{"id":2033,"date":"2022-03-28T15:35:42","date_gmt":"2022-03-28T22:35:42","guid":{"rendered":"https:\/\/live-rsa-hub.pantheonsite.io\/?p=2033"},"modified":"2023-11-07T15:34:37","modified_gmt":"2023-11-07T20:34:37","slug":"securing-the-identity-lifecycle-part-2-resets-and-fail-safes","status":"publish","type":"post","link":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","title":{"rendered":"Absicherung des Identit\u00e4tslebenszyklus Teil 2: Zur\u00fccksetzen und Ausfallsicherheit"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>Bedrohungsakteure bevorzugen Angriffe, die MFA-R\u00fccksetzungen, fehlgeschlagene \u00d6ffnungen und andere Momente mit einem hohen Grad an Ver\u00e4nderung ausnutzen, um Zugang zu erhalten. Erfahren Sie Best Practices, wie Sie diese Angriffe verhindern, Ihr Unternehmen sichern und den Zugang f\u00fcr Ihre Benutzer vereinfachen k\u00f6nnen. <\/p>","protected":false},"author":2,"featured_media":3189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-2033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-multi-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Identity Lifecycle Part 2: Resets and Fail-Safes - RSA<\/title>\n<meta name=\"description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\" \/>\n<meta property=\"og:description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/\" \/>\n<meta property=\"og:site_name\" content=\"RSA\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-28T22:35:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-07T20:34:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda O&#039;Connor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\" \/>\n<meta name=\"twitter:description\" content=\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"},\"author\":{\"name\":\"Melinda O'Connor\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\"},\"headline\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\",\"datePublished\":\"2022-03-28T22:35:42+00:00\",\"dateModified\":\"2023-11-07T20:34:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"},\"wordCount\":8,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"articleSection\":[\"Multi-Factor Authentication\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\",\"name\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes - RSA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"datePublished\":\"2022-03-28T22:35:42+00:00\",\"dateModified\":\"2023-11-07T20:34:37+00:00\",\"description\":\"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png\",\"width\":1200,\"height\":675,\"caption\":\"rsa-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/de\\\/resources\\\/blog\\\/multi-factor-authentication\\\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rsa.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"name\":\"RSA\",\"description\":\"Cybersecurity and Digital Risk Management Solutions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rsa.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#organization\",\"name\":\"RSA\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"contentUrl\":\"https:\\\/\\\/www.rsa.com\\\/wp-content\\\/uploads\\\/rsa.png\",\"width\":2880,\"height\":1020,\"caption\":\"RSA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rsa.com\\\/#\\\/schema\\\/person\\\/7bfb34a8ac65359b4984cd17bbc600e0\",\"name\":\"Melinda O'Connor\",\"sameAs\":[\"http:\\\/\\\/logical-inc.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Absicherung des Identit\u00e4tslebenszyklus Teil 2: Zur\u00fccksetzen und Ausfallsicherheit - RSA","description":"Bedrohungsakteure nutzen MFA-R\u00fccksetzungen, Fail-Opening und andere Momente aus, um sich Zugang zu verschaffen. Erfahren Sie, wie Sie dies verhindern k\u00f6nnen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","og_locale":"de_DE","og_type":"article","og_title":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","og_description":"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.","og_url":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","og_site_name":"RSA","article_published_time":"2022-03-28T22:35:42+00:00","article_modified_time":"2023-11-07T20:34:37+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","type":"image\/jpeg"}],"author":"Melinda O'Connor","twitter_card":"summary_large_image","twitter_title":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","twitter_description":"Threat actors exploit MFA resets, fail opens, and other moments to gain access. Learn how to prevent them.","twitter_image":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa-og-image.jpg","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#article","isPartOf":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"},"author":{"name":"Melinda O'Connor","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0"},"headline":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes","datePublished":"2022-03-28T22:35:42+00:00","dateModified":"2023-11-07T20:34:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"},"wordCount":8,"publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","articleSection":["Multi-Factor Authentication"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","url":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/","name":"Absicherung des Identit\u00e4tslebenszyklus Teil 2: Zur\u00fccksetzen und Ausfallsicherheit - RSA","isPartOf":{"@id":"https:\/\/www.rsa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"image":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","datePublished":"2022-03-28T22:35:42+00:00","dateModified":"2023-11-07T20:34:37+00:00","description":"Bedrohungsakteure nutzen MFA-R\u00fccksetzungen, Fail-Opening und andere Momente aus, um sich Zugang zu verschaffen. Erfahren Sie, wie Sie dies verhindern k\u00f6nnen.","breadcrumb":{"@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#primaryimage","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/securid-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg.png","width":1200,"height":675,"caption":"rsa-blog-securing-securing-the-identity-lifecycle-part-2-resets-and-failsafes.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsa.com\/de\/resources\/blog\/multi-factor-authentication\/securing-the-identity-lifecycle-part-2-resets-and-fail-safes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsa.com\/"},{"@type":"ListItem","position":2,"name":"Securing the Identity Lifecycle Part 2: Resets and Fail-Safes"}]},{"@type":"WebSite","@id":"https:\/\/www.rsa.com\/#website","url":"https:\/\/www.rsa.com\/","name":"RSA","description":"L\u00f6sungen f\u00fcr Cybersecurity und digitales Risikomanagement","publisher":{"@id":"https:\/\/www.rsa.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsa.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.rsa.com\/#organization","name":"RSA","url":"https:\/\/www.rsa.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","contentUrl":"https:\/\/www.rsa.com\/wp-content\/uploads\/rsa.png","width":2880,"height":1020,"caption":"RSA"},"image":{"@id":"https:\/\/www.rsa.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.rsa.com\/#\/schema\/person\/7bfb34a8ac65359b4984cd17bbc600e0","name":"Melinda O'Connor","sameAs":["http:\/\/logical-inc.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/comments?post=2033"}],"version-history":[{"count":7,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2033\/revisions"}],"predecessor-version":[{"id":27139,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/posts\/2033\/revisions\/27139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media\/3189"}],"wp:attachment":[{"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/media?parent=2033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/categories?post=2033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsa.com\/de\/wp-json\/wp\/v2\/tags?post=2033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}