IAM Radar - Identity & Access Management Industry Tracker

IAM Radar - Identity & Access Management Industry Tracker

Share this post

IAM Radar - Identity & Access Management Industry Tracker
IAM Radar - Identity & Access Management Industry Tracker
Enabling Identity Threat Detection and Response (ITDR) for In-Progress Attacks, with PAM
Copy link
Facebook
Email
Notes
More

Enabling Identity Threat Detection and Response (ITDR) for In-Progress Attacks, with PAM

The Cyber Hut's avatar
The Cyber Hut
Apr 24, 2023
∙ Paid

Share this post

IAM Radar - Identity & Access Management Industry Tracker
IAM Radar - Identity & Access Management Industry Tracker
Enabling Identity Threat Detection and Response (ITDR) for In-Progress Attacks, with PAM
Copy link
Facebook
Email
Notes
More
Share

Original Article

Today’s enterprises focus on cloud-first and rapid development initiatives to speed the deployment of new applications. While these activities often do deliver on speed, in the process, they generate many more identities across the organization. More human identities are needed to manage accounts on new systems, and machine identities are provisioned to enable automation to manage inter-system communication and operation. All of these identities must be identified, onboarded, secured, and managed,

Yet, the reality is that this surge in the number of identities is frequently coupled with a lack of visibility into the depth and breadth of permissions given to these accounts. It is much easier to over-entitle an identity and their accounts during account creation time. This naturally leads to more entitlements than are required for the work, and this is a threat vector for malicious actors.

It’s clear that tracking cloud-access entitlements is difficult. Many of the cloud providers’ native tools still are opaque and lack cross-platform visibility, making it difficult to assess the true effect of the combination of entitlements.

In the face of this complexity, many companies simply hope they are doing the right thing. This represents a largely unidentified, yet powerful threat. The analysts agree. Gartner predicts that by the end of 2023, 75% of cloud security failures will result from inadequate management of identities, access, and privileges, up from 50% in 2020…

The Cyber Hut Comment: BeyondTrust are a leading PAM provider and have created an article focused on the emerging area of ITDR (Identity Threat Detection and Response) - and an associated list of best practices to get started.

Keep reading with a 7-day free trial

Subscribe to IAM Radar - Identity & Access Management Industry Tracker to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 The Cyber Hut
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More