Episode 092 - GluuFederation/identerati-office-hours GitHub Wiki

Title: Tracking Identity Threats Before They Track You

Description

As identity-based attacks grow more sophisticated, traditional IAM solutions need a boost. In this episode of Identerati Office Hours, we dive into Identity Threat Detection & Response (ITDR)—a critical enhancement for modern IAM strategies. How can ITDR go beyond access management to detect, mitigate, and respond to identity threats in real-time? Will a ITDR become essential for security teams to stay ahead of evolving threats? Tune into this IOH episode to learn more!

Homework

Comparison of SOAR, SIEM and ITDR compliements of ChatGPT

Feature SOAR (Security Orchestration, Automation, and Response) SIEM (Security Information and Event Management) ITDR (Identity Threat Detection and Response)
Primary Purpose Automate and orchestrate security operations Collect, aggregate, and analyze security logs Detect and respond to identity-based attacks
Focus Area Incident response, playbooks, automation Log management, event correlation, compliance Identity security, continuous monitoring, anomaly detection
Data Sources SIEM, threat intelligence, security tools System logs, network logs, IAM logs IAM logs, authentication logs, behavioral analytics
Real-Time Threat Detection No, relies on alerts from SIEM/EDR Yes, but primarily based on rule-based alerts Yes, monitors user behavior in real-time
Behavioral Analysis No, relies on predefined rules Limited, rule-based correlation Yes, detects anomalies in identity usage
Identity Graphs No No Yes, builds user identity graphs
Automated Response Yes, automates playbooks No, alerts need manual response or SOAR integration Yes, can enforce step-up authentication, session revocation
Correlation of Identity-Based Attacks No, needs external identity context No, lacks identity behavioral monitoring Yes, detects and mitigates identity-based attacks
Use Cases Automating response actions, reducing analyst workload Threat detection, log analysis, forensic investigations Protecting against credential stuffing, MFA bypass, session hijacking
Limitations Requires well-defined playbooks, lacks deep identity analytics Generates high false positives, lacks identity correlation Requires integration with IAM systems, relatively new market segment

Takeaways

  • ⚡ Hackers don't break in... they login. Enterprises need to do more to detect these malicious logins. But it's not easy... because it's hard to figure out if a particular login is really suspicious, especially if we want to avoid over-reacting to a false positive.

  • ⚡ Making sense of the logs is hard. ITDR recognizes that we need special tools and algorithms to make information out of all this data. Traditional SIEM and SOAR tools aren't getting the job done, especially as they have trouble correlating identities across the enterprise application stack.

  • ⚡ Enteprises have many tools... using them all effectively and integrating them into business processes is a challenge. ITDR is new, so it's not clear exactly how enterprises will utlize it to its maximum utility.

  • ⚡ Detecting is nice, but responding is more valuable. But how to respond is easier said then done. In a federated topology, terminating the session at the IDP won't necessarily kill sessions in the RPs. Revoking tokens won't work if applications don't check for token revocation (and just wait for the tokens to expire). Enterprises need to buy and build applications that support more advanced authorization tools that to most effectively take advantage of ITDR.

Livestream Audio Archive

here