Identity security (also known as Identity and Access Management or Identity and Access Governance) is a type of security that focuses on access to digital information or services based on the authenticated identity of an individual. It ensures that users are who they say they are and that they are doing what they are authorized to do.
Identity security (also known as Identity and Access Management or Identity and Access Governance) is a type of security that focuses on access to digital information or services based on the authenticated identity of an individual. It ensures that users are who they say they are and that they are doing what they are authorized to do. In most environments, Identity and Access Management (IAM) is the first line of defense against threats but, according to Palo Alto Networks, 65% of observed security incidents are due to bad permissions handling and misconfiguration, which opens doors wide for threat actors.
An Identity Governance solution should keep track of every existing active/inactive account in a system and should be able to spot any account creation/update in “near real-time” to block any lateral movement and privilege escalation attempt as soon as possible.
However, the company’s reality is often very complex: dealing with hybrid environments and legacy applications makes account synchronization much less effective. Thus, reaching completeness of visibility over the population of accounts acting on each system, including all the application accounts, service accounts, and dev accounts is not trivial.
Our hands-on experience confirms it, and we understand that there is only one way to be certain of having real-time knowledge of all accounts, getting rid of all the blind spots. That is by detecting active accounts in application audit trails and logs to continuously compare them against the ones listed in the Identity Governance system.
Sharelock Identity Threat Detection and Response brings under scrutiny accounts that do exist but are not listed in the Identity Governance system in real-time. These accounts are usually created directly in the target system for diverse reasons, be it for negligence, bypassing compliance rules, or performing malicious activities. These accounts uselessly expand a company’s attack surface exposing the company to unnecessary security risks.
In the best cases, they act on systems without being monitored until the next synchronization. It could take days or weeks tough, if the Identity Governance system does not manage local/application/system accounts and only focuses on those authenticated through the SSO process, these accounts remain invisible (and potentially dangerous) forever. These are named ghost accounts and are even more dangerous than orphan accounts because they elude every eventual present or future verification. They often are highly privileged system accounts created for development or test purposes and then gone forgotten.
Another important aspect is about used/unused accounts management as well. Under certain circumstances (SSO), Identity Governance can get information about the actual usage of an account. However, the information is partial both in quality (you only have the logon) and in systems coverage (SSO-enabled application only). Focusing only on the user’s ‘login successful‘ operation, an Identity Governance determines if an account is still used looking for the last login date and time. Usually, you only obtain the answer to this simple question: did the account log in the past N days? The reality is that the user could have just logged in without using the application functionalities at all, you don’t know anything about the actual usage. We think this is not enough to completely determine the account usage.
Consider a specific user and a specific account he used daily. The following changes in his behavior happen:
As a further example, also consider an application getting used much more frequently during the quarter’s end and very poor/no usage in the remaining months. Just looking at the last login date and time for each user is going to give you inconsistent results.
Sharelock Identity Threat Detection and Response learns the overall behavioral pattern of usage from each cluster of users (by department, job title, and manager). Sharelock leverages behavioral baselines to dynamically predict the best usage/un usage threshold for each particular access, based on the actual behavior of employees.
Identity Security is built upon two foundational tenets: Identity which mandates you have complete knowledge of all users’ accounts (including ghost ones); and Security which cannot be enforced if you don’t know how each user behaves.
Only with Sharelock Identity Threat Detection and Response you can have complete knowledge of everything so that nothing slips under the radar. Sharelock unlocks actual Identity Security.