 and face insurance premium increases.

Privileged Access & Lateral Movement

The average ransomware attack achieves Domain Admin privileges within 2 hours of initial access. This speed is enabled by "standing privileges" - service accounts and admin accounts with permanent, always-on access to sensitive systems. Privileged Access Management (PAM) eliminates standing privileges through just-in-time (JIT) access: accounts receive elevated permissions for specific tasks and specific time windows, then lose them automatically. CyberArk, BeyondTrust, and Delinea PAM deployments consistently show 60–80% reduction in lateral movement risk.

Assessment: Evaluating Your Security Posture

A security modernization assessment should start with identity - it is the control plane for everything else.

1 Identity Inventory

Enumerate all identity providers: on-premises AD forests, Entra ID tenants, Okta orgs, legacy LDAP directories, and application-local user databases. Each identity silo is a potential attack surface. Map all service accounts (non-human identities), shared accounts, and privileged accounts. Service accounts are the most dangerous: they typically have no password rotation, broad permissions, and no human owner reviewing their activity.

2 Legacy Protocol Audit

Identify all applications using NTLM, Kerberos, Basic Authentication, POP3, IMAP, and SMTP without OAuth. Microsoft's Entra ID now blocks Basic Auth by default; applications using it are already failing or working through legacy exceptions that Microsoft is removing. Each legacy protocol is a gap in your MFA coverage - an attacker who steals a password can authenticate without triggering MFA if Basic Auth is available.

3 Access Entitlement Review

Run an access review across all critical systems. For each account, determine: Is this person still employed? Do they still need this level of access for their current role? When was this access last certified? Organizations without automated access reviews accumulate "access creep" where former employees retain access and current employees accumulate permissions from previous roles. IGA tools (SailPoint, Saviynt) automate this continuously.

4 Network Perimeter vs. Application Access

Map every application that is protected only by network perimeter (VPN access grants access to the entire subnet containing the application). These are your Zero Trust migration candidates - replace VPN-based application access with ZTNA (Zscaler Private Access, Cloudflare Access, Prisma Access) where the user authenticates to the specific application, not to a network segment.

Zero Trust Implementation: The Three Pillars

Zero Trust is not a product - it is an architecture requiring three simultaneous pillars. Buying only one does not produce Zero Trust.

Pillar 1: Identity (Who are you?)

Start here

Replace on-premises Active Directory as the primary identity provider with Entra ID or Okta. Enable Conditional Access policies: block sign-ins from high-risk locations, require MFA for all privileged operations, enforce phishing-resistant FIDO2 authentication for administrators and sensitive roles. Implement Identity Governance (IGA) for automated access reviews and JIT privileged access.

Investment: $150K–$400K. Timeline: 6–12 months. ROI driver: Eliminates the most common initial access vector (credential theft + password spray).

Pillar 2: Device Trust (Is your device healthy?)

Most skipped, highest impact

Conditional Access without device health signals is incomplete. An attacker with stolen credentials from an unmanaged device passes MFA but their device is not enrolled in Intune/MDM, has no EDR agent, and has no compliance policy applied. Entra ID's Conditional Access can require "compliant device" (Intune-enrolled, up-to-date OS, antivirus active) as a sign-in condition - blocking authentication from unmanaged or compromised endpoints entirely.

Investment: $80K–$200K. Timeline: 3–6 months. ROI driver: Stops session hijacking where attacker injects into an authenticated session from a new device.

Pillar 3: Network Access (Can you reach only this app?)

VPN replacement

Replace VPN with Zero Trust Network Access (ZTNA). VPN grants access to a network segment; ZTNA grants access to a specific application after verifying identity AND device health. Even if an attacker compromises credentials and a device, they can reach only the specific application authorized - not the entire internal network. Zscaler Private Access, Cloudflare Access, and Microsoft Entra Private Access are the leading ZTNA platforms.

Investment: $200K–$400K. Timeline: 6–12 months. ROI driver: Eliminates lateral movement after initial compromise. Also eliminates expensive MPLS/VPN infrastructure costs.

