How to Detect and Remediate Identity Threats; Solution 2: Remediate

Hannah Young
Hannah Young
.
June 13, 2023
5 min
 read

This is “Solution 2: Remediate” of a two-part series on “How to Detect and Remediate Identity Threats” (if you haven’t already, check out Solution 1: Detect first)! In this series, we provide solutions to the problems put forth in our parallel series “Defending Against Threats in Identity Security,” (both Part 1: Detect and Part 2: Remediate).

As we discuss in “Defending Against Threats in Identity Security; Part 2: Remediate,” current solutions already do not do enough to combat advanced security attacks or remediate them once they occur. While there are many pieces online about security incidents and how they happened or could have been prevented, it is rare to have genuine insight into what an affected organization does to remediate after an attack (e.g., EA’s brief response to their breach).

image titled “How ITDR Works With Infrastructure Security to Detect and Respond to Identity Threats”. On the left is a box with a skull icon titled “Identity Threats” and examples such as “Password spray,” “SAML golden ticket,” and “Unusual user activity,” this box has an arrow pointing to the right to a box titled “Identity Infrastructure.” The “Identity Infrastructure” box has examples like “AM,” “IGA,” “PAM,” and “MFA” and has an arrow pointing to the right to a box titled “ITDR.” The “ITDR” box has an infinity sign/loop encompassing “Detection” (symbolized with an eye) and “Response” (symbolized with a person talking at a podium) and is pointing to a box above it titled “Infrastructure Security and Operations.” The “Infrastructure Security and Operations” box has a fire icon and examples like “NDR,” “EDR,” “XDR,” “SIEM,” and “SOAR,” and is pointed back to the “ITDR” box below it. Below the “ITDR” box is a box titled “IT Infrastructure” that has a building icon named “On-Premises,” a cylindrical icon with 2D shapes inside named “Apps,” a cell phone icon named “Devices,” and a cloud icon named “Cloud.”

However, industry researchers are working overtime to discover and create new strategies, like the 2022 Gartner Report’s creation/coining of the ITDR (Identity Threat Detection and Response) discipline. According to the report, “ITDR is a security discipline that encompasses threat intelligence, best practices, a knowledge base, tools and processes to protect identity systems. It works by implementing detection mechanisms, investigating suspect posture changes and activities, and responding to attacks to restore the integrity of the identity infrastructure.”

In this two-part series, we break down how to both detect and remediate changing identity security threats. This is Solution 2: Remediation.

What do approaches to remediation currently look like?

Graph from the Gartner Report titled "ITDR Works as Second and Third Layers of Defense After Prevention” showing “Identity Threats” (symbolized by a skull) going through Prevention (MFA, IGA, etc.) and into “ITDR Responsibilities” split into “Detection” (symbolized with an eye) and “Response” (symbolized with a person speaking at a podium)

As is illustrated in the Gartner graphic above, remediation/response exists as a conclusive step in your identity security process after a threat has evaded preventative and detective measures. Gartner offers the recommendation to “master the response phase by building or updating playbooks and automation to include IAM enforcement within the steps taken to eradicate, recover from, report and remediate identity threats.”

Security playbooks can assume diverse formats, but they typically encompass a blueprint delineating the actions to take in the event of a security incident (Gartner provides several examples of playbooks in their “Cybersecurity Incident Response Plan” and “Creating a Ransomware Playbook” toolkits). Gartner offers a variety of strategies for these kinds of playbooks, including to “reset affected credentials, remove rogue and excessive accounts, patch systems, and rotate security keys” and “automating response actions.”

Playbook titled "Potential Malicious Indicator Identified" with a series of steps leading to "Investigation Complete" like "Identification of At Risk Assets", "Threat Detection Software and Services", and "Compromised Account Playbook"
Example playbook by IACD

Before automation, remediation was primarily handled on a case-by-case basis, typically triggered by an incident or “clean up” activities such as an audit or company initiative. Consequently, many companies cobbled together their own remediation tools and workflows, making solutions pretty ad-hoc overall. However, as can be seen in the emphasis added in the paragraph above, recent strategies have turned to automation in order to bolster their remediation efforts.

Note: When it comes to remediation strategies, it’s important to consider the context of company size. In larger enterprises, the security operations center (SOC) typically handles remediation tasks. However, in smaller companies without a dedicated SOC, individuals may assume multiple roles (including remediation work), such as being responsible for both infrastructure security and incident response for example. This transition towards automation becomes particularly beneficial for smaller companies, enabling them to move away from ad-hoc solutions.

