As a long time IT, cybersecurity, and identity professional, I’ve seen a lot of public and private truths come and go in my time.
A public truth is a trendy claim people make in public. It’s their idealized version of how things “should be.” A private truth is what they actually do on the ground, in their own organizations. Often, private truths exist because organizational requirements, legacy technology, or culture make realizing the public truth exceedingly difficult.
When it comes to identity security (protecting access and authorization of your digital identities), the public truth is that best practice frameworks, regulatory compliance, and cyber insurance companies call for strong preventive and mitigating controls.
However, the private truth is that very few organizations have a good handle on who their privileged users are, what they have access to, or what they should have access to.
It’s a wild-west frontier with multiple teams tracking identities and permissions in their respective areas, siloed toolsets generating reports of who has access to what, and a whole lot of tedious, manual processes that become outdated as soon as they’re prepared.
AI-driven threat detection can help to tame this chaos, but first, let’s set the stage.
The Wild West of Privilege
As Peter Druker once said, “If you can’t measure it, you can’t manage it.”
This is true with privilege as well.
In most organizations, the number of individuals deemed “admins” used to be considerably smaller. They included network admins, domain admins, firewall and proxy server admins, database admins and, further down the IT chain, help desk admins and others. They fell into the “IT” group and were administered as such. They were a known quantity, and it was possible to understand who had access to what at any given time, set centralized policies for access, audit user sessions and store credentials and secrets in a centralized vault. This was typically done using Privileged Access Management (PAM).
Then came Software as a Service (SaaS) apps and cloud and the picture gets a bit cloudier. Business line managers and application owners took over some of the admin roles from their workstations. Privilege went to the edge of the organization.
Then, with cloud service providers (CSPs) such as Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure, the edge disappeared completely. In cloud environments, agility and speed are key, so cloud admins are empowered to create new users, escalate privileges to third-party developers and contractors, and basically run the DevOps show in their particular cloud as they see fit. Machine or non-human identities (NHI), such as service accounts, APIs, AI agents, and containers, run in an automated fashion usually without a lot of oversight from the cloud admins.
But here’s the rub. Given the fact that a single compromised IT admin account, workforce, cloud admin account, developer or machine identity can create the opportunity for the bad guys to take down an organization, it’s a bit unsettling to think most organizations are flying blind. Technology has advanced faster than our human resources, time, budgets, and planning cycles have allowed us to keep up.
Tell me if this looks familiar:
Boss says: “We need to get a handle on all our (infrastructure, network, cloud) admins.” IT has the responsibility for ultimately determining who is an admin, then putting policies, auditing and security in place.
1. Project start
2. Manual processes engaged
3. Machine identities considered
4. Audit and compliance
Confidence that your work could stand up to a compliance review or audit scrutiny is low. White knuckling through this.
This was a bit of an oversimplification, but I’m sure you could identify with at least a few of the elements above. Thís is why one of the biggest search engine terms and one of the hottest topics over the past year has been “cloud discovery” or “cloud identity discovery” or some variant of it.
Most organizations don’t have a good idea of what infrastructure – servers, databases, containers, APIs, service accounts—exist in their clouds. Once you find them, you’re not sure what to do with them because it’s not easy finding who the owner of an AI agent or a service account is.
A classic conundrum of the modern-day IT admin is finding a service account that hasn’t been used in six months, a prime target for an attacker, but not wanting to disable it for fear of incurring the wrath of a developer or cloud admin when something breaks in the dev process.
Cloud identity discovery looks to develop a more complete picture of what is in your multi-cloud environment, let’s you assign owners to non-human identities, and shows you where your biggest identity risks are so you can focus your security operations on the highest priority items.
It finds things like:
Shadow admins: Shadow admins are users with administrative privileges that are not easily visible or documented, posing security risks as they can perform critical actions without proper oversight.
Overprivileged users: An overprivileged user has more access rights or permissions than necessary for their role, increasing the risk of accidental or malicious misuse of sensitive data and systems.
Stale accounts: Stale accounts are user accounts that are no longer active or used, often belonging to former human or non-human identities, and can be exploited by attackers if not properly managed or removed.
Orphaned accounts: Orphaned accounts are user accounts that remain active after an employee leaves an organization, lacking an associated owner, and can be a security vulnerability if not deactivated.
Cloud identity discovery finds these “identity misconfigurations” across a multi-cloud framework so there is no need for scripting or manual tabulation across your cloud properties. It can also do much more, such automatically vaulting cloud admin credentials and DevOps secrets, enabling seamless checking out of sessions, recording of admin sessions, and post-session auditing.
