Header image

#Infosec24: Clean AD to Secure User Identities

Securing users should include four levels and determining fragmented identities.

An identity-centric strategy should consist of securing users, applications, devices and networks

Speaking at Infosecurity Europe in London, Vivin Sathyan, technology consultant at ManageEngine, said those four parameters are required to all secure the user. “Start by securing user identities” he recommended, and start with Active Directory first, which he described as “a gold mine.”

In a clean up operation, Sathyan recommended looking at “fragmented identities” as too many users can have multiple identities, and these need to be unified “so frame a contextual policy irrespective of user and device” and have your access policies consider IP number, device, user, and risk score to help you secure them.

“Focus on prevention and preparing not to be hit, and the other side is to focus on detection and recovery – how soon you can recover and respond,” he said.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image