Chances are you already have an established process for identifying attackers and blocking external threats. You’ve taken steps to reduce the likelihood of an attack by exercising good cyber hygiene and following key identity and access management (IAM) best practices, such as adhering to the principle of least privilege.

But what about threats from within your organization? An insider threat is when an insider’s credentials and access are used, either deliberately by malicious actors or indirectly by criminals with stolen or acquired credentials, to illicitly obtain sensitive data from an organization. According to a recent SANS survey, 76 percent of security professionals ranked malicious, accidental or negligent insiders as the most damaging threat vector they face.

A Comprehensive Approach to Detecting Insider Threats

Insiders all look the same, making them increasingly difficult to detect. Security professionals need a way to analyze user activity and make intelligent decisions on a case-by-case basis. Traditional approaches to remediating suspected insider threats typically rely on technological solutions, such as blocking a user’s firewall access. This may or not be sufficient, since the user may still have access to resources beyond the firewall. If an insider is suspected of suspicious activity, why not employ tools that help you determine exactly which accounts, data stores and other enterprise resources a particular user can access? IAM solutions provide this information and enable security professionals to block threats fast with a more comprehensive approach.

Before you can make smarter decisions about user access, you’ll need a user behavior analytics (UBA) solution to monitor user activity and assign risk scores to individual profiles. A UBA tool works by examining patterns of user activity while employing machine learning to detect anomalous behavior that could indicate a potential threat. This technology can detect and alert you to behavior that violates security policies, such as attempting to log in multiple times or doing so from an unfamiliar location or at a suspicious time. Machine learning can identify sophisticated breaches in which attackers dwell in the network and gradually move laterally to escalate privileges over time. You’ll know exactly which user is in question and what offenses were committed. This enables you to gain more insight into the incident, automatically suspend the account and revoke access through IAM.

Once you’ve narrowed in on a user exhibiting suspicious behavior, how can you stop him or her? This is where IAM comes into play. Once UBA detects behavior that is out of policy, an identity governance and administration (IGA) solution automatically suspends that account. This immediately stops the user during the investigation, blocks him or her from accessing any more information and cuts down on dwell time. That part is critical, since longer the dwell time, the greater the potential for extensive damage. Automation saves crucial time during the investigation and eliminates the need for manual user-centric threat mitigation processes. It can even communicate directly with the impacted user to ask authentication questions via a mobile app. This approach is more comprehensive and effective than blocking firewall access.

Every Second Counts

By using UBA in conjunction with IGA to centrally and securely manage user identities, you can visualize insider threats and automatically control what resources each user can access based on previously established security policies. Depending on the risk score, you can use an IGA solution on a per-resource basis to suspend or shut down access completely.

When responding to insider threats, every second counts. By implementing IAM tools that can automatically respond to suspicious activity, organizations can help minimize damage while security analysts conduct their investigations. The combination of UBA and IGA enables security teams to manage user access with an approach that works silently in the background, only taking action when necessary to minimize disruptions to legitimate business activities.

To learn more, watch this demo video of IBM QRadar UBA + Resilient + Verify Governance integration here.

More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today