July 22, 2015 By Veronica Shelley 2 min read

I gained some new insights into identity and access management (IAM) recently when I watched a 1950s science fiction movie titled “They Came from Outer Space.” The plot involved aliens disguising themselves as humans in order to move about freely and accomplish their mission (repairing their crashed spaceship). Initially, the impostors are undetected, but the real humans soon realize something is amiss. The aliens’ appearance is foolproof, so what tips off the humans that they aren’t what they seem?

It’s their behavior. George is caught staring directly into the sun without blinking, Fred refuses to eat food and Susan runs for miles across the hot desert wearing high heels and a chic cocktail dress. These and other unusual activities quickly reveal they aren’t human.

This storyline of people or aliens masquerading as others, usually someone familiar and trusted by the victim, has been used in countless movies and television shows. And typically the same method is used to unmask the impersonators: Their actions always give them away.

How to Stop the Masquerade

The movie reminded me that this approach can also be used to identify insider threats in your IT environment. While IAM solutions are broadly used to validate users and grant them appropriate access credentials, user authentication isn’t enough. Credentials and devices are easily stolen, privileged users and contractors often share passwords or accounts and some trusted users become malicious insiders.

Using IAM alone is not enough to verify that users are who they claim to be and are acting appropriately; you need to keep an eye on what they’re up to. IAM solutions often include user auditing and reporting capabilities, but you can take it up a notch with a security information and event management (SIEM) solution that can quickly and accurately identify user anomalies. For example, SIEM integration with IAM solutions brings additional visibility into user activities and strengthens identification of internal misuse by providing the context of who, and not just what, is accessing critical assets.

How Can Security Analytics Help?

By adding security intelligence and analytics to your IAM environment, you can uncover inappropriate user entitlements, activities and access requests that pose a security risk. The right solutions help enable organizations to:

  • Monitor user activity to help prevent targeted attacks;
  • Detect insider fraud involving privileged users;
  • Facilitate compliance with closed-loop analytics.

For example, if one of your privileged users, Sara, suddenly starts downloading confidential files at 3 a.m. or granting inappropriate access rights to other users, is it really Sara or someone who has stolen her credentials? In either case, the activities need to be stopped promptly before further damage can be done.

The ability of identity intelligence and behavioral analytics to pinpoint aberrant user behavior to help thwart insider threats, prevent security breaches and maintain security compliance.

IAM Tools Are a Vital Asset

In today’s online environment, with mobile and cloud-based access now considered business as usual, a digital identity is often the only tool available to verify who someone is. But as we’ve seen in our sci-fi example, stolen identities can mask an external attacker or a colleague who’s no longer trustworthy. You need to validate whether someone is a friend or foe and acting in the best interest of your organization.

Learn more about Mitigating Risks with Security Intelligence and Identity Assurance

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today