The Industry Has Conflated Two Structurally Incompatible Security Problems
The assumption that workforce identity and customer identity can be managed by the same platform architecture, governed by the same policies, and defended by the same detection paradigm has become the source of systemic failure across enterprise security — from ransomware cascades to credential theft to silent data exfiltration across trust boundaries that should never have existed in the first place.
How the Industry Narrative Became Confused
The consolidation began reasonably: in the early 2000s, enterprises adopted centralised identity and access management (IAM) platforms — Active Directory, then OpenID Connect, SAML 2.0, OAuth 2.0 — to reduce friction. A single employee credential, one MFA device, one audit trail. From a usability standpoint, it was elegant. From a security standpoint, it was a critical architectural mistake that took a decade to expose.
The conflation deepened when cloud migration collided with the zero-trust narrative. Vendors like Okta, Ping Identity, and Microsoft Entra (née Azure AD) began positioning their platforms as universal identity substrates — able to bind workforce logins, customer authentication, partner federation, and API access under a single control plane. The economic logic was irresistible: one platform, one licensing model, one security operations centre managing everything. NIST SP 800-207 on zero trust was interpreted as "verify every identity, every time" rather than "assume different trust boundaries require different architectures."
Then the incidents arrived, and they revealed the flaw in detail.
In December 2023, the MOVEit zero-day (CVE-2023-34362) exposed the structural vulnerability of this architecture. Attackers exploited a remote code execution flaw in Progress Software's file transfer platform. But the real damage came from the fact that MOVEit instances often sat on the same network as, or fed data into, identity platforms that served both workforce and customer contexts. Once inside, attackers didn't need to compromise the identity provider directly — they could impersonate users, exfiltrate credentials from logs, and migrate laterally because the boundary between "employee doing their job" and "attacker acting as employee" was defined purely by cryptographic assertion, not architectural separation.
In September 2023, the Okta support case compromise illustrated the converse problem. Attackers gained access to Okta's support console — a workforce tool — and used it to enumerate customer tenants and forge access tokens for those tenants. The breach exposed that a single compromised node in the workforce identity tier could cascade into hundreds of customer identity contexts because they shared control-plane infrastructure, logging systems, and cryptographic key rotation policies.
Most recently, in 2024, the Snowflake tenant cascade incident (no CVE; configuration drift) revealed that when workforce identity (via Okta SSO) and customer data access (via the same SSO broker) converge at a single data plane, credential stuffing campaigns targeting workforce password managers can unlock access to petabytes of customer data. The cascade occurred because Snowflake customers had configured their identity provider to authenticate both their workforce and their software-as-a-service (SaaS) integrations using the same token family, same MFA policy, same session timeout. When attacker-controlled credential lists hit password sprayers, the compromised workforce credentials directly unlocked customer-facing data warehouses.
The common thread: every incident occurred because a control-plane security failure — a vulnerability, a misconfiguration, a compromised support access point — propagated immediately into the customer data plane because there was no architectural separation between the two contexts.
Why Standard Remediation Deepens the Problem
The industry response has been predictable and insufficient. Vendors have issued patches, advocates have issued frameworks (Okta Zero Trust Architecture, Microsoft Entra Security Hardening, Ping's API security best practices), and regulators have begun to act. The UK Financial Conduct Authority (FCA) began including identity and access control as a material component of the Senior Managers & Certification Regime (SM&CR) in 2023. The EU's Network and Information Security Directive 2 (NIS2) — which entered force on 18 October 2024 — explicitly mandates "access control and authentication procedures" as a core security measure, but does not distinguish between workforce and customer contexts. APRA's CPS 234 (released February 2023) demands "strong access controls" and "effective identity governance" but treats these as single requirements, not architectural decisions.
The standard remediation suite deepens the vulnerability:
Enhanced MFA: Okta and competitors have rolled out advanced MFA (passwordless FIDO2, biometric, certificate-based) across workforce and customer contexts. But MFA protects the authentication transaction, not the architectural boundary. When the MOVEit vulnerability was exploited, attackers didn't need to break MFA — they already had shell access. When Snowflake customers compromised their workforce credentials, MFA on the identity provider would have slowed the attack by minutes, not prevented it.
Conditional Access Policies: Microsoft Entra Conditional Access, Okta Adaptive Authentication — these tools layer policy rules (device compliance, location, time-of-day, risk scoring) atop the identity platform. But they operate within the same control plane as the identity assertion itself. If the control plane is compromised (as in the Okta support case), policy logic can be bypassed, disabled, or weaponised. A conditional access policy cannot defend against an attacker with write access to the policy store.
Advanced Threat Detection (SIEM + SOAR): The industry response to the Snowflake cascade was to advise customers to implement advanced logging and analytics — correlate Okta token issuance events with Snowflake login events, flag impossible travel scenarios, monitor for anomalous data query patterns. But this is detection-and-response architecture, not post-breach resistance. The compromise had already propagated before a security team could execute a playbook. By the time anomalies were visible in a SIEM, the exfiltration was complete.
None of these controls address the underlying structural failure: two trust contexts — workforce and customer — were unified at the control plane.
The Structural Problem Restated
Workforce identity and customer identity are fundamentally different security problems because they have different threat models, different trust boundaries, and different failure domains.
