Security Lead Path

Risk assessment, compliance, downgrade attacks, and phishing-resistant MFA strategy

You’re evaluating passkeys from a security perspective - assessing risk, building a phishing-resistant authentication strategy, making the compliance case, or figuring out how to retire the legacy credentials that undermine the whole effort.

Start with the shared foundations if you want the technical grounding. The IT Admin track covers the hands-on deployment work, and cross-links on each page will point you there when configuration details matter.

Start with the foundations

Go deep

Report issue