Insight #1
According to Google, zero days being exploited in the wild jumped 50% last year. I just don't understand your thought process if you are not looking at control layers like Runtime Security to help detect and prevent these unknown vulnerabilities.
Insight #2
Did you know that most compliance frameworks do not require a specific type of Application Security (AppSec) testing, but may give some examples of activities you can do to meet the control? I really like how NIST 800-53 SA-11 gives "control enhancements" to satisfy that specific control but leaves it up to the person following the standard as to which enhancements they will use.
Insight #3
Multifactor authentication (MFA) bombing is a problem that has been exploited in the past. In a recent iteration, phishers bombarded Apple devices with dozens of system-level prompts in hopes of forcing a victim to accidentally click the wrong thing and approve one of the reset requests. This is one of the downfalls of push-button MFA approvals. However, some MFA is still better than no MFA.