Skip to main content
Vol. I · No. 1

The Identity at the Core

The Definitive Chronicle of Identity & Access Management

Breach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO productsBreach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO products

BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint

CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately

BREACH: European fintech platform leaks OAuth tokens affecting 890K users

Topic

Cloud IAM

AWS, Azure, GCP. Same problems with three different naming conventions.

Cloud IAM is the set of identity primitives each major cloud provider exposes — AWS IAM, Azure (Entra) RBAC, GCP IAM — plus the cross-cloud capabilities that have become tablestakes: federated workforce access, workload identity for service-to-service auth, secrets management, and detective controls (CloudTrail, Entra audit logs, GCP audit logs). Each provider models the same problems differently, and the gap between "permissions configured" and "least privilege actually achieved" is where most cloud breaches happen.

The hardest parts in practice are policy authoring at scale (intent expressed in JSON or Bicep is hard to review), workload identity federation (replacing static keys with short-lived tokens), and detection engineering against IAM-specific attack paths — privilege escalation via PassRole, service-principal abuse, OAuth-token theft, role-trust misconfigurations.

This page tracks our reporting on cloud IAM tooling (Sympatic, Branch, Wiz, Permiso, Common Fate, Okta Identity Threat Protection), real breach analyses, and policy patterns vetted in production.

Coverage

No posts yet under this topic.

We're writing. In the meantime, follow our breach feed or CVE dashboard for live intelligence.