Identity threat detection and response (ITDR) is a
cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
discipline that includes tools and best practices to protect
identity management infrastructure from attacks. ITDR can block and detect
threats
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
, verify administrator credentials, respond to various attacks, and restore normal operations.
Common identity threats include
phishing
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
, stolen credentials,
insider threats, and
ransomware
Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, m ...
.
ITDR adds an extra layer of security to
identity and access management (IAM) systems. It helps secure accounts, permissions, and the identity infrastructure itself from compromise. With attackers targeting identity tools directly, ITDR is becoming more important in 2023 : according to
Gartner
Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients ...
, established IAM hygiene practices like
privileged access management
Privileged Access Management (PAM) is a type of identity management and branch of cybersecurity that focuses on the control, monitoring, and protection of privileged accounts within an organization. Accounts with privileged status grant users enh ...
and identity governance are no longer enough.
ITDR can be part of a
zero trust security model. ITDR is especially relevant for
multicloud infrastructures, which have gaps between cloud providers' distinct IAM implementations. Closing these gaps and orchestrating identity across clouds is an ITDR focus.
Functionalities
ITDR enhances
identity and access management (IAM) by adding detection and response capabilities. It provides visibility into potential credential misuse and abuse of privileges. ITDR also finds gaps left by IAM and
privileged access management
Privileged Access Management (PAM) is a type of identity management and branch of cybersecurity that focuses on the control, monitoring, and protection of privileged accounts within an organization. Accounts with privileged status grant users enh ...
(PAM) systems.
ITDR requires monitoring identity systems for misuse and compromise. It uses lower latency detections than general security systems. ITDR involves coordination between IAM and security teams.
ITDR uses the
MITRE ATT&CK framework against known attack vectors. It combines foundational IAM controls like
multi-factor authentication
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
with monitoring. ITDR prevents compromise of admin accounts and credentials. It modernizes infrastructure through standards like
OAuth 2.0.
Organizations adopt ITDR to complement IAM and
endpoint detection and response. ITDR specifically monitors identity systems and user activity logs for attacks. It can isolate affected systems and gather forensic data. Adoption requires budget, training, and buy-in. Organizations can start with IAM fundamentals like
multi-factor authentication
Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
and
role-based access control
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users. It is an approach to implement mandatory access control (MAC) or discretionary access control ...
.
ITDR tools can find misconfigurations in
Active Directory
Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was used only for centr ...
. Strategies can update firewalls, intrusion systems, and security apps. ITDR integrates with
SIEM Siem is a surname. Notable people with the surname include:
*Charlie Siem (born 1986), British violinist
* Kjetil Siem (born 1960), Norwegian businessperson, journalist, author and sports official
* Kristian Siem (born 1949), Norwegian businessman
...
tools for threat monitoring and automated response. An ITDR incident response plan handles compromised credentials and privilege escalation. Awareness training teaches users to spot identity-based attacks.
History
ITDR emerged as a distinct cybersecurity segment in 2022. The term was coined by
Gartner
Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients ...
.
ITDR Vendors
According to
Gartner
Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients ...
, ITDR vendors include Authomize,
CrowdStrike
CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides cloud workload and endpoint security, threat intelligence, and cyberattack response services. The company has been involved in inves ...
, Gurucul,
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
, Netwrix, Oort,
Proofpoint, Quest Software, Semperis,
SentinelOne, and Silverfort.
Difference between ITDR and EDR
While EDR detects issues on endpoints, ITDR concentrates on monitoring and analyzing user activity and access management logs to uncover malicious activity. It gathers data from multiple identity and access management (IAM) sources across on-premises and cloud environments. Together they give a more complete picture to improve detection and response to sophisticated attacks involving lateral movement and identity deception.
References
{{reflist
See also
*
Red team
A red team or team red are a group that plays the role of an enemy or competitor to provide security feedback from that perspective. Red teams are used in many fields, especially in cybersecurity, airport security, law enforcement, the military ...
*
Breach and attack simulation
*
Security orchestration
Security software