Doovo Logo
Back to Blog

Zero Trust Executive Accounts: Why Password Sharing Must End

Executive accounts are a high-value identity surface, yet many organizations still govern them with shared passwords and informal delegation. This article explains why zero-trust principles should apply to executive communication infrastructure, and outlines a five-part model built on identity-based access, least privilege, continuous verification, audit logging, and revocation control.

Jesse Sacks-Hoppenfeld

Jesse Sacks-Hoppenfeld

Founder & CEO

Zero Trust Executive Accounts: Why Password Sharing Must End
💡
Most enterprises have implemented zero trust across infrastructure. Almost none have applied it to the identities that carry the most authority. That gap is now measurable. And increasingly, indefensible.

Zero trust was designed for exactly this problem: high-value identities operating in untrusted environments. Yet executive social media, messaging channels, and public communication accounts are still governed by informal practices. Shared passwords. Untracked delegation. No attribution.

The result is a system where the most visible identities are often the least controlled.


Definitions

📘
Zero Trust (ZT): A security model that assumes “no implicit trust granted to assets or user accounts” and requires continuous verification of every request (NIST, 2020).
📘
Zero Trust Architecture (ZTA): An enterprise cybersecurity plan that applies zero-trust principles across workflows, identities, and access policies (NIST, 2020).
📘
Credential Sharing: The disclosure of authentication secrets to another individual. NIST notes that technical controls are not designed to prevent willful sharing, making governance essential (NIST, 2025).
📘
Least Privilege: Access granted only to the minimum resources required to perform a task (NIST, 2020).
📘
Phishing-Resistant MFA: Authentication methods designed to prevent credential interception by malicious actors (OMB, 2022).

The Blind Spot in Zero Trust

Zero trust adoption is real. Gartner reports that 63% of organizations have implemented it in some form (Gartner, 2024).

But implementation is uneven.

Infrastructure is governed. Identities are not.

Executive accounts sit in a strange category:

  • They are public-facing
  • They often influence markets
  • They are used for material communication
  • They are frequently accessed by multiple people

Yet they are still treated like personal accounts.

This contradicts the core premise of zero trust.

NIST is explicit: trust cannot be granted based on ownership, location, or role (NIST, 2020). Every access request must be evaluated. Every identity must be verified.

Password sharing breaks that model entirely.


The Data Is Not Subtle

Identity is the dominant attack surface.

  • Stolen credentials are the top action variety in breaches at 24% (Verizon, 2024)
  • More than 99% of identity attacks are password-based (Microsoft, 2024)
  • Microsoft observes 600 million identity attacks per day (Microsoft, 2024)
  • Credential-based breaches take an average of 292 days to detect and contain (IBM, 2024)

This is not a niche issue.

It is the primary way organizations are compromised.

Now layer on executive accounts:

  • A single compromised account can influence markets or public perception (NYDFS, 2020)
  • The SEC’s official X account was compromised after MFA was disabled and credentials reset (SEC, 2024)

The pattern is consistent.

This is not a theoretical edge case. It is a systemic pattern across modern enterprises.

Identity failures at the top of the organization create outsized consequences. The cost of a single executive account breach makes the economics clear.


Why Password Sharing Fails Under Zero Trust

Password sharing introduces three structural failures.

1. Identity Collapse

Zero trust depends on unique identity.

PCI DSS requires that “all users are assigned a unique ID” to ensure accountability (PCI SSC, 2022).

Shared credentials erase that.

Five people using one login is not five identities. It is zero.

There is no attribution. No accountability. No traceability.

📘
Identity Collapse Risk: When shared credentials eliminate the ability to distinguish who is acting within a high-authority system. The result is not reduced security. It is the absence of identity governance entirely.

2. Infinite Privilege

Passwords grant full access.

There is no concept of scoped permissions:

  • Draft vs publish
  • Post vs message access
  • Content vs security settings

Least privilege does not exist in a shared-password model.

Everything becomes all-or-nothing.

3. No Verifiable Audit Trail

NIST warns that shared accounts increase risk specifically because of “lack of accountability” (NIST, 2020).

If something goes wrong:

  • You cannot determine who acted
  • You cannot reconstruct intent
  • You cannot prove compliance

For regulated organizations, this is not just a security issue.

It is a governance failure. The compliance gap in executive social media documents this in detail.


The Zero Trust Executive Communication Model

At the executive layer, communication is not just content. It is identity, authority, and control.

That requires its own security model.

Not a workaround. Not a policy memo.

A system.

1. Identity-Based Access

Every individual accessing an executive account must use their own identity.

No shared credentials.

This aligns with zero trust’s requirement for identity-driven access decisions (NIST, 2020).

In practice:

  • Assistants authenticate as themselves
  • Comms teams authenticate as themselves
  • Executives authenticate as themselves

The system knows exactly who is acting.

2. Least Privilege Delegation

Not everyone needs full access.

