Mitigate Identity Risks
Identity risks are the most rapidly-increasing challenges facing today’s cyber security teams. Not only have identity risks multiplied from remote work, digital transformation, and our reliance on SaaS and IaaS architecture, but these threats are transitioning to active exploits at a rapid pace.
A number of recent surveys and reports urge us to rethink our identity-specific risks:
Crowdstrike’s 2024 Global Threat Report began by listing “identity-based and social engineering attacks” as the most prevalent theme of 2023: “In addition to stealing account credentials, CrowdStrike CAO observed adversaries targeting API keys and secrets, session cookies and tokens, one-time passwords (OTPs) and Kerberos tickets…” Mitigating these risks requires a unified approach that can be leveraged by disparate identity, security, and operational teams.
Challenges in Mitigating Identity Risks
Non-human identities (NHIs) are identities not defined by or associated with one “human.” They include cloud environments and cloud-native apps, DevOps tools, CI/CD pipelines and supply chains, automation tools and scripts, workloads, mainframe applications and more. They can be digital credentials and permissions that allow machines to communicate and interact with each other and with humans. Recent studies suggest NHIs outnumber human identities by 50 to 1, and are propagating at a far faster rate than human identities. Worse, 97% of NHIs have excessive privileges, increasing unauthorized access and stretching the attack surface.
This loosely defined term presents significant challenges to identity systems and the risks they try to corral. Digital nomads are “people who are location-independent and use technology to perform their job.” They work remotely, telecommuting rather than being physically present at a company's headquarters or office. In these remote settings they pull a host of new identities into their workflows, from local routers to 5G connections and public WiFi. Pandemics and global events exacerbate this trend: in 2023, there were 17.3 million American digital nomads, a 131% increase since 2019
Security teams are charged with managing identities across hybrid, connected environments. They must do it not only for employees, but also for customers, partners, and every machine connected to the enterprise. They need to manage identities in on-prem systems and across multiple clouds. This creates “silos.” Silos make it very difficult to discern where identity risks may appear. For example, if a corporate user has compromised private credentials, they pose a risk to the entire enterprise if they’re reusing credentials across accounts.
Not only are different business units creating their own versions of the same identities, but “Shadow IT” – the unsanctioned use of software, hardware, or external systems and services – is snowballing. Modern organizations feel a need to move faster than their IT processes allow, compelling a search for shortcuts. Shadow IT identities are difficult or impossible to correlate with other identities and their activities.
Scoop research says that 57% of companies globally use MFA, including 87% of large companies, 34% of medium-sized businesses, and 27% of small businesses. But phishing-resistant MFA – authentication using strong possession factors like FIDO-based or x.509-based credentials – is still a significant minority in enterprise implementations. This is the only way to achieve phishing resistance: organizations who “check the box” on MFA, without actually assessing its strength or configuration, have no idea how much risk they’re accepting.
A September 2024 article in Networking claimed “Identity attacks are the main threat to combat in the SaaS context.” The majority of identity vulnerabilities exist in the context of SaaS applications where security teams have less supervision and central control. And there are a ton of them: SaaS-based apps for business use are increasing, with 80 SaaS apps being used by the average company in 2020 and 130 being used in 2022(DevSquad).
Managing Identity Risks Through Correlation and Mitigation
Apply “Identity Fabric” Principles to Your Current Stack
Identity fabrics are not “bought,” but “enabled.” Analyst firm Kuppinger Cole defines identity fabrics as a “comprehensive set of identity services that provide seamless access to services for everyone.” It’s a way of connecting existing identities and their associated metadata. Kuppinger Cole says this approach “Makes it easier to implement authentication and authorization for all identities, enhances user experience, and reduces the chances of privilege escalation attacks.”
Automate Identity Discovery
The number of identities required to deploy and maintain our digitally transformed systems is staggering. Not only does every knowledge worker have as many as 20 or 30 identities, but every device and every service (SaaS, PaaS, or IaaS) has multiple identities depending on its architecture or workflows. Discovering the totality of these identities is crucial in understanding the security posture of an organization's overall identity fabric.
Break Down Silos
Perhaps worse than finding these identities or their sheer numbers is the fact that in most organizations they exist in multiple different technical and managerial “silos.” User identities may exist in IT systems alongside device and service IDs, but the same users likely have identities in HR, payroll, and operational systems as well as SaaS systems that are critical to their productivity.
Correlate and Score Identity Risk
Risk correlation and scoring are the pillars of “risk quantification.” According to ISACA, risk quantification is “the process of defining a risk’s impact on the business in terms of a specific value, often in terms of dollars.” Organizations need correlation between identity types and a practical scoring system to determine the “materiality” of a cybersecurity incident or risk and help them prioritize their mitigation efforts.
Related Use Cases by Industry
Financial Services
Always favorite targets for cyber attacks, financial services organizations continually increase their identity attack surface through cloud-based tools and services. They need help building identity fabrics that cover more of their digital footprint, are easier to manage, and are tied to risk telemetry.
Insurance
M&A activities in insurance services – from global enterprises to regional companies to brokers – are becoming commonplace. Identity connections, authentication solutions, and identity risks are being highly scrutinized as part of the due diligence in these deals.
Government
Government agencies and departments are leading the way in defining “strong identities”, and in using identity fabrics to map relations and attack surfaces. But these same teams are “stretching” that fabric routinely, and need a way to assess risks.
Integrations
Connectors
Axiad Mesh integrates seamlessly with your existing tools.
What Experts Say About Mitigating Identity Risks
The Essential Guide to IdRM
“Almost every organization has a fast-growing, rapidly morphing, and (all too often) poorly defended attack surface: its identity ecosystem. Learn how to map it and how to defend it.”
Gartner on Identity Hygiene
According to the research, “Security and risk management leaders face challenges in prioritizing IAM hygiene, leaving their organizations vulnerable to credential compromise and breaches. This research provides CISOs and identity teams with advice on how to communicate the risk, stop the creation of hygiene issues, and ensure accountability for IAM hygiene.”
Gaining Insight with Axiad Mesh
As companies seek to grow through acquisitions and mergers with other entities, the actual state of the target company's identity security–whether risky or well protected–is too often the last thing to come to light. Axiad Mesh helps due diligence teams get a complete picture of hidden identity risks.
Ready to Mitigate Identity Risks?
Take the next step in securing your organization’s identities with Axiad Mesh.