𝔖 Scriptorium
✦   LIBER   ✦

📁

Identity Attack Vectors: Strategically Designing And Implementing Identity Security

✍ Scribed by Morey J. Haber, Darran Rolls


Publisher
Apress
Year
2024
Tongue
English
Leaves
301
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives. This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization’s entire Identity Fabric. What You Will Learn:
• Understand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vector
• Implement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accounts
• Know the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak link
• Build upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystem
• Plan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectors
Who This Book Is For: Management and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments

✦ Table of Contents


Table of Contents
About the Authors
About the Technical Reviewer
About the Foreword Author
Acknowledgments
Foreword
Chapter 1: Introduction: “The Machine”
Chapter 2: Introduction: “The Human”
Chapter 3: An Identity Crisis
Chapter 4: Identity As a Business Function
Chapter 5: Identity Access Defined
Authentication
Authorization
Administration
Audit
Analytics
Chapter 6: Understanding Enterprise Identity
Personas
Physical Persona
Electronic Persona
Accounts
Password
Passcode
Passkey
Certificate
Credentials
Users
Applications
Machines
Ownership
Automation
Types of Accounts
Local Accounts
Centralized Accounts
Functional Accounts
Managed Accounts
Service Accounts
Application Accounts
Cloud Accounts
Entitlements
Simple Entitlement
Complex Entitlement
Roles
Business Roles
IT Roles
Roles and Least Privilege
Summary
Chapter 7: Identity and Access Management (IAM)
Architectures
Risks
Best Practices
Chapter 8: Privileged Access Management (PAM)
Chapter 9: Identity Threat Detection and Response (ITDR)
ITDR, EDR, and XDR
ITDR and Identity Governance and  Administration (IGA)
ITDR and IAM
Privileged Access Management (PAM) and ITDR
Chapter 10: Indicators of Compromise
Role-Based IoC
Hacking Techniques
Identity-Based IoCs
Chapter 11: Identity Attack Vectors
Methods
Tactics
Implications
Privileges
Chapter 12: The Identity Cyber Kill Chain
Part I: The Cyber Kill Chain
Reconnaissance
Infiltration
Exploitation
Exfiltration
Part II: Real-World Identity Attack
Part III: Identities Under Attack
Part IV: Old School
Chapter 13: Six Steps to Identity Security
1. Identity and Asset Management
2. Identity Accountability
3. Remote Access
4. Implement Least Privilege and Application Control
5. Integrate Directory Services
6. Identity Security
Chapter 14: Evolving Identity Security Threats
DevOps (Development Operations)
Synthetic Identities
Masquerade Attack
Operational Technology, IoT, and Nontraditional Endpoints
Robotic Process Automation (RPA)
Cyber Insurance
Artificial Intelligence
Secure Remote Access
Biometrics
Multifactor Authentication
Passwordless
Ransomware
Chapter 15: Complexity Inherent in the IAM System
Separate Products and Isolated Infrastructure
Doors and Corners
Managed Identity Services Platforms
Chapter 16: Identity Technical Debt
Chapter 17: Identity Digital Transformations
Chapter 18: Just-in-Time Access Management
Chapter 19: Zero Trust for Identity Security
Zero-Trust Details
Defining Zero-Trust Architectures
Zero-Trust Architectural Models
Least Privilege and Zero Trust
Privileged Account Control
Remote Access
Zero-Trust Least Privilege
Directory Bridging
Measuring Zero Trust
Zero-Trust Design Considerations
Chapter 20: Identity Obfuscation
Chapter 21: Regulatory Compliance
Overview
Compliance Example
US Regulatory Compliance
Global Regulatory Compliance
Regulatory Compliance Best Practices
The Future of Identity-Based Compliance
Chapter 22: Key Takeaways
Chapter 23: A Final Thought on Vendors
Chapter 24: Conclusion
Appendix A: Identity Security Sample RFP Questions
Business Justification
Universal Identity Security Capabilities
Privileged Access Management Capabilities
Zero-Trust Remote Access Technology
Endpoint Least Privilege
Identity and Directory Services Bridging
Appendix B: Department of Defense (DoD) Zero-Trust Framework
Index

✦ Subjects


Systems And Data Security


📜 SIMILAR VOLUMES


Identity Attack Vectors: Strategically D
✍ Morey J. Haber, Darran Rolls 📂 Library 📅 2024 🏛 Apress 🌐 English

Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or

Identity Attack Vectors: Implementing An
✍ Morey J. Haber, Darran Rolls 📂 Library 📅 2020 🏛 Apress 🌐 English

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t

Microsoft 365 Security, Compliance, and
✍ Peter Rising 📂 Library 📅 2023 🏛 Packt Publishing 🌐 English

<p><span>Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applications</span></p><p><span>Purchase of the print or Kindle book includes a free PDF eBook</span></p><h4><span>Key Features</span></h4><ul><li><span><span>D

Identity-Based Brand Management: Fundame
✍ Christoph Burmann, Nicola-Maria Riley, Tilo Halaszovich, Michael Schade, Kristin 📂 Library 📅 2023 🏛 Springer Gabler 🌐 English

<p><span>This textbook provides a comprehensive overview of identity-based brand management based on current research. The authors focus on the design of the brand identity, which covers the internal perspective of brand management, and the resulting external brand image perceived by consumers and o

Identity-Based Brand Management: Fundame
✍ Christoph Burmann; Nicola-Maria Riley; Tilo Halaszovich; Michael Schade; Kristin 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

This textbook provides a comprehensive overview of identity-based brand management based on current research. The authors focus on the design of the brand identity, which covers the internal perspective of brand management, and the resulting external brand image perceived by consumers and other audi