Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security

1/25/2019
09:35 AM
Alan
 Zeichick
Alan Zeichick
Alan Zeichick
50%
50%

Four Enterprise Identity & Access Management Trends to Watch in 2019

For CISOs, Identity and Access Management, or IAM, is a must-have for the security tool box. However, the technology is rapidly evolving. Here are four important trends to watch this year.

Want to keep your customers safe? Your employees? Your applications? Your confidential data? For a complex environment, an Identity and Access Management (IAM) system is a must.

A modern IAM handles end-user credentials -- for employees and customers -- and matches those with the appropriate resources on-premises and in the cloud. You'll use an IAM for everything from single sign-on (SSO) and password management to locking down applications, networks and storage.

Easy in theory, IAM is not so easy in practice. Here are big trends that began or gained strength in 2018, and will continue into the new year -- and beyond.

Implementing IAM across hybrid on-premises and cloud resources is a challenge Unless you are running a homogenous network -- think Windows on-premises and Azure in the cloud -- it's hard to ensure that every application and resource is integrated into a single IAM package.

Developers will be frustrated building new cloud applications that integrate with most IAMs, and the IT department will have trouble retrofitting all the existing on-premises applications. My suggestion: Accept that one IAM may not be able to handle all the dozens (or hundreds) of applications, and prioritize which must be integrated into the IAM, and which should continue to use their existing access protections.

IAM is powerful, but watch out for privacy rulesMany businesses, such as retailers, e-tailers and service providers, currently use one identity and access-control system for employees and applications, and another for customers who need accounts on the website.

Here's the problem: Many customer access management systems are weak and not secure.

Your IAM is much more secure, more extensible and ties in better with your security and SIEM systems for anomaly detection. What's the problem? Privacy.

Where's the data for your European customers stored? What about information they may have told you about health conditions (if that's relevant to your business) or finances? Generally speaking, your IAM doesn't have to worry about those specific regulations, if it's strictly focused on employees -- but there may be other rules to follow. And then, when customers are involved, it's a whole new ball game. Make sure your compliance attorneys are in the meetings.

IAM systems will incorporate more machine learning and AII mentioned anomaly detection above: You want to know if your iPhone-toting CFO is suddenly trying to establish a VPN from Android, or if one of your developers checks her email from Pittsburgh at 10 p.m., but is suddenly in Pakistan at 10:15 p.m. Or if she is trying to access application source code that’s not part of her normal work.

A human security officer might discover some of that access by studying log files, but AI can detect anomalous behavior in real time. As attackers up their game, enterprises will need to do the same. Look for every major IAM vendor to add new AI capabilities in 2019 -- and if you don't see them talk about machine learning and deep learning, maybe you need a new IAM vendor.

Everyone will struggle with end-user authentication technologiesThere is no silver bullet, especially for single sign-on. Passwords are insecure. Everyone knows that, but still, for most organizations, passwords are the key to accessing devices and online resources.

Two-factor authentication (2FA) fails if the user doesn't have the device, if the 2FA message is intercepted, or if someone compromises (or steals) the device. Biometrics lack standards, aren't integrated into all devices and lack consumer trust -- and can be frustrating when it doesn't work right.

This year will see a lot of experimentation with multifactor authentication, such as with FIDO2-compatible software and APIs. Still, it's a mess, and you'll end up trying and supporting lots of different things.

As we look more to the cloud, IAM becomes more essential, and far more complex. IAM also becomes more important than ever. If you have an IAM solution and strategy for the cloud, you’re ahead of the curve. If not, well, it’s time to get to work.

Related posts:

Alan Zeichick is principal analyst at Camden Associates, a technology consultancy in Phoenix, Arizona, specializing in enterprise networking, cybersecurity, and software development. Follow him @zeichick.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7734
PUBLISHED: 2020-09-22
All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column.
CVE-2020-6564
PUBLISHED: 2020-09-21
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
CVE-2020-6565
PUBLISHED: 2020-09-21
Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
CVE-2020-6566
PUBLISHED: 2020-09-21
Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2020-6567
PUBLISHED: 2020-09-21
Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.