The Problem of Securing Consumer Identities


A number of companies I’ve labored with lately have had the misfortune of being victims of cybersecurity incidents. Whereas these incidents are available in many kinds, there’s a frequent thread: all of them began with a compromise of consumer identification.

Why Identities are Focused

Identification safety—whether or not it includes usernames and passwords, machine names, encryption keys, or certificates—presents an actual problem. These credentials are wanted for entry management, guaranteeing solely licensed customers have entry to programs, infrastructure, and information. Cybercriminals additionally know this, which is why they’re continually attempting to compromise credentials. It’s why incidents corresponding to phishing assaults stay an ongoing drawback; getting access to the suitable credentials is the foothold an attacker wants.

Makes an attempt to compromise identification do go away a path: a phishing e mail, an tried logon from an incorrect location, or extra refined indicators such because the creation of a brand new multifactor authentication (MFA) token. Sadly, these items can occur many days aside, are sometimes recorded throughout a number of programs, and individually could not look suspicious. This creates safety gaps attackers can exploit.

Fixing the Identification Safety Problem

Identification safety is advanced and tough to deal with. Threats are fixed and lots of, with customers and machines focused with more and more progressive assault strategies by targeted cyberattackers. A compromised account will be extremely priceless to an attacker, providing hard-to-detect entry that can be utilized to hold out reconnaissance and craft a focused assault to deploy malware or steal information or funds. The issue of compromised identities is barely going to develop, and the affect of compromise is important, as in lots of circumstances, organizations should not have the instruments or data to take care of it.

It was the problem of securing consumer identities that made me leap on the likelihood to work on a GigaOm analysis undertaking into identification risk detection and response (ITDR) options, offering me with an opportunity to study and perceive how safety distributors might assist deal with this advanced problem. ITDR options are a rising IT trade pattern, and whereas they’re a self-discipline reasonably than a product, the pattern has led to software-based options that assist implement that self-discipline.

The right way to Select the Proper ITDR Answer

Answer Capabilities
ITDR instruments deliver collectively identity-based risk telemetry from many sources, together with consumer directories, identification platforms, cloud platforms, SaaS options, and different areas corresponding to endpoints and networks. They then apply analytics, machine studying, and human oversight to search for correlations throughout information factors to supply perception into potential threats.

Critically, they do that shortly and precisely—inside minutes—and it’s this pace that’s important in tackling threats. Within the examples I discussed, it took days earlier than the identification compromise was noticed, and by then the injury had been executed. Instruments that may shortly notify of threats and even automate the response will considerably scale back the chance of potential compromise.

Proactive safety that may assist scale back threat within the first place provides further worth. ITDR options will help construct an image of the present surroundings and apply threat templates to it to focus on areas of concern, corresponding to accounts or information repositories with extreme permissions, unused accounts, and accounts discovered on the darkish internet. The safety posture insights offered by highlighting these considerations assist enhance safety baselines.

Deception know-how can be helpful. It really works by utilizing faux accounts or assets to draw attackers, leaving the true assets untouched. This reduces the chance to precise assets whereas offering a helpful solution to research assaults in progress with out risking priceless property.

Vendor Strategy
ITDR options fall into two fundamental camps, and whereas neither strategy is healthier or worse than the opposite, they’re more likely to enchantment to completely different markets.

One route is the “add-on” strategy, often from distributors both within the prolonged detection and response (XDR) house or privileged entry administration (PAM) house. This strategy makes use of present insights and applies identification risk intelligence to them. For organizations utilizing XDR or PAM instruments already, including ITDR to will be a gorgeous possibility, as they’re more likely to have extra strong and granular mitigation controls and the potential to make use of different components of their answer stack to assist isolate and cease assaults.

The opposite strategy comes from distributors which have constructed particular, identity-focused instruments from the bottom up, designed to combine broadly with present know-how stacks. These instruments pull telemetry from the prevailing stacks right into a devoted ITDR engine and use that to focus on and prioritize threat and doubtlessly implement isolation and mitigation. The flexibleness and breadth of protection these instruments supply could make them engaging to customers with broader and extra advanced environments that wish to add identification safety with out altering different parts of their present funding.

Subsequent Steps

To study extra, check out GigaOm’s ITDR Key Standards and Radar studies. These studies present a complete overview of the market, define the standards you’ll wish to think about in a purchase order resolution, and consider how quite a few distributors carry out towards these resolution standards.

Should you’re not but a GigaOm subscriber, enroll right here.



Recent Articles

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Stay on op - Ge the daily news in your inbox