Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
How CISOs can use identity to advance zero trust
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Identity: The decision point

Perimeter-based security models built to keep attackers out won’t work when 60% of breaches now involve valid credentials. As my colleague Andy Thompson says, “It’s much easier to log in than hack in.”Every entity (human or non-human) accessing a resource (applications, data or other entities) requires an identity. That’s why identities are so valuable. Attackers can target them instead of sniffing out vulnerabilities or deploying malware to exfiltrate sensitive data”, tactics that take time and effort. With valid credentials linked to a human or machine identity, attackers can slip in, bypass security controls and operate undetected”, sometimes for extended periods”, without anyone knowing.In more good news for the bad guys, identities are everywhere. The average staff member has more than 30 digital identities, and the total of non-human (or machine) identities outnumbers human identities by as much as 45-to-1. That number keeps growing: the average organization expects identities to surge by 3x in the next 12 months. Given this, it’s unsurprising that 93% of organizations have experienced at least two identity-related breaches.This data helps explain why identity has replaced the perimeter and become the only common decision point from which to evaluate risk and apply dynamic security controls. It also shows why protecting identities is now a core cybersecurity priority.

Identity security: A business enabler

Mature organizations understand that structured processes enable automation, which is key to securing identities. For example, HR can automatically create digital identities for new employees, ensuring they receive only the minimum necessary permissions for their role through the use of lifecycle management within identity governance.This automated identity lifecycle is governed by identity security control planes, which ensure that access requests, privilege escalations and governance are managed securely.Unlike process-heavy IAM systems of the past, identity security serves as a business enabler by optimizing workflows, decreasing friction and minimizing disruptions. CISOs can effectively communicate identity security’s value to stakeholders and align security efforts with business goals by understanding these identity-related controls organized into three pillars.

The three core pillars of identity security

1. Privilege controlsExcessive privileges are a top target for cyberattacks and a major cause of security breaches. An effective zero trust approach encompasses four key privilege controls that, together, reduce operational risks associated with unauthorized privileged access:
Least privilege access  ensuring accounts only have the permissions they need.Secrets management  securing credentials and API keys.Just-in-time (JIT) access  granting elevated access only when necessary.Zero standing privileges (ZSP)  eliminating persistent admin rights.2. Access managementManaging and securing access in a decentralized IT environment requires a complementary set of controls, including:
Adaptive authentication  dynamically adjusting access controls based on risk.Single sign-on (SSO)  improving user experience and reducing attack surfaces.Multi-factor authentication (MFA)  adding extra layers of security beyond passwords.3. Identity governanceIdentity governance is all about ensuring visibility, compliance and overall risk reduction by:
Defining who has access to what, when, and why.Automating access reviews and certification processes.Implementing role-based and attribute-based access controls (RBAC and ABAC).Together, these comprise a holistic identity security architecture. It shifts cybersecurity away from outdated perimeter-based controls toward dynamic, scalable and risk-adaptive access. With this as a foundation, organizations can be consistent about security across all entities (users, devices, applications, and services), make real time risk assessments so they can detect and respond to threats as they emerge, and continuously verify identities and access permissions to enforce zero trust.

Prioritizing identity security: A CISO’s roadmap

Of course, implementing these identity controls isn’t something that happens overnight. It’s a journey. The best way to maximize business resilience is to create and then follow a high-level roadmap for orchestrating identity security controls.Having a roadmap in place is not just crucial for goal setting and business justification; it’s also essential for identifying dependencies to ensure that controls work together in harmony. A structured identity-first strategy keeps the big picture in focus. Instead of constantly fighting fires and making tactical fixes, teams can concentrate on building a sustainable, outcome-based security program.AI-driven threats are evolving faster than ever before. The vast majority of CISOs have embraced Zero Trust as a philosophy, and as part of that, they approach security as if their organizations have already been breached. With continuous and adaptive identity security, it doesn’t matter whether the attacker is inside or outside. What matters is that they will be stopped in time and shut down before it’s too late. This advantage deserves every CISO’s full attention.Download “The Identity Security Imperative” for insights on how to implement identity security using practical and proven strategies to stay ahead of advanced and emerging threats.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3951888/how-cisos-can-use-identity-to-advance-zero-trust.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link