Identity and Access Management (IAM) alone is not enough

Identity and Access Management (IAM) alone is not enough - Image by Gerd Altmann on Pixabay

Share post

Although the zero trust strategy usually includes comprehensive Identity and Access Management (IAM), the Swiss security specialist Exeon Analytics warns against relying predominantly on IAM.

Zero Trust is all too often based primarily on constant verification of user identities, which is ineffective in cases of stolen identities, says Exeon. Zero Trust is an overarching security strategy that aims to continuously audit and verify access to resources both internally and externally. It is based on the principle that network devices and users must constantly prove their identity because they are not automatically trustworthy. Access to resources is limited to the absolute minimum and all identities on the platform are evaluated according to the same criteria as hosts.

IDS/IPS systems are tasked with detecting suspicious or unauthorized activity, virus infections, malware and ransomware, zero-day attacks, SQL injection, and more. However, they often only detect known signatures, such as previously identified malicious domains or IP addresses. If a domain has not already been flagged as malicious, it can be missed by traditional security solutions, making it difficult to achieve Zero Trust alone.

Network detection and response

In order to effectively implement the Zero Trust security strategy, companies should make greater use of network analysis tools, as the analyst firm Forrester recently recommended (“The Network Analysis and Visibility Landscape, Q1 2023”). According to the Forrester report, security teams should use network detection and response (NDR) tools to monitor their networks, scan for threats, detect applications and assets, and capture malicious data packets. These measures contribute to the effective detection of threats within IT infrastructures.

NDR facilitates early detection of reconnaissance activity and lateral movements when an attacker is already on the network. This is done without agents, which cannot be installed on many systems. Using machine learning (ML), NDR systems are able to detect anomalies in traffic without relying on pre-stored, known indicators of compromise (IoCs). These ML models are designed to be continuously trained to detect new threats and attack techniques. This approach significantly speeds up the detection of malicious activity and enables early defense against attacks. Additionally, it helps identify unknown, suspicious behavior and minimizes the time attackers can remain on a network undetected, thereby increasing overall security.

More at Exeon.com

 


About Exeon

Exeon Analytics AG is a Swiss cybertech company specializing in protecting IT and OT infrastructures through AI-driven security analytics. The Network Detection and Response (NDR) platform ExeonTrace offers companies the opportunity to monitor networks, immediately detect cyber threats and thus effectively protect their own company's IT landscape - quickly, reliably and completely software-based.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more