July 22, 2015 By Veronica Shelley 2 min read

I gained some new insights into identity and access management (IAM) recently when I watched a 1950s science fiction movie titled “They Came from Outer Space.” The plot involved aliens disguising themselves as humans in order to move about freely and accomplish their mission (repairing their crashed spaceship). Initially, the impostors are undetected, but the real humans soon realize something is amiss. The aliens’ appearance is foolproof, so what tips off the humans that they aren’t what they seem?

It’s their behavior. George is caught staring directly into the sun without blinking, Fred refuses to eat food and Susan runs for miles across the hot desert wearing high heels and a chic cocktail dress. These and other unusual activities quickly reveal they aren’t human.

This storyline of people or aliens masquerading as others, usually someone familiar and trusted by the victim, has been used in countless movies and television shows. And typically the same method is used to unmask the impersonators: Their actions always give them away.

How to Stop the Masquerade

The movie reminded me that this approach can also be used to identify insider threats in your IT environment. While IAM solutions are broadly used to validate users and grant them appropriate access credentials, user authentication isn’t enough. Credentials and devices are easily stolen, privileged users and contractors often share passwords or accounts and some trusted users become malicious insiders.

Using IAM alone is not enough to verify that users are who they claim to be and are acting appropriately; you need to keep an eye on what they’re up to. IAM solutions often include user auditing and reporting capabilities, but you can take it up a notch with a security information and event management (SIEM) solution that can quickly and accurately identify user anomalies. For example, SIEM integration with IAM solutions brings additional visibility into user activities and strengthens identification of internal misuse by providing the context of who, and not just what, is accessing critical assets.

How Can Security Analytics Help?

By adding security intelligence and analytics to your IAM environment, you can uncover inappropriate user entitlements, activities and access requests that pose a security risk. The right solutions help enable organizations to:

  • Monitor user activity to help prevent targeted attacks;
  • Detect insider fraud involving privileged users;
  • Facilitate compliance with closed-loop analytics.

For example, if one of your privileged users, Sara, suddenly starts downloading confidential files at 3 a.m. or granting inappropriate access rights to other users, is it really Sara or someone who has stolen her credentials? In either case, the activities need to be stopped promptly before further damage can be done.

The ability of identity intelligence and behavioral analytics to pinpoint aberrant user behavior to help thwart insider threats, prevent security breaches and maintain security compliance.

IAM Tools Are a Vital Asset

In today’s online environment, with mobile and cloud-based access now considered business as usual, a digital identity is often the only tool available to verify who someone is. But as we’ve seen in our sci-fi example, stolen identities can mask an external attacker or a colleague who’s no longer trustworthy. You need to validate whether someone is a friend or foe and acting in the best interest of your organization.

Learn more about Mitigating Risks with Security Intelligence and Identity Assurance

More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today