Risk Factors & Common Failure Modes

Tool-First, Strategy-Second

The most common failure: buying Okta, Zscaler, and CrowdStrike and calling it Zero Trust without defining identity architecture, Conditional Access policies, or application access patterns first. Tools without policy design produce expensive, misconfigured infrastructure. Best practice: hire a Zero Trust architect to define the three-pillar policy before issuing any RFPs. Strategy takes 4–8 weeks; tool procurement takes 2 weeks. Do them in that order.

MFA Bypass via Legacy Protocols

MFA deployment on modern authentication does not protect legacy protocol endpoints. If Exchange Online still accepts Basic Auth for an ERP integration, an attacker can authenticate to that ERP connector without triggering MFA - even if the end user has MFA enabled. Every legacy protocol exception is an MFA bypass. Enumerate all exceptions and replace them with OAuth 2.0 or application-specific proxy credentials before MFA enforcement.

IdP Single Point of Failure

Centralizing on Entra ID or Okta creates a single point of authentication failure. When the IdP has an outage (both have had 99.9%+ availability but still experience incidents), all SSO-dependent applications simultaneously become inaccessible. Design break-glass accounts (emergency local administrator accounts) for critical systems before going fully SSO-dependent. Test the break-glass procedure annually.

Over-Permissive Conditional Access

Organizations implementing Conditional Access for the first time set policies in "Report Only" mode to avoid user impact, then never enforce them. Report-only mode produces metrics, not security. Set a deadline: 30 days in report-only, then enforce. Expect 5–15% of users to be blocked initially due to unmanaged personal devices or missing MFA registration. This is expected friction - work through it systematically, not by disabling the policy.

Implementation Best Practices

Identity Foundation

  • Enable phishing-resistant MFA (FIDO2/Passkeys) for all administrators before anything else
  • Audit all service accounts; rotate passwords and restrict permissions
  • Enable Entra ID Identity Protection for risk-based Conditional Access
  • Set up break-glass emergency accounts before enforcing MFA organization-wide

Zero Trust Rollout

  • Start with Conditional Access in Report Only for 30 days, then enforce
  • Enroll all corporate devices in Intune before requiring device compliance
  • Replace VPN for one application segment at a time with ZTNA
  • Use an IAM specialist for Entra ID architecture - misconfiguration is the leading failure mode

Ongoing Operations

  • Run quarterly access certification campaigns (IGA)
  • Review Conditional Access named locations and trusted IPs monthly
  • Verify break-glass account access works during planned maintenance windows
  • Subscribe to Microsoft Entra security advisories - policy changes happen frequently

For Zero Trust cost modeling, see cost benchmarks. For ZTNA, FIDO2, SIEM, and XDR terminology, see the glossary. To compare security implementation partners, see the vendor database.

Research & Insights

Research on Zero Trust implementation, identity modernization, and cloud security strategies.

Migration Guides

Active Directory, VPN, and SOC modernization patterns.

Service Guides

Professional cloud security services for Zero Trust, Identity Governance, and Cloud IAM.

Cost Benchmarks

Real cost data comparing security modernization approaches vs. breach risk.

True Cost of Security Modernization Approaches

* Costs are industry averages based on market research

Zero Trust Maturity Model

Zero Trust isn't a product you buy. It's a journey of removing implicit trust from your network. Most orgs are stuck at "Traditional".

1
Traditional (The Moat) VPNs, Firewalls, Passwords. Once inside, you have full access.
2
Advanced (Identity Aware) MFA everywhere. Cloud Identity (Entra ID). Some segmentation.
3
Optimal (Zero Trust) Continuous verification. Device health checks. Least privilege access.

Legacy Auth Cliff: Already Reached

Microsoft completed blocking legacy protocols (POP3, IMAP, SMTP without OAuth) in Aug 2025. These are broken now.

Old ERP Systems Will Break
Scan-to-Email Printers Will Break
PowerShell Scripts (Basic Auth) Will Break
Modern Apps (OAuth 2.0) Safe

Modern Security Architecture Patterns

1. Identity Provider (IdP) as Control Plane

Entra ID / Okta. Centralizes all authentication.

Pros: SSO for everything, one place to kill access.

Cons: Single point of failure (if IdP goes down, nobody works).

2. Zero Trust Network Access (ZTNA)

Zscaler / Prisma Access. Replaces VPNs.

Pros: Users never touch the network, only specific apps.

Cons: Complex to configure policies for legacy apps.

3. Passwordless Authentication

Windows Hello / FIDO2 Keys / Passkeys.

Pros: Eliminates credential theft (phishing resistant).

Cons: Hardware costs (YubiKeys), user behavior change.

Looking for implementation partners?

Security & Identity Modernization Services & Vendor Guide

Compare 10 security partners, see IAM market share, and explore Zero Trust implementation services.

View Services Guide →

Cloud Security Services FAQ

Q1 Why is Active Directory a security risk?

Active Directory (AD) is involved in 90% of cyberattacks. It was designed 25 years ago for a 'castle and moat' world. Legacy protocols like NTLMv1 and LDAP are easily cracked. Once an attacker compromises a single AD credential, they can move laterally to domain controllers and deploy ransomware across the entire network.

Q2 What happened with the Legacy Auth Cliff in 2025?

Microsoft completed the retirement of Basic Authentication and legacy protocols (POP3, IMAP, SMTP) in Exchange Online and Entra ID in August 2025. Any application, scanner, or script still relying on simple username/password auth (without Modern Auth/OAuth) is now broken. Fixes: upgrade the app to OAuth 2.0, use an SMTP relay service (SendGrid, Postmark), or place the legacy system behind an Identity Proxy with OAuth translation.

Q3 How much does Zero Trust cost to implement?

The median cost for a mid-sized enterprise is $680,000 over 18 months. This includes licensing (Okta/Zscaler/CrowdStrike), professional services for implementation, and training. However, the ROI is typically 340% due to the avoidance of breach costs (avg $4.88M) and the elimination of expensive VPN/MPLS infrastructure.

Q4 Can we just buy Okta to get Zero Trust?

No. Identity (Okta/Entra ID) is just one pillar. Zero Trust requires three pillars working together: 1) Identity (Who are you?), 2) Device Trust (Is your laptop infected?), and 3) Network Access (ZTNA - Can you access ONLY this specific app?). Buying Okta without Device Trust still leaves you vulnerable to session hijacking.

Q5 How do we stop deepfake CEO fraud?

Deepfake audio/video is now convincing enough to fool employees into wiring money. The ONLY defense is Phishing-Resistant Multi-Factor Authentication (MFA) using FIDO2 hardware keys (like YubiKeys) or Passkeys. SMS and App-based MFA can be bypassed by real-time phishing proxies. FIDO2 cannot.

Q6 What is Identity Governance and Administration (IGA)?

IGA is the process of managing 'who has access to what' over time. It automates user lifecycle (Joiner/Mover/Leaver) and access reviews. Without IGA, you accumulate 'standing privileges' - users keeping access to systems they no longer need. This 'access creep' is a primary target for attackers.

Q7 Should we migrate from Active Directory to Entra ID (Azure AD)?

Yes, for 95% of workloads. Entra ID is a cloud-native identity provider that supports Zero Trust signals (Conditional Access). You should aim for 'Entra ID Joined' for all new laptops and servers, treating on-prem AD as a legacy exception only for apps that absolutely require Kerberos/LDAP.

Q8 What is the difference between EDR, XDR, and MDR?

EDR (Endpoint Detection & Response) monitors laptops/servers. XDR (Extended DR) connects Endpoint + Network + Identity data to find complex attacks. MDR (Managed DR) is a service where humans (SOC analysts) monitor your XDR tools 24/7. Most mid-sized companies should buy MDR because they can't afford a 24/7 internal SOC.