ITDR is an approach to protecting the integrity of your identity systems in an era when identity has become a basic business need and the new network perimeter. The controls, threat intelligence and processes in Identity Threat Detection and Response enable you to detect and respond to identity threats that elude the protection provided by your identity and access management (IAM) tools.
Your identity systems are designed for prevention and built around tools like IAM, privileged access management (PAM) and identity governance and administration (IGA) to stop illicit network access. They strengthen account hygiene and keep you ahead of attackers by exposing and mitigating misconfigurations. They identify and apply additional prevention to protect your business-critical assets.
Identity systems are part of your competitive advantage, making collaboration possible among your employees, customers and business partners. No wonder those systems have become ripe targets for cybercriminals attempting to steal credentials (usernames and passwords), thwart multifactor authentication (MFA) and undermine prevention outright.
Identity Threat Detection and Response reinforces your up-front prevention with detection – continuous monitoring of factors like indicators of compromise (IOC) and user behavior analytics (UBA). When a threat is identified, ITDR processes and tools apply a response aimed at neutralizing it, mitigating the risk of breach and providing for recovery back to a known good state.
Network Detection and Response (NDR) focuses on finding and stopping abnormal behavior in network traffic, which has long been the main focus of enterprise security. NDR includes firewalls and deep packet inspection to keep attackers out by continuously analyzing raw network packets or traffic metadata in search of anomalous behavior. It is designed to detect the results of a data breach, such as ransomware, insider threats and lateral movement within the network.
NDR relates to malware defenses (CIS Control 8) and implementing a security awareness and training program (Control 17). In the NIST Framework, NDR supports three aspects: protect, detect and respond.
Endpoint Detection and Response (EDR) corresponds to the growth in computing on endpoints (workstations, laptops, tablets, mobile devices), especially outside of the network perimeter. As attacks on endpoints have increased, EDR has emerged as an approach for defending against security threats by monitoring and analyzing the activity of the organization’s endpoints. It detects when threats have been identified; provides investigation, response and alerts; and retains endpoint data for historical analysis and threat hunting.
EDR supports the limitation and control of network ports, protocols and services (CIS Control 9) and boundary defense (Control 12). In the NIST Framework, EDR covers two aspects: detect and respond.
Extended detection and response (XDR) is focused on security incident detection and automated response across the infrastructure. XDR tools integrate cyber threat intelligence and telemetry data from multiple sources. They turn the data into security analytics that help security operations center (SOC) and incident response teams see security alerts in context and connect the dots among them. The tools are also capable of automating responses to threats according to playbooks.
XDR covers controlled use of administrative privileges (CIS Control 4), malware defenses (Control 8) and application software security (Control 18). In the NIST Framework, XDR deals with two aspects: detect and respond.
AD is the centerpiece of the identity system in many enterprises. As such, it is continually used as an attack vector both in the data center and to move to the cloud or Microsoft 365 for greater access.
AD TDR is focused on defending against threats to AD, for example by using a platform-specific tool to detect and send alerts on the misuse of the AD Group Policy infrastructure. Attackers try to exploit Group Policy because of its systems management capability inside the AD identity platform. AD TDR detects changes to Group Policy Objects and any affected identities, then responds according to an identity threat playbook or by notifying security teams. It protects the secure operation of AD as an integral part of the enterprise identity infrastructure.
As Gartner notes, “AD TDR tools fulfill this mission by applying threat intelligence, behavioral signatures, heuristics, statistical analysis, analyses of known tactics, techniques and procedures (TTPs) and machine learning algorithms to discover indicators of exposure and indicators of compromise in Active Directory.”
As organizations make it easier for employees, customers and business partners to access their data from anywhere with any device, identity becomes the new perimeter – the key to that access. As a result, attacks on users’ identities and on the identity systems themselves have increased in frequency and force.
Enterprises that subscribe to Identity Threat Detection and Response effectively give identity its own security discipline based on prevention, detection and response: