Most MSPs don’t get popped because of some cinematic zero‑day. They get popped because one technician’s credentials are phished, a shared VPN drops them into a flat client network, and their tools do exactly what they were designed to do — only under an attacker’s control. The real perimeter isn’t the firewall anymore; it’s your “trust surface”: identities, VPN and remote‑access paths, and cross‑tenant privileges that decide who can go where, and how far they can move when something goes wrong.
In 2026, that trust surface is either designed on purpose — or it’s defined by the easiest path an attacker can find.
When Your Trust Surface Becomes the Attack Surface
Picture an ordinary Tuesday night. A senior tech answers a convincing “urgent ticket” email, approves a fake MFA prompt on their phone without thinking, and goes back to work. Somewhere else, a new session lights up in your RMM, driven by someone who isn’t your tech.
From there, the attack almost writes itself. The adversary:
-
Uses the tech’s existing permissions to log into your multi‑tenant RMM.
-
Pushes “maintenance” scripts to disable AV/EDR on a subset of client endpoints.
-
Connects through a shared VPN into one client’s flat server network.
-
Targets backup servers and domain controllers first, then times ransomware detonation for the weekend.
No exploits, no fancy malware up front — just valid credentials, implicit trust, and broad, unsegmented access. That’s what “trust surface” looks like when it works against you.
Today’s MSP threat reports and breach writeups keep circling the same point: attackers are moving away from highly technical perimeter exploits and toward abusing identities, misconfigured VPNs, and always‑on remote access. They don’t need to punch through your edge if your trust model quietly invites them in.
How Attackers Abuse the MSP Trust Surface
There are three main levers attackers love in MSP environments: valid identities, legacy VPNs, and cross‑tenant sprawl.
Valid identities as primary weapons
For an attacker, a valid MSP technician account is better than a zero‑day:
-
It often comes with access to RMM, PSA, cloud consoles, and multiple client environments.
-
It blends into normal activity — logins, scripts, remote sessions — so basic monitoring doesn’t blink.
-
It tends to sit in high‑privilege roles, because “we’ll lock that down later” has been the default for years.
Those credentials can be stolen via phishing, password reuse, infostealers on unmanaged devices, or token/session theft. Once the adversary is in, the environment itself becomes the exploit.
Legacy VPNs and flat remote access
Traditional VPN designs drop users into big, flat subnets once they’ve authenticated. In MSP land, that often looks like:
-
Shared VPN appliances that connect the MSP network into multiple client networks.
-
Static credentials that rarely change, with basic or no MFA.
-
Network‑level access that lets a logged‑in user probe and pivot freely.
From an attacker’s point of view, a VPN is a “trust hose”: as soon as they’re through, they can spray that trust anywhere inside the connected network. Combine that with a compromised tech identity and you’ve created an exceptionally efficient lateral‑movement engine.
Cross‑tenant sprawl in MSP tools
Multi‑tenant tools — RMM, M365/Entra, Intune, SASE platforms — are what let you manage dozens or hundreds of clients from one place. They’re also what make a single compromise so dangerous.
Common patterns include:
-
Global “Super Admin” roles that can touch every tenant and every policy.
-
Shared service accounts reused across clients for convenience.
-
Weak role design where “tech” effectively means “full control anywhere.”
In that world, breaching your central management plane is almost the same as breaching every client at once.
Redefining the Perimeter: Identity, VPN, and Tenant Isolation
The answer isn’t “more firewalls.” The answer is to redefine your perimeter in terms of trust itself: who’s allowed to do what, from where, and under which conditions.
Identity as the real perimeter
Start by assuming identity is your first — and sometimes only — line of defense:
-
Every privileged action should tie back to a specific human or service identity.
-
No individual identity should have standing, always‑on access to every tenant.
-
All admin identities should live in your own identity provider, with strong MFA and conditional access, not scattered as local admins across client systems.
That means consolidating MSP staff accounts in a dedicated IdP, enforcing MFA by policy, and making “least privilege” a default, not an exception you apply only when something goes wrong.
From “network access” to “app access”
Next, upgrade your mental model for remote access. Instead of “once you’re on the VPN, you’re in,” you want:
-
Per‑app or per‑service access: technicians connect only to the specific resource they need (e.g., a management portal, a particular server), not an entire subnet.
-
Session‑specific access: scoped and time‑boxed for the task at hand instead of persistent tunnels left open for convenience.
-
Identity‑ and device‑aware checks: decisions based not just on username and password, but also on device health, location, and risk signals.
Zero trust and SASE/ZTNA platforms are just longer names for this idea: treat every request as suspect, and grant the smallest, shortest‑lived access that will get the job done.
