Header image

#Infosec24: Clean AD to Secure User Identities

Securing users should include four levels and determining fragmented identities.

An identity-centric strategy should consist of securing users, applications, devices and networks

Speaking at Infosecurity Europe in London, Vivin Sathyan, technology consultant at ManageEngine, said those four parameters are required to all secure the user. “Start by securing user identities” he recommended, and start with Active Directory first, which he described as “a gold mine.”

In a clean up operation, Sathyan recommended looking at “fragmented identities” as too many users can have multiple identities, and these need to be unified “so frame a contextual policy irrespective of user and device” and have your access policies consider IP number, device, user, and risk score to help you secure them.

“Focus on prevention and preparing not to be hit, and the other side is to focus on detection and recovery – how soon you can recover and respond,” he said.

Dan Raywood
Dan Raywood

Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.

Dan Raywood
Dan Raywood

Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.

Upcoming Events

No events found.