Site icon Spherical Cow Consulting

Standards vs. Reality: The Long Tail of Legacy Systems

tension between standards and reality is like balancing boards on top of each other and a ball

Arrow symbols in perfect balance and harmony over seesaw balance scales before defocused background. Horizontal composition.

From NHI to AI to Shared Signals, even in CIAM it comes back to standards versus reality.

Identity standards paint a perfect future: passwordless logins, verifiable credentials, and seamless trust. I love that picture; I want to frame it. Alas, legacy IAM, tight budgets, and a business case that still boils down to ‘but will customers complain?’ prevent us from getting there from here.

Nowhere is this tension more visible than in Consumer Identity and Access Management (CIAM). The security vs. usability tradeoff has always been a knife fight, and now we’re throwing in regulatory compliance, the rising costs of fraud, and the ever-present specter of “but our customers will complain.” So, let’s talk about what standards assume, where reality kicks in, and how organizations can actually make progress.

The Issue: Standards Define a Destination, But Legacy Systems Control the Journey

Standards bodies like NIST, ISO, and ETSI (under eIDAS2) have done their job: They’ve painted a picture of where we should be. The problem is that standards assume a level of infrastructure readiness that simply doesn’t exist in many organizations.

From a security perspective: Passwords are an outdated, high-risk authentication method. We should be moving toward passwordless logins, strong authentication, and identity federation. But if you’re running a legacy IAM system that predates modern best practices, you’re not just flipping a switch to make that happen.

From a business perspective: The cost of migration is non-trivial. Budgets are tight, and while security teams may want to modernize, getting executive buy-in requires proving a return on investment. “It’s more secure” is not a compelling business case, especially when ripping out legacy authentication systems means overhauling customer login experiences.

From a user perspective: Legacy authentication methods, for all their flaws, are familiar. Customers know how to enter a password (even if it’s “password123”). Introducing new login methods, such as passkeys, decentralized identity wallets, and multi-factor authentication, can introduce friction, and friction equals drop-off.


Standards define where we want to go—but legacy systems decide how fast we can get there. If your team is working through what’s actually feasible—or trying to stay ahead of standards while managing existing infrastructure—I can help you make sense of the trade-offs. 👉 See how I work or Let’s talk.


The Challenge in CIAM: Modernization Without Losing Customers

CIAM isn’t just a backend challenge, it’s a user experience challenge. Security teams might dream of a world where everyone uses phishing-resistant authentication, but if that world means adding too much friction, users will revolt.

Consider some of the “solutions” proposed:

Users hate complexity, and CIAM modernization efforts must balance security with the absolute necessity of seamless customer experience.

Standards vs. Reality: What Do They Assume?

Standards BodyFocus AreaRegulatory BackingWhat It AssumesReality Check
NIST (SP 800-63, etc.)Digital identity guidelines, authentication assuranceU.S. federal agencies must follow; widely referenced globallyOrganizations can implement strong authentication (MFA, passkeys, federation)Many consumer apps still struggle with basic 2FA adoption
ISO/IEC (24760, 29115, etc.)Identity management, authentication assurance frameworksTreaty-based; adopted by national governments and industryStandardized identity assurance will improve security across sectorsAdoption varies; private sector uptake is slow outside compliance-driven industries
ETSI (EN 319 411, etc.)Trust services, digital identity regulations (especially in the EU)Required for EU digital identity initiatives like eIDASInteroperability between EU countries will streamline identity verificationEach country implements differently, causing fragmentation and complexity
W3C (Verifiable Credentials, DID Core, etc.)Decentralized identity, privacy-enhancing authenticationNo regulatory backing; industry-drivenA privacy-first, user-controlled identity future is achievableAdoption is niche and fragmented; industry buy-in is inconsistent
IETF (SD-JWT, OAuth, etc.)Selective disclosure, token-based authenticationNo regulatory requirement but widely adopted in industryPrivacy-preserving JWTs will improve data minimization without breaking compatibilityAdoption is early-stage; requires infrastructure most orgs don’t yet have

How Do We Bridge the Gap? Migration Strategies for Legacy Systems

It’s easy to say “just modernize,” but for organizations dealing with decades of technical debt, it’s not so simple. Here’s what is more likely to work:

Instead of a risky rip-and-replace, introduce new authentication methods alongside legacy systems:

Hybrid IAM: Layer Modern Authentication on Top of Legacy Systems

Most organizations can’t replace their IAM stack overnight, so extend it instead:

Use Regulatory Compliance as a Modernization Lever

Regulations often force organizations to upgrade security; use them to drive investment:

Design for Customers, Not Just Security

Users resist change—modernization efforts need to be seamless, not disruptive:

Final Thoughts: Standards Are Great for Tomorrow, But Reality Wins Today

Standards define the future. But businesses don’t live in the future—they live in budget cycles, tech debt, and customer expectations. Modernizing CIAM isn’t about ‘just implementing passwordless’—it’s about navigating the messy in-between. The real challenge? Making progress without breaking what still (sort of) works.

So, next time someone says, “just implement passwordless authentication,” remind them: standards define where we want to go, but legacy systems dictate how fast we can get there.

🔹 Want more posts like this? Subscribe and get new insights delivered straight to your inbox.

Exit mobile version