Skip to Content

Why Identity Breaches Bypass Controls (And Why MSPs See Them First)

January 15, 2026 by
Jaspreet Singh

black computer keyboard

Why Identity Breaches Bypass Controls (And Why MSPs See Them First)

Most MSPs are no longer primarily concerned about missing patches.Instead, they are concerned that even fully patched, MFA-enabled, and 'secure' tenants can still be breached.This is because modern breaches are not about breaking controls.

They involve bypassing existing controls.Identity attacks do not directly defeat security measures.

Instead, they exploit trust within the system.MSPs are often the first to be contacted when such incidents occur.

The Myth: “We Have the Right Controls”

Most SMB environments appear secure on paper:

  • MFA is enabled
  • Conditional Access is configured
  • Defender is running
  • Password policies are “strong enough.”

However, identity breaches continue to occur.

Why is this the case? Because attackers no longer attack technology.

Instead, they target authentication processes.

Identity Breaches Don’t Trigger Alarms

Traditional security assumes attackers are noisy.

Identity attackers, however, often remain undetected. Once an attacker gets:

  • a session token
  • a consented app
  • a legacy auth path
  • a trusted mailbox rule

They don’t need to:

  • brute force passwords
  • trigger MFA challenges
  • exploit vulnerabilities

They simply log in as a legitimate user would.

From Microsoft’s perspective: “This looks legitimate. ”From the business perspective, the concern is: “Why is money missing?”

The Real Reasons Identity Attacks Bypass Controls

1. Token Theft Ignores MFA Completely

MFA protects the authentication process, but not the session itself. If an attacker steals a valid token:

  • MFA is already satisfied
  • Conditional Access is bypassed
  • No new login event occurs

The attacker isn’t initiating a new login. trusted session. This is why phishing kits increasingly target tokens rather than passwords. (Exclusive: Inside the six-year phishing attack targeting Microsoft tool, 2025)

2. Conditional Access Is Often Built for Compliance, Not Threats

Many MSP-built CA policies focus on:

  • “Require MFA”
  • “Block legacy auth.”
  • “Trusted locations”

However, attackers adapt more quickly than policies can be updated. Common gaps MSPs see:

  • No device compliance enforcement
  • No sign-in risk conditions
  • No token protection
  • Exceptions added “temporarily” and never removed

While controls are in place, attack paths often remain accessible.

3. Consent Abuse Remains Significantly Underestimated (Li et al., 2025)

One malicious OAuth app with basic permissions can:

  • Read mail
  • Access files
  • Maintain persistence without passwords

No MFA prompt.

No password change impact.

No user awareness. The attacker doesn’t need credentials; they just need approval. Users continue to click “Accept.”

4. Identity Attacks Often Resemble Normal Business Activity

This aspect is particularly dangerous. Identity breaches:

  • Use normal IPs
  • Access normal apps
  • Send emails users expect
  • Move slowly

No ransomware pop-up.

No system outage.

No screaming alerts.

Just:

  • Changed payment instructions
  • Silent data access
  • Weeks of unnoticed activity (Shah et al., 2020)

By the time the finance team contacts the MSP, the damage has already occurred.

Why MSPs Experience These Challenges More Than Others

MSPs live at the intersection of:

  • User behavior
  • Business risk
  • Platform limitations

When identity breaches happen:

  • Clients blame “Microsoft.”
  • Microsoft logs show “successful sign in: MSPs must explain how security measures failed despite appearing effective. failing

This is why identity security is now an MSP differentiator, not an add-on. (Why Identity Management is Foundational to Zero-Trust for SMBs, 2026)

What MSPs Should Actually Focus On

Not more tools.

Not more checkboxes.

Instead, the focus should be on improved identity visibility and enforcement:

  • Token protection and sign-in risk policies
  • OAuth app governance and consent reviews
  • Device-based Conditional Access
  • Shorter session lifetimes for high-risk roles
  • User education focused on modern phishing, not just links

Identity security is no longer solely about preventing initial access.

It is about ensuring attackers cannot remain undetected within the environment.

Final Thought

If your security strategy assumes: “An attacker has to break something to get in. ”Your security posture is already at a disadvantage.

Modern identity breaches don’t break controls.

They use them exactly as designed.

MSPs who recognize this will be the ones clients trust when, not if, identity is compromised.


Jaspreet Singh — Author at MSPinsights.ca | Founder & CEO, Accelerate IT Services Inc.


References

(February 3, 2025). Exclusive: Inside the six-year phishing attack targeting Microsoft tool. Axios. https://www.axios.com/2025/02/04/abnormal-security-microsoft-phishing-schools-government

Li, Y., Qiu, W., Shezan, F. H., Cai, K., Dam, M. v., Austin, L., Lie, D. & Tian, Y. (2025). Breaking the illusion: Automated Reasoning of GDPR Consent Violations. arXiv preprint. https://doi.org/10.48550/arXiv.2512.22789

Shah, N., Ho, G., Schweighauser, M., Afifi, M. H., Cidon, A. & Wagner, D. (2020). A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts. arXiv preprint arXiv:2007.14030. https://doi.org/10.48550/arXiv.2007.14030

(January 13, 2026). Why Identity Management is Foundational to Zero-Trust for SMBs. MSSP Alert. https://www.msspalert.com/perspective/why-identity-management-is-foundational-to-zero-trust-for-smbs.

How SPF, DKIM, and DMARC Work Together — And Why MSPs Can’t Ignore Them