Identity

Identity and Access Management Must be Strengthened

Share
Code id tech finger safety verification concept scan background lock identity cyberspace control digital computer access system biometric security fingerprint technology identification scanner

Identity and access management is intertwined with security and must be strengthened among organizations amid increasingly prevalent identity-related intrusions, SC Media reports. That's according cybersecurity leaders at a CyberRisk Collaborative roundtable.

Aside from adopting sophisticated monitoring and analytical systems, organizations should bolster IAM through improved controls enabled by context-aware multi-factor authentication and Microsoft Central Authorization Policies, a report from the roundtable group noted.

More robust IAM could also be achieved through the implementation of incident detection and response measures, consistent security audits ensuring adherence to the National Institute of Standards and Technology's Cybersecurity Framework and other regulations, as well as greater collaboration among security professionals. Such emphasis on the value of IAM was previously noted by Cisco Vice President of Product for Identity Security Matt Caulfield.

"Identity isn't just the new perimeter. It's the ONLY perimeter standing between attackers and the assets we're all charged with protecting. It's time we developed a more identity-centric strategy that reflects that reality," said Caulfield.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.