Ask any cybersecurity professional and they’ll tell you that weak or stolen credentials are involved in most breaches. Perhaps no statistic in our industry is referenced as often. Each year, for example, the Verizon Data Breach Report backs up this assertion.
After all, why should a bad guy work to break encryption, evade endpoint security, or purchase an expensive zero-day exploit from the dark web when they can just steal some credentials and walk in through the front door?
Even organizations with strong security policies and controls experience these types of identity-related attacks. Would you know if an identity in your organization—across your complex, constantly changing, multi-cloud infrastructure—was compromised?
To help you protect your organization, Delinea is introducing a Cloud Infrastructure Entitlement Management (CIEM) solution to detect and remove standing privileges in public clouds and an Identity Threat Detection and Response (ITDR) solution designed specifically to combat attacks across the identity layer as part of a broader vision to centralize and build policies for authorization across organizations.
Here’s what they do and why they matter.
Delinea Privilege Control for Cloud Entitlements helps you contain the sprawl of identity entitlements across your multi-cloud infrastructure. This is what CIEM solutions do: reign in over-privileged identities across cloud platforms.
The cloud is everywhere. Most organizations run a significant portion of their business through cloud platforms like Google Cloud Platform (GCP), Microsoft Azure, and Amazon Web Servers (AWS). According to OVHcloud, 62% of organizations are currently using multi-cloud environments.
In these multi-cloud platform environments, users are operating with privileges. Developers are checking in code and admins are on-boarding users and assigning rights. Users get more privileges to do their jobs, but seldom have them taken away when they are no longer needed. Plus, machines are automating processes.
Machine identities, such as service accounts that run applications, virtual machine instances, and various background processes, usually vastly surpass the number human identities in most public clouds. According to Microsoft, workload identities outnumber humans by 10:1. They have privileges and are logged in with credentials that can be easily stolen.
A single compromise of one cloud identity—human or machine—could seriously impact your organization, maybe even in a catastrophic way.
An entitlement, or privilege, is a “right” assigned to an identity to do what they need to get their jobs done. These authorizations are essential for cloud activities. For example, an EC2 (Amazon) cloud administrator has entitlements to manage the cloud instance and create new users or start services. A developer can check in code. A virtual machine may have read/write access to a database to schedule backups.
At its heart, the Delinea solution enables organizations to achieve the Principle of Least Privilege, the idea that every identity should only be allowed to have the minimum entitlements necessary to do its job.
Typically, entitlements are assigned to an identity when it’s originated, taking the rights and privileges from the group membership to which it belongs. Another way an identity gets entitlements is by requesting and receiving additional rights from an approver, like an IT administrator.
The problem is that having too many entitlements floating around your cloud could lead to adverse consequences should an over-privileged human or machine identity get compromised.
Provisioning users with entitlements is easy. Evaluating and removing them when they’re no longer needed is the hard part. Cloud platform tools are bad at managing entitlements. So are traditional Identity and Access Management (IAM) tools that have very limited visibility into locally created machine accounts on cloud platforms. These tools have a difficult time looking across multiple cloud and identity platforms to figure out which identities should have entitlements and re-balancing them when necessary.
Privilege Control for Cloud Entitlements provides cloud security leaders with deep context into cloud and identity configuration and usage so you can discover excess privileges and limit authorization across multi-cloud infrastructure to reduce your risk.
Specifically, the solution does the following:
Just as Privilege Control for Cloud Entitlements enforces least privilege across multi-cloud, the next solution expands the boundaries of identity security, adding detection and response and high-quality identity insight for security operations, and does so for all identities across the organization.
Delinea Identity Threat Protection continually evaluates identities across your organization to detect and remediate threats. It builds context across the identity layer, so you can discover issues and remediate threats as they happen, reducing the risk to critical systems and data.
Delinea Identity Threat Protection:
threats across multi-cloud, hybrid, and identity providers.
Many Security Operation Centers (SOC) and security operations teams are ill-equipped to prevent a compromise at the identity layer and lack investigative tools for post-event follow up. Traditional cloud and IAM tools don’t work well across Infrastructure-as-a-Service (IaaS) and Software-as-a-Service (SaaS) boundaries. For example, machine identities are often provisioned locally and can be forgotten when no longer needed, their privileges remaining intact.
Delinea Identity Threat Protection looks across boundaries to give you a unified view of identities. It has preventative features that finds identity misconfigurations and detects anomalous behavior. If a situation is detected, Identity Threat Protection can immediately neutralize a potentially compromised identity, report on that activity, and deliver high-quality signals to the security operations team for further action.
By moving as closely as possible to zero standing privileges, you reduce risk. With continuous oversight, you can adjust as risk factors change and respond to threats as they happen.
Both Delinea Privilege Control for Cloud Entitlements and Delinea Identity Threat Protection are delivered through the Delinea Platform, centralizing authorization to make you more secure and your teams more productive.
To learn more about these two new identity security solutions, register for the webinar.