Identity is the New Perimeter - Strengthening Cybersecurity with Identity Threat Detection and Response (ITDR)
Juan Pablo Castro
Director @ Trend Micro | Cybersecurity Strategist, LATAM | Creator of Cybersecurity Compass & CROC | Public Speaker
The rapid digital transformation and widespread adoption
Identity Compromise: The Startling Statistics
The importance of securing user identities cannot be overstated, as recent statistics reveal the magnitude of identity compromise:
Understanding the challenge
The Nature of Identity and Access
Limitations of Traditional Security Measures
Access-as-a-Service: A new business model for cybercriminals
There is a new thriving business model in underground forums where so-called access brokers sell breached credentials or direct access to corporations everywhere to other criminals. Ransomware attackers, for instance, might not need to exploit a vulnerability or spam infectious emails to gain initial access — now they can just buy their way in.
Access brokers now offer what we call access as a service. These criminals provide other malicious actors a way into corporate networks for a price, paving the way for the actual damaging attacks. The existence of this new underground marketplace is the source of the disconnect between an initial corporate breach and the subsequent attacks that follow days or even months after.
Access brokers in the criminal underground often advertise this service like it’s a cinema ticket: Somebody buys this ticket, and they get straight in. In reality, however, things are a bit different. For example, what exactly do customers get in exchange for their money? Sometimes, it’s access to a web shell or a similar straightforward method of getting a command prompt into the compromised network. More often than not, however, it’s just a set of credentials and a virtual private network (VPN) server to connect to.
This also allows the seller to establish trust with the buyer from the very beginning, since it’s just a matter of logging into the network on a shared remote session and showing proof of having access to network resources. This would be the equivalent of walking with the customer into the compromised premises and showing them the interiors as proof that the stolen keys are real, like a twisted digital version of a real estate broker.
Most of the time, it is access brokers who bear the burden of the network breach that allows a ransomware attack to succeed. Even though ransomware still has by far the most visible impact during such a breach, the enablers of those attacks are usually the ones that quietly break and then sell access to other malicious actors.
Usually, profits from ransom payments tend to be divided into 80% for the ransomware group and 20% for whoever provided them the way in. We estimate that most of the time, ransomware attacks succeed because someone provided the ransomware group access to the target network, whether this someone is an access seller or a single hacker, as in the case study we previously discussed.
领英推荐
On a side note, in the affiliate model, the splits are reversed: The ransomware group receives 20%, and the affiliate receives 80%. In this model, the affiliates are expected to do the ransom negotiation; therefore, the payout is higher for them. Obviously, ransomware groups prefer the current access model that is becoming prevalent in the cybercriminal underground.
Because the ransomware payload is the most visible part of the attack, defenders tend to focus primarily on this. Consequently, most security discussions focus on ransomware attacks instead of on monitoring and mitigating the actions of access brokers. The same can be said regarding the media attention that ransomware groups regularly garner in contrast to access brokers.
ITDR: The New Line of Defense
Identity Threat Detection and Response (ITDR) solutions focus on identifying, detecting, and responding to threats targeting user identities and access privileges. By continuously monitoring user behavior and access patterns, ITDR systems can detect anomalies and flag suspicious activities that could indicate a compromised identity. Detecting a breach where identity has been compromised is particularly challenging for various reasons, including the dynamic nature of identity, the evolving cyber threat landscape, and the inherent limitations of traditional security measures.
The ITDR-XDR Connection
Extended Detection and Response (XDR) is an integrated, cross-platform approach to threat detection and response that consolidates data from multiple sources, including endpoints, email telemetry, network traffic, and cloud environments. Incorporating ITDR into an XDR strategy enables organizations to achieve a comprehensive view of their security landscape and effectively identify and remediate potential threats targeting user identities.
The Zero Trust Link
Zero Trust is a security framework centered on the principle of verifying every access request, regardless of user location or device used. Integrating ITDR with a Zero Trust architecture allows organizations to maintain a dynamic and continuous assessment of user identities, ensuring access is granted only to authenticated and authorized users.
Identity: a new component in Attack Surface
As the number of connected devices, applications, and services grows, so too does the attack surface – the aggregate of all potential vulnerabilities and entry points that could be exploited by cybercriminals. User identities are a crucial component of an organization's attack surface. Implementing ITDR reduces the attack surface by continually monitoring and analyzing user behavior, flagging potential threats, and minimizing unauthorized access.
Quantifying Risk for Every Identity
Effective cybersecurity strategies require organizations to assess and quantify risk for each user identity. By calculating real-time identity risk scores based on factors such as user behavior, access patterns, and device context, organizations can develop adaptive and dynamic responses to potential threats. ITDR solutions help achieve this by generating real-time risk assessments for each user, enabling organizations to tailor their response strategies accordingly.
Explaining the Importance of ITDR to a non-technical audience
Final thoughts about the importance of ITDR and its integrations into a Cybersecurity Platform
As the cyber threat landscape evolves, the importance of identity in cyber security cannot be overstated. Identity Threat Detection and Response (ITDR) is critical for safeguarding user identities and ensuring the integrity of digital ecosystems. By quantifying risk for each user identity and calculating real-time identity risk scores and integrating ITDR with Extended Detection and Response (XDR) and Zero Trust frameworks, organizations can reduce cyber risk and enhance their cybersecurity posture, keeping their digital assets safe and secure in the face of increasingly sophisticated attacks.