You can apply uniform policies for all admins. Plus, cloud identity discovery marries up with your traditional PAM solution to provide a single pane-enterprise view of privileged administrators that you can take to your audit committee with confidence.
Now that all privilege is mapped and continuously discovered, AI-threat detection enters the picture. AI threat detection is the use of artificial intelligence technologies to identify, analyze, and respond to potential security threats in real-time.
By leveraging machine learning algorithms and data analytics, AI can detect patterns and anomalies that may indicate malicious activity. These patterns are often difficult and time consuming for humans to recognize on their own, much less triage and chase down the various alerts from across the organization.
AI-driven threat detection is a proactive approach that not only enhances security today but also improves productivity and prepares you for emerging threats. Since human IT resources are limited and better applied to higher value projects, AI-driven threat detection stands guard.
Its typical use cases:
AI-driven threat detection can be deployed to work automatically to avert security incidents in real time. For example, unusual IT admin behavior such as creating large numbers of new accounts, is detected, it can move that user out of “admin” group and place them in a probationary one until further investigation can be done.
With cloud identity discovery engaged, you now have a full inventory of all of the privileged users across your complex multi-cloud hybrid environment. What to do next?
Here are the questions I hear most frequently.
The term “agentic” is all the rage these days. These systems autonomously perform tasks within your AI system. Having agentic AI agents proactively and tirelessly working to advance workloads can yield a boon to your organization, but they can also be potential security risks.
Left unmanaged, these agents could be taken over by a bad actor and operate with near unfettered access to your data and systems. Worse still, agentic agents are very in
dependent and autonomous and operate out of sight within the AI framework.
It’s AI vs. AI. AI-driven threat detection can help manage these systems, ensuring that they operate securely and efficiently. It treats agentic agents as machine identities and can ensure that basic and advanced safeguards are in place. It can move bad agents out of commission and alert security staff for follow-up investigation.
AI-driven threat detection systems are inherently adaptive, leveraging machine learning algorithms to continuously learn from new data and evolving threat landscapes. These solutions analyze vast amounts of data in real-time, identifying patterns and anomalies that may indicate emerging threats. Many organizations have not only multiple clouds, but multiple identity providers.
The best AI-driven threat detection models don’t just look at the target server, database or workstation, but also mine identity providers, like Okta, Ping, and Azure AD to baseline user behavior and create a complete picture of the user identity.
Identifying threats is only the first step. You also need a plan for responding to and mitigating these threats. AI-driven threat detection can provide real-time decision-making support and autonomous AI assistants to guide your response efforts, ensuring that threats are addressed promptly and effectively.
While AI-driven threat detection can bring to the fore some of the most pressing risks, security teams need to be brought into the mix and security workflows established so that when compromise is detected you can deal with it effectively and fast.
This one is a bit of a trick question. The best AI-driven threat detection systems create behavioral baselines for each user to identify deviations that may indicate malicious insider activity. The compromised admin may look like a legitimate user and may execute the commands they are authorized to do, but good AI-driven threat detection can sniff out a potential compromise. By continuously monitoring access patterns, privilege usage, and system interactions, it alerts you to threats from inside your organization.
AI-driven systems can significantly enhance real-time response to security incidents by automating threat detection and response processes. These systems can analyze network traffic, user behavior, and system logs in real-time, identifying potential threats and triggering automated responses to mitigate them.
For instance, AI can automatically isolate compromised devices, block malicious IP addresses, or enforce additional authentication measures when suspicious activity is detected. This rapid response capability minimizes the time between threat detection and mitigation, reducing the potential impact of security incidents.
Additionally, AI-driven systems can prioritize alerts based on the severity and potential impact of threats, enabling security teams to focus on the most critical issues. Furthermore, AI can provide security analysts with actionable insights and recommendations, enhancing their ability to make informed decisions and respond effectively to complex threats.
Identities are proliferating at an unprecedented rate and there’s no way for humans to keep up. AI-driven threat detection isn’t a luxury. It's a necessity.
Delinea leverages AI-driven threat detection to protect all identities, including IT admins, workforce, developers, and machine identities. By scanning for anomalous behavior and correlating activity across multi-cloud and on-premises environments, Delinea can automatically shut down potential threats. This user-friendly approach enhances security while keeping your team productive and your business running.
Check out a demo of Delinea’s Identity Threat Protection solution.