Tenant isolation as a non‑negotiable
Finally, you need to treat each client as its own blast radius:
-
Separate tenants logically in your management tools, identity delegations, and network paths.
-
Avoid shared admin accounts that can directly reach multiple client environments.
-
Use role‑based access control so techs see only the tenants they are assigned, with clearly defined limits on what they can do inside each.
Tenant isolation is not just about spinning up multiple consoles. It’s about designing roles, workflows, and approvals so that the default behavior is safe — even when someone makes a mistake.
A Reference Architecture for a Safer Trust Surface
Putting this together, what does a more defensible MSP trust surface look like in practice?
Central identity, per‑tenant access
At a high level:
-
MSP staff identities live in your central identity provider. Admin roles are defined there, with mandatory MFA and conditional access.
-
Those identities are delegated into client tenants with least‑privilege roles — never by directly creating generic admin accounts in client environments.
-
Access to client resources flows through per‑tenant gateways (VPN, ZTNA, SASE) instead of a single shared tunnel.
The result: compromising one technician account gives an attacker a specific, auditable set of options, not a skeleton key to your whole client base.
Multi‑tenant management with scoped roles
Your RMM, cloud admin, and device‑management tools are still central — but the way you grant access changes:
-
Roles are scoped per tenant or per group of tenants (e.g., by region or vertical), not “all clients.”
-
Highly privileged actions — like changing security policies, modifying backups, or running scripts across many endpoints — go through just‑in‑time elevation, ideally via a privileged access management (PAM) layer.
-
Every action is logged with tenant, user, and session context so you can trace and contain suspicious activity quickly.
Session‑level risk controls
Because sessions, not just identities, can be compromised, you also want:
-
Device posture checks and certificate‑based trust for high‑risk roles and tasks.
-
Micro‑segmentation inside client networks so that even a successful breach lands in a small zone, not the entire environment.
-
Alerts keyed to suspicious cross‑tenant behavior, like a tech suddenly interacting with multiple unrelated tenants, mass policy edits, or widespread script pushes.
Operational Guardrails So One Account Can’t Wreck Everything
Architecture sets the shape of your trust surface, but daily practice decides whether it holds.
A few pragmatic guardrails make a disproportionate difference:
-
Budget your blast radius. For each role, ask: “If this account is compromised, what’s the worst it can do?” Then adjust roles so no single account can cause a multi‑client catastrophe without extra approvals or just‑in‑time elevation.
-
Make strong MFA non‑negotiable. Every account with remote‑access or admin capabilities must use strong MFA — ideally with protections against push fatigue and phishing, such as number matching or hardware keys. If a vendor or client pushes back, that’s a governance conversation, not a technical one.
-
Standardize remote‑access patterns. Ban shadow IT like unmanaged remote‑control tools, open RDP, or ad‑hoc VPNs. Pick a small number of access patterns you can secure and monitor well, and require everything to go through those.
-
Manage tenant access like a change‑controlled asset. Maintain a living map of which techs can touch which tenants and with what permissions. Review it regularly, and make revocation automatic when people change roles or leave.
A 60–90 Day Plan to Clean Up Your Trust Surface
You don’t have to refactor everything overnight. You do need deliberate momentum. A practical plan might look like this:
-
Weeks 1–2: Map and triage.
-
Inventory staff identities, remote‑access methods, RMM roles, and cross‑tenant links.
-
Flag “one ring” accounts, shared VPNs, and unmanaged remote tools as top risks.
-
-
Weeks 3–4: Close the obvious gaps.
-
Turn on and enforce MFA everywhere you can, starting with admin and remote‑access accounts.
-
Remove or constrain global roles in your management tools; start moving toward least‑privilege defaults.
-
Shut down or replace the most dangerous access paths: open RDP, generic VPNs without MFA, legacy tools you can’t monitor.
-
-
Months 2–3: Pilot the new model.
-
Pick a subset of clients and a small group of techs to pilot per‑tenant access, improved role design, and just‑in‑time elevation.
-
Refine your policies based on where friction appears, without sacrificing the core principles.
-
By the end of that window, you won’t have a perfect zero‑trust implementation. You will have reshaped the places where trust concentrates in your business — identities, VPNs, and tenant privileges — into something that’s far harder to abuse at scale.
That’s the real perimeter for modern MSPs. Everything else is implementation detail.
Additional Sources:
ConnectWise 2026 MSP Threat Report Spotlights How Identity Abuse is Redefining MSP Risk
Securing remote access for your MSP clients
Strategies for Tenant Data Isolation in SaaS Applications
Zero Trust in an MSP World: What’s Real, What’s Achievable, and What’s Just Fluff