Initial Identity Security
Building upon traditional security with enhanced authentication and basic automation
Overview
The Initial phase represents the first step in modernizing your identity security approach. Organizations in this phase have moved beyond basic password authentication and are implementing more robust security measures while beginning to automate key processes.
Key Takeaway: This phase focuses on implementing fundamental security improvements while establishing the foundation for more advanced automation and controls.
Current State
- •Authentication: Expands to MFA with dynamic attribute validation (e.g., location, activity)
- •Identity Stores: Combines self-managed and hosted (e.g., cloud) stores with minimal integration (e.g., single sign-on)
- •Risk Assessments: Uses manual methods and static rules for risk determination
- •Access Management: Automates access expiration and review processes
- •Visibility and Analytics: Aggregates logs and performs basic automated analysis
- •Automation and Orchestration: Automates non-privileged identity lifecycle management
- •Governance: Defines enterprise-wide policies with minimal automation
Common Challenges
- •Silos and complexities in managing identities across environments
- •Slow, inaccurate, and unable to adapt to evolving threats
- •Reliance on manual methods and static rules for risk assessment
- •Basic automated analysis of aggregated logs
- •Missing more complex patterns or anomalies that indicate security risks
- •Automation limited to non-privileged identity life cycle management
- •Gaps in managing access to highly sensitive accounts
- •Minimal automation of enterprise-wide policies
- •Inconsistencies and difficulties in ensuring policy enforcement across the organization
Path to Advanced Phase
Implement Continuous Authentication
Begin implementing risk-based authentication and continuous monitoring of user sessions.
Enhance Identity Governance
Develop comprehensive identity governance policies and automated compliance controls.
Implement Advanced Analytics
Deploy identity analytics tools to detect and respond to potential security threats.