You can build a technically strong authentication system and still lose accounts.
Not because your crypto is weak.
Because your support and recovery paths bypass everything you built.
The uncomfortable truth
Most compromises do not start with breaking encryption.
They start with persuading a human being.
Many modern threat campaigns target help desks specifically to learn the reset process and then use it to take over accounts.
Vendors and incident reports keep repeating the same theme: social engineering is a primary path into “secure” systems.
If your support team can “restore access” after a chat or a call, then your authentication is not your authentication system.
It is your support process.
Why this happens (and why it is not a support problem)
Support teams exist to reduce friction and resolve incidents quickly. That is their job.
Attackers exploit exactly that: urgency, empathy, and the desire to be helpful.
So the goal is not to “train support better” (you should, but it is not enough).
The goal is to design a system where support cannot grant access on its own.
Principle: support should not grant access, support should trigger proof
A mature design treats recovery and overrides as security-critical operations, not customer service operations.
Support can:
- verify that a request exists
- guide the user
- trigger a recovery flow
Support cannot:
- set a new credential
- disable MFA
- transfer ownership
- grant privileged access
Unless the system itself confirms it through a strong, user-controlled proof.
Mitigation patterns used in mature environments
1) Make recovery require phishing-resistant step-up
If an attacker can complete recovery through email, SMS, or “knowledge-based” questions, then recovery becomes the easiest path.
Security frameworks increasingly emphasize phishing-resistant authentication for high-risk actions.
Practical implication: treat recovery as a high-risk action that requires the strongest available factor, not the weakest.
2) Separate duties for high-impact overrides
If one person can initiate and complete an override, attackers only need to compromise one human process.
Separation of duties is a classic control for emergency access: initiation, approval, and use should be separated where possible.
This pattern is not “bureaucracy”. It is how you prevent a single conversation from becoming a full takeover.
3) Use just-in-time access instead of standing privileges
Many mature orgs avoid permanent elevated access. They grant it temporarily, with clear scope and auditable justification.
Google Cloud documents patterns for temporary elevated access and explicitly recommends recording the user justification for auditing.
This reduces the blast radius of both mistakes and social engineering.
4) Treat emergency access (break-glass) as a controlled procedure
Emergency access accounts exist because lockouts happen. But they must be managed like explosives:
- separate identities
- strict monitoring
- dedicated secure workstations
- clear auditing
Microsoft’s guidance for emergency access accounts includes using designated secure workstations (Privileged Access Workstation) for those accounts.
5) Require explicit customer-controlled consent for vendor/support access
If your vendor can access your tenant by default, you are delegating your security posture.
In mature setups, support access is explicit and time-bound, often requiring customer-side action to grant or approve access. (Example mechanics exist in major identity vendors’ support workflows.)
6) Be honest about phone-based recovery
SIM swapping is not theoretical. It is social engineering against carriers, and it exists because phone numbers are not strong identity anchors.
If your recovery assumes “phone = proof”, you are inheriting a risk model outside your control.
What to implement first (high leverage)
If you have limited time, start here:
- Remove any support capability that directly grants access.
- Make recovery require strong step-up for high-risk actions.
- Add separation of duties for administrative overrides.
- Add just-in-time access with justification and audit logs.
- Create a monitored emergency access procedure for true lockouts.
Closing thought
A login screen does not define your authentication.
Your recovery and support override paths do.
If those paths can be completed through persuasion alone, then your strongest security properties are optional.
Top comments (6)
Great article, Anton! I have a question regarding the future of account recovery You’ve pointed out that support is the 'weakest link' because it acts as a centralized human backdoor. Have you explored the potential of Decentralized Identity (DID) and Self-Sovereign Identity (SSI) to solve this? In these models, the concept of a 'support desk' for account recovery is replaced by protocol-level mechanisms like Social Recovery (where trust is distributed among a user’s social graph) or cryptographic guardians. Do you believe moving away from 'Corporate-managed recovery' toward 'Algorithmically-enforced recovery' is the only way to truly close this security gap, or are the UX trade-offs too high for mainstream users?
Thanks, Sharon - that is a very fair question.
The article is less about choosing a specific recovery technology and more about a design principle.
Once any human process can directly grant access, the system becomes vulnerable to persuasion, no matter how strong the cryptography is.
Decentralized or algorithmic recovery models may help in some cases, but they also introduce new complexity and failure modes.
For me, the key point is simpler: support should never be able to give access - only to trigger a flow where the system verifies proof.
How that proof is implemented is an open design space.
Your points around DID, SSI, and social recovery are very interesting and clearly point toward a deeper research space.
I would be very curious to learn more - do you happen to have any research, case studies, or real-world data around these approaches? The solutions you mentioned are genuinely interesting.
Thanks for such an open-minded response, Anton!
To be honest, I’m not a professional researcher or an engineer myself — just a huge tech enthusiast. I have a few friends from the Polytechnic University who are deep into the 'decentralization' rabbit hole, and I’ve picked up some of these ideas from our long discussions.
It is genuinely a pleasure to read such an open and thoughtful response - this is truly valuable.
Many strong ideas are born in real discussions rather than from formal roles or titles alone. Thank you for sharing your experience and reflections.
I would be glad to continue the conversation; for me, truth emerges precisely through dialogue.
I believe the directions and methodologies you touched on are highly relevant and have the potential to be genuinely beneficial to society.
Thank you very much, Sharon!
Thanks
I also summarized this into a practical support & account recovery security checklist here: Support & Account Recovery Security Checklist (B2B SaaS)
Some comments have been hidden by the post's author - find out more