Persona based Adaptive security

In the interconnected cyber world, access and privileges to sensitive information and critical infrastructure, uniformly based on user authentication alone is becoming risky. 

“A persona in the word's everyday usage, is a social role or a character played by an actor. The word is derived from Latin, where it originally referred to a theatrical mask.”

In our personal life, we have different personas or mask on the same day or at the same time. Like of an employee, privileged user, boss, subordinate, husband, father, friend, son/daughter, etc. Many adopt their behaviors, responses, tone, role, language-based on the persona you are at that point in time while the basic individual remains the same.

Like in personal space, IT users accessing the same resources has different personas on the same day, potential risk and threats on each of this persona vary considerably. It is required to enforce dynamic adaptive security, keeping zero-trust approach.

“Adaptive Security is an approach to cybersecurity that analyzes behaviors and events to protect against and adapt to threats before they happen.” 

One of the critical success factors of security is visibility and control on the environment hosting and accessing sensitive information and services. Which are of

  • Users
  • Systems
  • Information

Digital transformation and cloud adoption, enabled information and services available to anyone, at any time, from any device, from anywhere.

In this state from a security perspective, control and visibility of these becomes critical

  • Identity of the user
  • Details of the system connected (managed / un-managed), security posture
  • Origin location of the access 
  • Connection details
  • Information and service accessed

In the current federated digital environment, it is difficult to have control of all the above factors, which is one of the rational for a persona-based adaptive security approach.

Typical persona, a single IT user could take while accessing corporate resources are

  1. Corporate asset, Corporate network
  2. Corporate asset, Personal network
  3. Personal asset, personal network
  4. Corporate asset, public non-trusted network
  5. Customer asset, customer network
  6. Customer asset, personal/public network
  7. Contractor's 3rd party asset, corporate network
  8. Contractor's 3rd party asset, public non-trusted network

While the user is the same, accessing the same sensitive information and services, devices it connects and location it connects from, changes.

Enforcement of security control (especially information protection) at the trusted managed endpoint is the ideal best choice. In most of the above-mentioned persona, the managed trusted endpoint system is missing, even the location it is accessing from may be unknown.

Persona-based adaptive security approach at a high level, is limiting the privileges or enforcing additional controls based on the persona at the time of access request.

An example to this is

User having full access to corporate email while connecting from office network through corporate asset may not have the full privilege (downloading attachments) while accessing mail from personal systems. The same user may have an email attachment download option while accessing from home using corporate assets.

Or as another example, a user connecting from a different country from normal access is prompted for two-factor authentications. 

Or while connecting from non-managed systems, access to sensitive information or command execution on systems, restricted.

Enterprises taking persona-based adaptive security approach, should

  • Identify and define, type of personas allowed
  • Access and privileges granted to each of these personas
  • Technology to identify and enforce adaptive controls based on personas
  • Control enforcement required for each these personas
  • Continues monitoring to identify potential threats and attempts

Let us work together for a secured Cyber World.


Prasannakumar B Mundas

Global Cybersecurity Freelance Consultant who is into SOC, Threat Hunting, Threat Intelligence, IR, SME & Consultanting.

5 年

It’s very interesting topic to research more! Now a days air gap systems also getting affected.

Senthilvel Marimuthu

VP -Digital Transformation|Executive Agile Leadership CSM CSP Scaled Agile SAFe-SPC, AWS, Cyber Sec, DevSecFinOps, Data AI TPM Manager| Product Management | Financial Services | FinTech | Healthcare | Automotive IT VOLVO

5 年

Very nice post !

Dr. Deep Pandey

?? Author | Director, Cyber Security Leader with exposure to 35+ Countries including US, UK, Europe, Australia | Risk and Compliance | Cloud Security| PCI DSS | ISO 27001 |ISO 22301 | Security Architect | 25000+ Follows

5 年

Thanks Sunil for nice post . Zero Trust , will help to patch backdoor executive access by design & protecting them with social and many unforseen unaware scenarios. #cyberssecurityauditors #rateciso

要查看或添加评论,请登录

Sunil Varkey的更多文章

  • Building an Application Security Program - A high level approach

    Building an Application Security Program - A high level approach

    The majority of the security incident category in recent time is related to exploits of vulnerabilities or…

    18 条评论
  • Fishing in Muddy Water

    Fishing in Muddy Water

    Most of the enterprise networks are too noisy, with huge volume of bad traffics getting denied at host of systems…

    4 条评论
  • 2021 Security Predictions

    2021 Security Predictions

    Security events triggered by Solarwinds episode and others, will trigger revalidation of security strategy, mainly on…

    21 条评论
  • Elephants, Tigers and Snakes

    Elephants, Tigers and Snakes

    Many incident handlers and analysts defend cyber-attacks with a 'One size fits all' standard response, which most of…

    2 条评论
  • 2020 Cyber Security – Strategy Considerations

    2020 Cyber Security – Strategy Considerations

    With the new financial year, Cybersecurity strategy and budget discussions are now in the finalising stage at…

    3 条评论
  • Blueprint, your Digital Estate

    Blueprint, your Digital Estate

    For any digital environment to sustain and to be defensible, there are few principles, hygiene, DNA it needs to…

    1 条评论
  • Cyber Crisis Communication – A Key factor in Incident Response

    Cyber Crisis Communication – A Key factor in Incident Response

    With incident and crisis becoming a routine activity in the Cyberworld, communications with stakeholders during various…

    5 条评论
  • Leverage Digital Forensic resources effectively

    Leverage Digital Forensic resources effectively

    With many universities offering master's in digital forensics study and with other training, the supply of forensics…

    7 条评论
  • Time based Security - Relevance

    Time based Security - Relevance

    One of the fundamental principles of security is to understand the criticality of the asset to be safeguarded, its…

    6 条评论
  • Scale-up response strategy, credentials in the Dark web

    Scale-up response strategy, credentials in the Dark web

    Recent reports of large-scale credential exposure in the Dark web is alarming and warrants a scaled response strategy…

    3 条评论

社区洞察

其他会员也浏览了