Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

6.4.1. Provisioning, Deprovisioning, and Access Reviews

💡 First Principle: Credential attacks exploit the weakest link in authentication: the human-chosen secret. Despite decades of evidence that humans choose predictable passwords, most authentication systems still rely on them as the primary factor. Understanding how credential attacks work directly motivates the adoption of MFA, passwordless authentication, and behavioral detection.

Credential attack taxonomy:
AttackMethodRequirementDetectionDefense
Brute forceTry all character combinationsTime (exponential)High-volume failed attemptsAccount lockout; MFA
Dictionary attackTry wordlists of common passwordsPassword listFailed attemptsStrong password policy; MFA
Password sprayingTry a few common passwords against many accountsUsername listDistributed, low-volume failed attemptsBehavioral analytics; impossible travel detection
Credential stuffingUse breached username/password pairs from other sitesBreach databaseUnusual login patterns; geo anomaliesMFA; breach monitoring (HaveIBeenPwned); unique password enforcement
PhishingTrick user into entering credentials on fake siteUser errorEmail gateway; user reportingMFA (ideally phishing-resistant); security awareness; DMARC
Man-in-the-browserMalware intercepts credentials as user typesEndpoint compromiseEDR; behavioralEndpoint security; FIDO2
SIM swappingSocial engineer telecom to reassign phone numberSocial engineering skillAccount takeover from new deviceAvoid SMS MFA; use TOTP or FIDO2
Golden Ticket (Kerberos)Forge TGT using KRBTGT hashDomain Admin compromise firstAnomalous TGT characteristicsProtect DCs; rotate KRBTGT; Privileged Access Workstations
Pass-the-HashUse NTLM hash directly without cracking passwordHash extraction from memoryCredential access alerts; lateral movement detectionCredential Guard; disable NTLM; PAM

Zero Trust response to credential compromise: Even with a stolen credential, Zero Trust controls limit damage: device posture check (is this a managed device?), location check (is this a known location for this user?), risk-based authentication (unusual activity → step-up authentication). The credential alone is insufficient — the attacker must also pass the contextual controls.

⚠️ Exam Trap: Account lockout is a DoS vector. An attacker who knows valid usernames can lock out accounts by repeatedly entering wrong passwords, denying legitimate users access. This is why lockout policies must be balanced with account unlock self-service and monitoring. CAPTCHA and progressive delays (exponential backoff) are alternatives that slow attackers without enabling lockout-based DoS against legitimate users.

Reflection Question: An attacker uses credential stuffing to authenticate to a company's VPN using credentials stolen from a different breach. The company uses single-factor authentication. Once on the VPN, the attacker accesses the internal network for three weeks before detection. Describe a layered IAM architecture that would have detected or prevented this breach at each stage: initial authentication, post-authentication anomaly detection, and lateral movement limitation.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications