+ All Categories
Home > Documents > ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to...

ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to...

Date post: 14-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
20
1 ADDRESSING DIGITAL IDENTITY RISK RSA SECURID ® SUITE Vassilis Boulogiorgos Identity Account Executive, Middle East & AFrica
Transcript
Page 1: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

1

ADDRESSING DIGITAL IDENTITY RISKRSA SECURID® SUITE

Vassilis Boulogiorgos

Identity Account Executive, Middle East & AFrica

Page 2: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

2

IDENTITY EXPLODES WITH DIGITAL TRANSFORMATION

Page 3: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

3

IDENTITY CHALLENGES

CONTINUE TO GROW

Organizations are taking their

business online Cloud and mobile

change the game

M O D E R N I Z AT I O N

Increasingly sophisticated and

more frequent

M A L I C E

Transitioning from simple guidance

to rigid security with a modern,

global infrastructure

M A N D AT E S

MALWAREPHISHING BREACHDEVICESAPPS USERS DFARSPCI GDPR

Page 4: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

4

IDENTITY RISK CHANGING DYNAMICS

Privileged Access;

Crown Jewels

Password Protection

Getting Harder

Expanding populations;

3 party access

Lacking Business

Reviews; Rubber Stamp

Increasing

Regulatory and

Compliance Scrutiny

BYOD, Access for

Any User,

Anywhere, on

Any Device

Need to Balance

Security with

User Convenience

Islands of Identity;

No Visibility

Page 5: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

5

Orphaned accounts

Privileged access

Outliers

Unauthorized changes

Changes as a result of movement

High risk applications

Unstructured data

Un-reviewed items

Shared and service accounts

Toxic combinations Segregation of Duties & policy violations

UNDERSTANDING & QUANTIFYING THE CRITICAL IDENTITY RISK FACTORS

Page 6: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

6

CONSEQUENCES FOR NOT RESPONDING TO IDENTITY RISK

IDENTITY RISK IS A BUSINESS RISK

Audit Failure

s

Security

Breaches

Financial

cost

Business

Productivity

Page 7: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

7

Accelerate business, increase

security and reduce costs

I N T E L L I G E N T

From ground

To cloud

P E RVA S I V E

User experience for the

modern workforce

C O N V E N I E N T

IMAGINE A SECURE WORLD…

Page 8: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

8

Access AssuranceWho has access to what?

Identity AssuranceIs the user who they claim to be?

Identity Governance

Act with insight to prioritize

access decisions

Identity Lifecycle

Ensure users have timely access

the the right applications

Authentication

Provide convenient & secure

access for all your users

Access & SSO

Connect to any resource

on-premises or in the cloud

Page 9: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

9

Identity Governance

Identity Lifecycle

▪ Expanded visibility and

control over identities

▪ Prioritized actions based on

risk

▪ Reduces time / manual effort

with automated processes

▪ Strengthens risk posture

▪ Reduces chances of audit

failure or breach

▪ Reduced TCO

Manage and provide

insight into who has

access to what

Page 10: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

10

A BATTLE PLAN TO ADDRESS THE RISKS

Risk and priority driven certifications

Targeted reviews for orphaned accounts

Unauthorized change and policy exception

detection & remediation

Risk-based dynamic approval and

compliance orchestration

Joiner, mover, leaver policy enforcement

Full visibility into unstructured data access

Centralized privileged access management &

certification

Page 11: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

11

IDENTITY RISK PRIORITY ACCESS REVIEWS

Page 12: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

12

Access AssuranceWho has access to what?

Identity Governance

Act with insight to prioritize

access decisions

Identity Lifecycle

Ensure users have timely access

the the right applications

Access & SSO

Authentication

▪ Ensures right individuals

have convenient and

secure access

▪ Meets access

requirements of the

modern workforce

▪ Reduces startup times

and lowers costs

Delivering convenient

and secure access to

the modern workforce

Page 13: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

13

Network

Session AppDevice

Role

RISKY

PASS

Location

Static User and

Context Rules

Deny

Behavior-based

Confidence

INTELLIGENCE RISK-DRIVEN IDENTITY ASSURANCE

Approve Tokencode RSA SecurID

FIDOFaceIDFingerprintLocation

TimeApp

Network

Device

Access Pattern

Identity

Assurance

Engine

Page 14: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

14

ADDRESSING IDENTITY RISK… I N T E L L I G E N T

…REQUIRES A HOLISTIC APPROACH

Page 15: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

15

WHO is the user?

WHATcan they access?

WHATknown fraud is this user or device associated with?

HOWdo you take threats into account?

WHYshould I care? Is there a risk to my business?

Lines of Business

Risk/ FraudIdentity

SOC

Compliance

IT/OPS

CONNECTEDS E C U R E A C C E S S TA K E S A V I L L A G E

Page 16: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

16

C O N N E C T I N G I D E N T I T Y T O

U S E R R I S K

SOC

90 Breach

Mitigated

High Risk Network/ Device Behavior Identified90

Inform RSA SecurID Access Risk Engine of suspicious user or network activity to drive step-up Authenticationas required to confirm user identity

In response to an active incident:1. Based on risk analysis automated playbook is activated

to authenticate users on devices with anomalous activity

2. The SOC Analyst adds user , device or network information to high risk user/device list to limit or block user’s access, or to reduce false positives by requesting users to authenticate

Breach

Mitigated

Page 17: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

17

A U T H E V E N T S C A P T U R E I N N W

BLACK HAT ASIA 2018

Page 18: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

18

Compliance

CONTINUOUS COMPLIANCE

A U T O M A T E D & D Y N A M I C E X C H A N G E O F A C T I O N A B L E

I D E N T I T Y D A T A

Define objectives, policies

Assess risk; measure/report

Business context & prioritization

for IT assets, apps and risk

Access governance, provisioning

and compliance reporting

Policy enforcement, e.g. SoD

Engine for identity risk events

Holistic View

▪ Automated,

continuous

collaboration

▪ Holistic view of

identity risk

▪ Reduced user

access risk

Page 19: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

1919

SECURE ACCESS FROM GROUND TO CLOUD

$

C O N V E N I E N T

▪ Ensures the right individuals have convenient and secure access

▪ Meets authentication requirements of the modern workforce

I N T E L L I G E N T

▪ Uses intelligence to act with insight

P E R VA S I V E

▪ Provides unified visibility and control across all access use cases

▪ Reduces startup times and lowers costs

ACCELERATE BUSINESS WHILE YOUMITIGATE IDENTITY RISK

Page 20: ADDRESSING DIGITAL IDENTITY RISK · 1. Based on risk analysis automated playbook is activated to authenticate users on devices with anomalous activity 2. The SOC Analyst adds user

20

THANK YOU!


Recommended