Workforce identity (Active Directory, LDAP, SAML 2.0 federation) assumes that employees are vetted, managed, and monitored — they have a physical office, a career consequence, background checks, and a department that owns their lifecycle. When a workforce credential is compromised, the blast radius is bounded by the organisation's internal systems and partner integrations under contract. The threat model assumes insider risk, supply-chain compromise, and workforce device breach — but not that every employee credential is a standing invitation to customer data.
Customer identity (OAuth 2.0 public clients, OpenID Connect, federated login) assumes the user is unvetted, ephemeral, and not subject to the organisation's employment relationship or physical security. A customer can create an account from anywhere, with minimal verification, and access only what that account is explicitly authorised to access. When a customer credential is compromised, the blast radius should be limited to that customer's own data — not lateral movement into workforce systems or other customer tenants.
The industry's unified IAM platforms — Okta, Entra, Ping — were designed to solve the "single login, everywhere" problem for usability. But they conflated two separate security requirements into one control plane. When that control plane is breached, both trust boundaries collapse simultaneously.
The PULSE Architectural Principle
Post-breach resistance requires architectural separation at the control plane, not merely policy layering on top of a unified substrate.
The principle is this: data planes serving different trust boundaries must have orthogonal control planes, derived from independent cryptographic substrates, with no shared secrets or key derivation paths.
In practice:
Workforce authentication should derive from a closed-loop system — AD, LDAP, or proprietary workforce directory — with physical security guarantees (managed devices, office network segmentation). Tokens issued from this context (SAML assertions, Kerberos tickets, OAuth access tokens) must be valid only within workforce perimeters and explicitly listed partner integrations. Token lifetime, scope, and revocation are governed by workforce lifecycle events (employment termination, role change, device deprovisioning).
Customer authentication should derive from a zero-knowledge substrate — the identity provider holds no persistent state about the customer beyond a cryptographic commitment. Customer login is transactional: verify proof-of-possession (password, FIDO2 public key, or time-limited one-time code), issue a short-lived token bound to the customer's specific data partition, and discard the session state. No credential caching, no token family reuse, no shared key material with workforce systems. If a customer token is compromised, the compromised scope is that customer's data alone.
API and partner access (neither workforce nor customer) requires a third authentication context: service-to-service authentication via mutually authenticated TLS, short-lived certificates, and zero stored secrets. Partner credentials should never be cached on customer-facing systems and should be refreshed on every transaction request.
Each context has a separate issuer, separate revocation mechanism, separate audit trail, and separate threat-response protocol. A compromise in the workforce control plane cannot cascade into customer data because the cryptographic key material, token validation logic, and access decision trees are completely orthogonal.
Implementation: Domain-Specific Primitives
This separation cannot be achieved by policy tuning within Okta, Entra, or Ping. It requires engineering different authentication substrates into the data plane itself.
Workforce context can remain federated via existing identity platforms, but tokens must be validated at the boundary of each workforce-connected system. The validation must include explicit whitelist checks: "Is this token from an authorised issuer?" (yes or no, not a policy decision). "Does this token's scope include access to this resource?" (explicit claim, not inferred). "What is the token's maximum age?" (cryptographically bound, not configurable).
Customer context requires a transactional authentication engine embedded in the application or API gateway serving customer requests. This engine:
- accepts only short-lived credentials (seconds to minutes, not hours)
- derives no shared state across login sessions
- binds each token to a specific customer data partition via cryptographic commitment, not access control list lookup
- invalidates every credential immediately after successful authentication (cannot be replayed)
- maintains zero persistent session state
API and partner context requires certificate-based mutual authentication with certificate pinning, no long-lived API keys, and per-request credential derivation (e.g., HMAC-SHA256 over request hash, derived from hardware security module (HSM)-stored key material, rotated hourly).
Regulatory and Operational Implications
The UK's Financial Conduct Authority, via SM&CR, now requires named individuals to take accountability for access control failures. The EU's NIS2, enforced October 2024, mandates "access control policies" with "regular assessment and enforcement." APRA CPS 234 requires "documented access control policies" and "regular review." None of these ask for unified identity platforms — they ask for controls that actually prevent breach. Architectural separation is not a compliance burden — it is compliance enablement.
The cost argument ("One platform is cheaper than three") inverts risk: a breach of one platform now risks everything. The operational argument ("Separate systems are harder to manage") becomes moot when domain-specific authentication primitives are engineered into the data plane — management is local, not centralised.
Closing
Organisations managing customer data or financial flows cannot afford unified identity control planes; they require orthogonal substrates for workforce, customer, and partner authentication contexts, each with independent cryptographic derivation, separate token lifecycles, and zero shared secrets. If your identity architecture allows a single compromised token or control-plane misconfiguration to cascade from workforce to customer data plane, your post-breach posture is not resistant — it is surrendered.
Qualified operators responsible for sovereign digital infrastructure in regulated sectors should request a technical briefing under executed mutual NDA to explore domain-specific identity architecture and deployment patterns.
Request a briefing under executed Mutual NDA.
PULSE engages only with verified counterparties. Strategic briefing material — reference architecture, regulatory mapping, deployment topology — is released after counter-execution of the NDA scoped to the recipient's evaluation purpose.
Request Briefing →