Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint Security

1/25/2019
09:35 AM
Alan
 Zeichick
Alan Zeichick
Alan Zeichick
50%
50%

Four Enterprise Identity & Access Management Trends to Watch in 2019

For CISOs, Identity and Access Management, or IAM, is a must-have for the security tool box. However, the technology is rapidly evolving. Here are four important trends to watch this year.

Want to keep your customers safe? Your employees? Your applications? Your confidential data? For a complex environment, an Identity and Access Management (IAM) system is a must.

A modern IAM handles end-user credentials -- for employees and customers -- and matches those with the appropriate resources on-premises and in the cloud. You'll use an IAM for everything from single sign-on (SSO) and password management to locking down applications, networks and storage.

Easy in theory, IAM is not so easy in practice. Here are big trends that began or gained strength in 2018, and will continue into the new year -- and beyond.

Implementing IAM across hybrid on-premises and cloud resources is a challenge Unless you are running a homogenous network -- think Windows on-premises and Azure in the cloud -- it's hard to ensure that every application and resource is integrated into a single IAM package.

(Source: iStock)
(Source: iStock)

Developers will be frustrated building new cloud applications that integrate with most IAMs, and the IT department will have trouble retrofitting all the existing on-premises applications. My suggestion: Accept that one IAM may not be able to handle all the dozens (or hundreds) of applications, and prioritize which must be integrated into the IAM, and which should continue to use their existing access protections.

IAM is powerful, but watch out for privacy rulesMany businesses, such as retailers, e-tailers and service providers, currently use one identity and access-control system for employees and applications, and another for customers who need accounts on the website.

Here's the problem: Many customer access management systems are weak and not secure.

Your IAM is much more secure, more extensible and ties in better with your security and SIEM systems for anomaly detection. What's the problem? Privacy.

Where's the data for your European customers stored? What about information they may have told you about health conditions (if that's relevant to your business) or finances? Generally speaking, your IAM doesn't have to worry about those specific regulations, if it's strictly focused on employees -- but there may be other rules to follow. And then, when customers are involved, it's a whole new ball game. Make sure your compliance attorneys are in the meetings.

IAM systems will incorporate more machine learning and AII mentioned anomaly detection above: You want to know if your iPhone-toting CFO is suddenly trying to establish a VPN from Android, or if one of your developers checks her email from Pittsburgh at 10 p.m., but is suddenly in Pakistan at 10:15 p.m. Or if she is trying to access application source code that’s not part of her normal work.

A human security officer might discover some of that access by studying log files, but AI can detect anomalous behavior in real time. As attackers up their game, enterprises will need to do the same. Look for every major IAM vendor to add new AI capabilities in 2019 -- and if you don't see them talk about machine learning and deep learning, maybe you need a new IAM vendor.

Everyone will struggle with end-user authentication technologiesThere is no silver bullet, especially for single sign-on. Passwords are insecure. Everyone knows that, but still, for most organizations, passwords are the key to accessing devices and online resources.

Two-factor authentication (2FA) fails if the user doesn't have the device, if the 2FA message is intercepted, or if someone compromises (or steals) the device. Biometrics lack standards, aren't integrated into all devices and lack consumer trust -- and can be frustrating when it doesn't work right.

This year will see a lot of experimentation with multifactor authentication, such as with FIDO2-compatible software and APIs. Still, it's a mess, and you'll end up trying and supporting lots of different things.

As we look more to the cloud, IAM becomes more essential, and far more complex. IAM also becomes more important than ever. If you have an IAM solution and strategy for the cloud, you’re ahead of the curve. If not, well, it’s time to get to work.

Related posts:

Alan Zeichick is principal analyst at Camden Associates, a technology consultancy in Phoenix, Arizona, specializing in enterprise networking, cybersecurity, and software development. Follow him @zeichick.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-0235
PUBLISHED: 2022-01-16
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-0238
PUBLISHED: 2022-01-16
phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)
CVE-2021-44537
PUBLISHED: 2022-01-15
ownCloud owncloud/client before 2.9.2 allows Resource Injection by a server into the desktop client via a URL, leading to remote code execution.
CVE-2021-33828
PUBLISHED: 2022-01-15
The files_antivirus component before 1.0.0 for ownCloud mishandles the protection mechanism by which malicious files (that have been uploaded to a public share) are supposed to be deleted upon detection.
CVE-2021-33827
PUBLISHED: 2022-01-15
The files_antivirus component before 1.0.0 for ownCloud allows OS Command Injection via the administration settings.