Security Lead Path
Risk assessment, compliance, downgrade attacks, and phishing-resistant MFA strategy
You’re evaluating passkeys from a security perspective - assessing risk, building a phishing-resistant authentication strategy, making the compliance case, or figuring out how to retire the legacy credentials that undermine the whole effort.
Start with the shared foundations if you want the technical grounding. The IT Admin track covers the hands-on deployment work, and cross-links on each page will point you there when configuration details matter.
Start with the foundations
Go deep
Passkey Risk Assessment Framework
Evaluate passkey deployment risk vs the password status quo
Read →Downgrade Attacks
How attackers bypass passkeys via weaker enrolled methods
Read →Building a Phishing-Resistant MFA Strategy
End-to-end strategy beyond just deploying passkeys
Read →Compliance and Regulatory Alignment
Mapping passkeys to NIST, Zero Trust, and insurance requirements
Read →Credential Lifecycle and Hygiene
Planning the retirement of legacy credentials
Read →