SESSION ID: IDY-R01 Scaling IAM Rules with ML-Based Risk Analytics? You Don’t Need to Be a Ninja Alex Zaslavsky Sudarsan Kannan Senior Principal Data Scientist RSA Consultant Manager RSA #RSAC #RSAC “No one does Security well” 2 #RSAC “No one does Identity-Risk Analytics Security well” 3 #RSAC Too many parameters… 4 We all want to grow at different paces! 5 #RSAC Your access control policies…Well Black list/whitelist AD attribute based Contextual/Dy namic rules it’s Complicated 6 #RSAC Rules are great for protecting your Identities! Rules Engine  Well defined requirements  Need to meet strict industry regulations or stronger compliance  Raw data (facts)  Ex: If (IP address = 192.168.x.x) Then do Y #RSAC Identity Risk Analytics  Complex correlation of multiple inputs to make identity decisions  Gives insights/tells a story/provides visibility on user’s access patterns  Managing rules becomes more complex as more facts (raw data) leading to policy ineffectiveness  Ex: If (IP_Type = Office) Then do Y. Office classification is done by the analytics engine 7 Risk Analytics can complement Rules in protecting those identities Use Risk Analytics for the UNKNOWN and rules for the KNOWN 8 #RSAC What may be your resistance in adopting Identity Risk Analytics? #RSAC Does implementing ML-Analytics driven decisions suit for your identity needs? Are you waiting to make a good security decision until some compelling event happens? Does your IAM team have the people and process layers to benefit from the decisions made by ML-Analytics? 9 #RSAC Master the invisibility – Your mental model Build your mental model to get past initial resistance Establish your business and security OBJECTIVES • Improve end-user experience • Measure access policy effectiveness • Manage security attacks Take control of your state (The PRESENT) • Understand your access policies and business drivers • Where does your data reside? • Who are your users? 11 #RSAC Understand your people, process & technology CONSTRAINTS • Skill sets / expertise • Cost • Time required to support and achieve your business and security goals #RSAC What is your compelling event? Type A - DNA Typical Characteristics • User Experience Productivity • • • • Eliminate Passwords 12 Experienced less impactful breaches Lesser dependency on end-user data that needs to be protected Basic compliance More focused on reducing cost Single IT team managing all security use-cases #RSAC What is your compelling event? Type B - DNA Typical Characteristics Mitigate Attacks Security Policies Regulations 13 • Heavily regulated and compliance is in their DNA • Lot of business impacting critical data (ex: financial) • Constantly under attacks • Dedicated security teams. • CRO/CISO have bigger role Define identity specific use-cases that needs to be addressed through dynamic rules Detection Techniques Use cases – A sample 1 2 3 Initial Access Privilege Escalation Lateral Movement • • • • • Looking at peer admin activity • Application access rate • Correlate ground speed identity • Understand application access rate • Device access rate Authentication velocity Ground speed Time of access Looking for type of device and device statistics 14 #RSAC #RSAC Bring your ML vision to life and mature it • • • • • • • • Unified decisions across apps More apps and rules Sharing of intelligence Continuous risk assessment of access patters 1 • • • • Build / Vendor partnership 3 • • • • • 2 Use Contextual policies Continue to add rules Analyze the data/insights Measure policy effectiveness 4 Data explosion Cloud transformation Third party identities Technology shift 15 Development expertise Data Science skills Security team dynamics Timeline objectives Financial backing #RSAC Should I be thinking about UEBA? 1 Understand the commonalities 2  How do your IAM and security teams interact?  How much of correlation and depth do you need?  Looking for broader insights and investigation power?  How much of manpower do you need to expend?  Do you need continuous improvement of IAM policies? 3 Where can you complement? START WITH YOUR PROBLEM DEFINE EXPECTED OUTCOME MAP OUTCOME TO PROBLEM • Helps make decisions at the moment of access due to being inline to user flow • Focusses more on access control objectives Learns near real time due to real time feedback • Helps you make quicker IAM policy decisions/changes 16

pdf文档 2020_USA20_IDY-R01_01_Scaling-IAM-Rules-with-ML-Based-Risk-Analytics

安全研究库 > 国外研究报告 > 数字身份 > 文档预览
32 页 0 下载 43 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2020_USA20_IDY-R01_01_Scaling-IAM-Rules-with-ML-Based-Risk-Analytics 第 1 页 2020_USA20_IDY-R01_01_Scaling-IAM-Rules-with-ML-Based-Risk-Analytics 第 2 页 2020_USA20_IDY-R01_01_Scaling-IAM-Rules-with-ML-Based-Risk-Analytics 第 3 页 2020_USA20_IDY-R01_01_Scaling-IAM-Rules-with-ML-Based-Risk-Analytics 第 4 页 2020_USA20_IDY-R01_01_Scaling-IAM-Rules-with-ML-Based-Risk-Analytics 第 5 页
下载文档到电脑,方便使用
还有 27 页可预览,继续阅读
本文档由 张玉竹2022-04-08 09:53:15上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言