The server logs told the truth. Someone had accessed the system using valid credentials, but the activity was wrong. Password rotation policies caught nothing. The credentials were still “fresh” according to policy. Risk-based access would have stopped it.
Password rotation policies are built on a single assumption: passwords get weaker over time. Rotating them limits exposure if they leak. But this model is blunt. Attackers work fast. A stolen password can be used within seconds. Rotation every 90 days changes nothing in that window. It may even increase risk by pushing users toward weaker choices or repeated patterns, which are easier to crack.
Risk-based access does not wait for a calendar date. It evaluates every login in real time. It uses context: device fingerprint, IP reputation, geo-location, session behavior, and access history. If the system sees a login from an unfamiliar device in an unusual country, it can block, challenge, or limit privileges instantly. No waiting for next rotation. No reliance on human memory. Enforcement is intelligent rather than arbitrary.