An assistant may need to:

  • Draft content
  • Schedule posts

They likely do not need:

  • Direct message access
  • Security settings

Zero trust requires access to be minimized per task (NIST, 2020).

Delegation becomes granular, not binary.

3. Continuous Verification

Access is not a one-time event.

OMB’s zero trust strategy requires “continual verification of each user, device, application, and transaction” (OMB, 2022).

Applied to executive accounts:

  • New device → re-authentication
  • Unusual behavior → step-up verification
  • High-impact actions → additional controls

Trust is never permanent.

4. Audit Logging and Attribution

Every action must be attributable to a specific identity.

This is not optional.

SOC 2, PCI DSS, and NIST all reinforce traceability as a core requirement.

A compliant system answers:

  • Who posted this
  • From where
  • Using what device
  • Under what authorization

Shared passwords cannot answer any of these.

5. Instant Revocation Control

Access must be revocable immediately.

When someone leaves:

  • Their access is removed centrally
  • No password rotation is required
  • No residual access remains

ISO 27001 and SOC 2 both require rapid access revocation on role change or termination (ISO 27001). The offboarding risk in executive social media shows what happens when this fails.

Password sharing fails here as well.

Once a password is shared, it is effectively permanent.


Case Evidence: Identity Failures Scale Fast

Theoretical risk is not the issue. Observed failure is.

SEC X Account Hack (2024)

  • MFA was disabled
  • Phone number was compromised via SIM swap
  • Password reset granted full access (SEC, 2024)

Result: false market-moving announcement and immediate price volatility.

The issue was not infrastructure. It was identity governance.

MGM Resorts Breach (2023)

  • Attack began with a 10-minute phone call
  • Help desk reset credentials based on weak identity verification
  • MFA was bypassed (MGM 8-K)

Result: $100 million impact and 10 days of operational disruption.

Again, not a network failure. An identity failure.


The Regulatory Shift

This is moving into compliance territory.

  • FTC Safeguards Rule requires MFA and access controls for authorized users (FTC, 2023)
  • SEC requires disclosure of material cybersecurity incidents within four business days (SEC, 2023)
  • OMB mandates phishing-resistant MFA for federal systems (OMB, 2022)

Executive accounts are increasingly considered:

  • Material communication channels
  • Reputation-critical assets
  • Potential disclosure vectors

If an executive account is used to communicate with investors, customers, or the public, it is not a personal account.

It is a governed system.


The Real Constraint: Behavior, Not Technology

NIST is clear on one uncomfortable point: few technical controls can prevent willful credential sharing (NIST, 2025).

This is not purely a tooling problem.

It is a system design problem.

Organizations allow password sharing because:

  • It is fast
  • It is familiar
  • It avoids friction

But that friction is not arbitrary.

It is the cost of accountability.

Zero trust does not remove friction.

It replaces unmanaged friction with controlled, auditable processes.

The alternative to password sharing is not restriction. It is governed delegation.


Addressing the Objections

“Zero trust slows executives down”

Sometimes.

But breach recovery slows organizations far more.

IBM reports the average breach costs $4.88 million globally (IBM, 2024).

Speed without control is not efficiency. It is deferred risk.

“Basic MFA is enough”

Only if it is consistently enforced.

The SEC example shows what happens when it is not.

And even then, phishing-resistant MFA is increasingly required for high-risk identities (OMB, 2022).

“Shared access is necessary”

In some cases, yes.

NIST and PCI DSS allow shared accounts under strict conditions (NIST SP 800-53; PCI DSS v4.0).

But the default posture is clear:

  • Unique identities
  • Controlled exceptions
  • Full attribution

Most organizations are operating in reverse.


Key Takeaways

  • Zero trust requires identity-level control. Password sharing violates that foundation.
  • Stolen credentials remain the most common breach vector, with the longest detection time.
  • Executive accounts are high-impact assets but are often governed informally.
  • Shared credentials eliminate accountability, least privilege, and auditability.
  • A zero-trust model for executive communication is achievable through identity-based access and delegated control.

The Structural Reality

Executive communication has changed.

It is no longer peripheral.

It is continuous, public, and high-impact.

As Doovo frames it, and the governance model establishes: influence is now a system, not an activity.

Systems require governance.

Zero trust already defines the standard for governance.

The only question is whether executive accounts are included.


Conclusion

Zero trust executive accounts are not a future concept.

They are a missing application of an existing standard.

The principles are already established:

  • No implicit trust
  • Identity-first access
  • Continuous verification
  • Full attribution

The data is already clear:

  • Credentials are the primary attack vector
  • Identity failures drive the largest breaches
  • Executive accounts amplify impact

What remains is alignment.

Most organizations have secured their infrastructure.

They have not secured their leadership layer.

Zero trust has already redefined infrastructure security. The next step is applying it to the identities that actually move markets.


For a comprehensive view of how executive thought leadership connects to governance and security, see the Executive Thought Leadership Guide.

Get the latest articles in your inbox.

Sign up now.

* Required Fields