If you can’t explain something simply, you don’t understand it well enough.
We all know the Feynman Technique—"If you can’t explain something simply, you don’t understand it well enough."
Yet, in cybersecurity, we often do the opposite: overcomplicate things. And it starts with failing to define the basics correctly. One of the most glaring examples of this is the confused taxonomy of identity security.
Before you say, “Wait a minute, we already have definitions!”—I agree. NIST 800-63-3 lays out digital identity standards in great detail. But in practice, we blur the lines between what is an account and what is a credential. This leads to incorrect claims—like calling an OAuth token an identity (or account).
Let’s clear up this confusion:
That’s it—three core concepts that, when mixed up, create real security blind spots.
If we agree on this taxonomy, the next logical step is: What should enterprises focus on? We believe there are three critical areas for any identity security program:
Tracking accounts should be straightforward: creation, updates, deletion, and changes to attributes or privileges. Done right, this reduces risks like:
While Zero Standing Privileges (ZSP) is trending, foundational hygiene matters just as much. A weak foundation means attackers win.
Per NIST, credentials fall into three categories:
💡 MFA is simply using two or more of these types. Phishing resistance depends on whether at least one factor is high-assurance.
The key security risks in credential management include:
In a future post, we’ll dive into the third pillar—how to detect threats by analyzing activity patterns across accounts, credentials, and sessions.As the CTO of WideField Security, my job is to ensure our team not only understands these fundamentals but can explain them clearly and simply. I hope the broader industry can agree on a simple, effective taxonomy—because if we can’t even define identity properly, how can we expect to defend it?What do you think? Comment below or follow us on LinkedIn for more insights.