Vulnerabilities

Device Security Shares Load with Identity

May 21, 2026 00:04 · 12 min read

Introduction to Device Security

Identity has long been a crucial aspect of cybersecurity, with the logic being that verifying an employee's identity would secure their access. However, with the rise of professionalized threat actors using AI and sophisticated phishing kits, this approach is no longer sufficient.

In today's ecosystems, defined by SaaS sprawl, BYOD, and hybrid work, a valid credential is no longer a guarantee of a safe connection. The real danger lies not in authentication failure, but in whether the right signals are being verified. Without real-time device checks, a legitimate login could easily be a compromised session.

The Post-Authentication Blind Spot

Multi-factor authentication (MFA) was designed to close this gap, but phishing kits now allow attackers to sit between a user and the real login portal, proxying the authentication in real-time and stealing the session token issued after MFA succeeds.

The victim completes every security check exactly as intended, but the attacker walks away with the cookie that proves it. NIST Special Publication 800-207, the foundational framework for Zero Trust architecture, anticipated this problem and warns against relying on implied trustworthiness once a subject has met a base authentication level.

NIST Guidelines

The guidelines specify that access decisions should account for whether the device used for the request has the proper security posture. However, most organizations still treat authentication as a one-time check, with identity being verified, MFA passing, and a session beginning, with trust holding until the token expires.

Where Zero Trust Breaks Down

Most Zero Trust implementations have ended up being heavily identity-centric, focusing on strengthening authentication, enforcing MFA, reducing password reliance, and introducing risk-based sign-in policies. Device verification, meanwhile, is inconsistently applied, often stopping at the point of login or applying only to browser-based workflows.

Legacy protocols, remote access tools, and API integrations tend to inherit trust implicitly once identity has been established, resulting in a fragmented model. Personal and third-party devices may be loosely controlled or entirely unmanaged, with session trust persisting even if device posture degrades mid-session.

Device Security: The Other Half of the Answer

A stolen password used from an attacker-controlled laptop should not be treated the same as the same password used from an enrolled, encrypted, compliant corporate endpoint. Device posture answers questions that identity cannot, such as whether the device is encrypted, whether endpoint protection is active and healthy, and whether the operating system is patched.

These answers must stay current beyond the initial login and across the entire session. Continuous device verification reduces the value of stolen credentials and intercepted tokens, as access becomes bound not just to an identity, but to a trusted, healthy endpoint.

Four Principles for a Stronger Model

A more defensible approach combines identity with continuous device verification. This involves continuously verifying both the user and the device, binding access to approved hardware, applying proportionate enforcement, and enabling self-service remediation.

Solutions like Specops Device Trust operationalize this model by extending trust decisions beyond identity and maintaining enforcement as conditions change. It authenticates users and verifies their devices continuously across Windows, macOS, Linux, and mobile platforms, not just at the point of login.

Identity still matters, but it can no longer carry the full weight of an access decision on its own. By incorporating device security into the mix, organizations can create a more robust and resilient cybersecurity posture.


Source: BleepingComputer

Source: BleepingComputer

Powered by ZeroBot

Protect your website from bots, scrapers, and automated threats.

Try ZeroBot Free