When security incidents are investigated after the fact, a familiar pattern often emerges: The breach didn’t start with malware or lateral movement. It started with identity abuse.
Compromised credentials, abused MFA, and misused privileges are now the most common entry points for attackers. Yet, identity alerts are among the most misunderstood and least effectively investigated signals in security operations.
Modern attacks prioritize:
This shift isn’t accidental. Identity-based attacks often blend in with normal user behavior, bypass many traditional controls, and generate alerts that appear low severity in isolation. For attackers, identity is the quietest path in.
Identity platforms generate a high volume of events:
Individually, many of these look benign.
Without investigation, teams struggle to answer:
As a result, identity alerts are often automatically closed, treated as helpdesk issues, and ignored until impact occurs.
MFA fatigue (or push bombing) illustrates the problem clearly. A single MFA push might mean nothing. Repeated pushes over time, especially from unusual locations or devices, often indicate active attack attempts.
Without correlation and context, patterns go unnoticed, the attacks persist, and access is eventually granted. Identity alerts are rarely dangerous alone. They become dangerous when patterns are missed.
Identity-based alerts often precede:
But only if teams:
This requires structured investigation workflows.
Many identity detections fire because a rule was triggered and not because an incident is confirmed. Detection-only approaches force teams to guess the intent, rely on static thresholds, and treat identity risk as binary (good vs bad). In reality, identity risk exists on a spectrum and changes over time. Without investigation, teams will miss escalation signals, which will cause delayed response and the attack to progress quietly.
Organizations often treat identity risk as:
But identity abuse is an incident response problem.
It requires:
Until identity incidents are handled with the same rigor as endpoint or network incidents, they will remain the most effective attack vector.
If identity alerts are early indicators of compromise, the next challenge is clear: How do teams investigate and respond without relying entirely on manual effort?
In the next post in this series, we’ll look at why manual incident response doesn’t scale, and how human bottlenecks create risk even when alerts are accurate.