The Problem of Securing Consumer Identities


A number of companies I’ve labored with just lately have had the misfortune of being victims of cybersecurity incidents. Whereas these incidents are available many types, there’s a frequent thread: all of them began with a compromise of consumer identification.

Why Identities are Focused

Identification safety—whether or not it includes usernames and passwords, machine names, encryption keys, or certificates—presents an actual problem. These credentials are wanted for entry management, guaranteeing solely approved customers have entry to techniques, infrastructure, and information. Cybercriminals additionally know this, which is why they’re consistently attempting to compromise credentials. It’s why incidents corresponding to phishing assaults stay an ongoing downside; getting access to the suitable credentials is the foothold an attacker wants.

Makes an attempt to compromise identification do go away a path: a phishing e mail, an tried logon from an incorrect location, or extra refined indicators such because the creation of a brand new multifactor authentication (MFA) token. Sadly, this stuff can occur many days aside, are sometimes recorded throughout a number of techniques, and individually could not look suspicious. This creates safety gaps attackers can exploit.

Fixing the Identification Safety Problem

Identification safety is advanced and tough to deal with. Threats are fixed and lots of, with customers and machines focused with more and more revolutionary assault strategies by targeted cyberattackers. A compromised account could be extremely precious to an attacker, providing hard-to-detect entry that can be utilized to hold out reconnaissance and craft a focused assault to deploy malware or steal information or funds. The issue of compromised identities is just going to develop, and the affect of compromise is critical, as in lots of instances, organizations would not have the instruments or information to take care of it.

It was the problem of securing consumer identities that made me leap on the probability to work on a GigaOm analysis undertaking into identification menace detection and response (ITDR) options, offering me with an opportunity to study and perceive how safety distributors might assist tackle this advanced problem. ITDR options are a rising IT business pattern, and whereas they’re a self-discipline somewhat than a product, the pattern has led to software-based options that assist implement that self-discipline.

Easy methods to Select the Proper ITDR Answer

Answer Capabilities
ITDR instruments carry collectively identity-based menace telemetry from many sources, together with consumer directories, identification platforms, cloud platforms, SaaS options, and different areas corresponding to endpoints and networks. They then apply analytics, machine studying, and human oversight to search for correlations throughout information factors to offer perception into potential threats.

Critically, they do that shortly and precisely—inside minutes—and it’s this pace that’s important in tackling threats. Within the examples I discussed, it took days earlier than the identification compromise was noticed, and by then the harm had been executed. Instruments that may shortly notify of threats and even automate the response will considerably scale back the danger of potential compromise.

Proactive safety that may assist scale back danger within the first place provides further worth. ITDR options can assist construct an image of the present setting and apply danger templates to it to focus on areas of concern, corresponding to accounts or information repositories with extreme permissions, unused accounts, and accounts discovered on the darkish net. The safety posture insights supplied by highlighting these considerations assist enhance safety baselines.

Deception expertise can also be helpful. It really works by utilizing pretend accounts or sources to draw attackers, leaving the true sources untouched. This reduces the danger to precise sources whereas offering a helpful strategy to examine assaults in progress with out risking precious belongings.

Vendor Method
ITDR options fall into two predominant camps, and whereas neither strategy is best or worse than the opposite, they’re prone to enchantment to completely different markets.

One route is the “add-on” strategy, normally from distributors both within the prolonged detection and response (XDR) house or privileged entry administration (PAM) house. This strategy makes use of present insights and applies identification menace intelligence to them. For organizations utilizing XDR or PAM instruments already, including ITDR to could be a lovely choice, as they’re prone to have extra strong and granular mitigation controls and the aptitude to make use of different elements of their resolution stack to assist isolate and cease assaults.

The opposite strategy comes from distributors which have constructed particular, identity-focused instruments from the bottom up, designed to combine broadly with present expertise stacks. These instruments pull telemetry from the prevailing stacks right into a devoted ITDR engine and use that to focus on and prioritize danger and doubtlessly implement isolation and mitigation. The pliability and breadth of protection these instruments supply could make them enticing to customers with broader and extra advanced environments that need to add identification safety with out altering different components of their present funding.

Subsequent Steps

To study extra, check out GigaOm’s ITDR Key Standards and Radar reviews. These reviews present a complete overview of the market, define the standards you’ll need to contemplate in a purchase order choice, and consider how numerous distributors carry out towards these choice standards.

When you’re not but a GigaOm subscriber, join here.



Leave a Reply

Your email address will not be published. Required fields are marked *