Automation Remediation Conversation

Now, a category of tools known as SOAR (Security Orchestration, Automation, and Response), coined in 2017 by Gartner, is utilized for automated remediation. For instance, a SOAR workflow might be triggered when a user reports a stolen Okta session, automatically locking the user account and device(s), notifying their manager, scrambling the password, and generating a ticket for a SOC analyst to conduct a manual forensic investigation—both manual (SOC analyst has to lead a forensic investigation manually) and automated steps (user account is automatically locked).

Graph titled "SOAR Convergence of Three Technologies (SIRP, SOA and TIP)." There are three boxes, the first is titled "Security Incident Response Platforms (SIRPs)" with the bullets "-Case/Incident Management -Workflows -Incident Knowledgebase" and there's an arrow pointing from this box to a box titled "Security Orchestration and Automation (SOA)" with the bullet points "-Integrations -Play/Process/Workflow Automation -Playbook Management" and there's an arrow pointing to a box titled "Threat Intelligence Platforms (TIPs)" with the bullet points "-TI Aggregation, Curation, Distribution -Alert Enrichment -TI visualization" and arrow pointing to the original SIRPs box.

The major problem with auto-remediation is that it’s great in theory but, in practice, it brings on a slew of new issues. While SOAR offers the advantage of swift response, it also introduces challenges like potential data and productivity/opportunity costs when cold-cutting access, concerns regarding predictability and understanding the “when” and “what” of the automated remediation process, as well as the “cat and mouse” issue: the ongoing need to chase new strategies for every potential issue that comes up.

How to take advantage of auto-remediation without disrupting your org

To effectively leverage auto-remediation while ensuring uninterrupted business operations, it is crucial for your security team to have SOAR capabilities specifically designed for identity systems. These systems should be able to apply remediations that are appropriate to the level of risk involved. For example, when dealing with a signal you have low confidence in, it would be inappropriate to lock the entire user account. Instead, the focus should be on restricting access to highly sensitive applications only.

Additionally, self-service resolution paths are essential to making auto-remediation work for you and your organization. In the event of a locked user account, users should have the ability to restore access on their own, without relying on the involvement of the security or IT team. This is crucial because no detection method is flawless, and every minute wasted due to incorrect detection translates to costs for the business. Therefore, minimizing time-to-recovery as much as possible is paramount.

Comic of one person in a ponytail with a shirt that says "IT" on the back and one person in a suit and glasses who says "I notice in your disaster prevention plan the recovery objective time is 'whenever'."

Flexible, identity-cognizant remediation practices that balance org safety with productivity/user experience are not currently commonplace in remediation or threat detection software. However, solutions are starting to appear across the identity space, and we’ll talk more about them soon.

To get notified when we post more about these solutions (and to stay up to date with Crosswire on all things identity and infosec), sign up to receive our updates below!

More from our blog

CISOs on Identity Security Maturity in the Enterprise

CISOs Chris Castaldo and Tanner Randolph share insights on security maturity and identity in the enterprise.

Hannah Young
.
5 min
 read
Black Hat Guide for Conference Veterans

Whether this is your 1st or 21st time at Black Hat, these tips can help you weather a jam-packed and intense week.

Hannah Young
.
10 min
 read
You Should Feel ‘Positively’ About Your Security Tools: How We’re Mitigating False Positives in Identity Security

False positives are a huge problem in security: see what Crosswire is doing to prevent them and mitigate their effects.

Hannah Young
.
5 min
 read
Decoding the (Broken) Modern Identity Stack

We've made the modern identity stack entirely too convoluted and broken, but not for the reasons you think.

Hannah Young
.
10 min
 read
The Secret Third Step to Threat Detection and Response: Protection

How are you protecting your accounts before an incident can occur (or slowing an incident down before it really ramps up)?

Hannah Young
.
6 min
 read
How to Detect and Remediate Identity Threats; Solution 1: Detect

This is Solution 1: Detect of a two-part series on how to detect and remediate evolving identity threats.

Hannah Young
.
5 min
 read
AI D&R: AI (in Security) is Dead; Long Live AI (in Security)

Explore the historical use, modern approaches, and future applications of AI in detection and response (D&R).

Hannah Young
.
8 min
 read
Quick RSAC 2023 Recap: We’re Back (and Stronger Together)

From Armisen to AI/ML, catch up on what you missed from RSA Conference 2023 with Crosswire!

Hannah Young
.
4 min
 read
Defending Against Threats in Identity Security; Part 2: Remediate

This is Part 2: Remediate of a two-part series setting up emerging problems in identity security.

Hannah Young
.
6 min
 read
Why Now’s the Perfect Time to Join an Early-Stage Startup

If you’re looking for the right time to join a high-risk, high-reward venture, we’d argue that there’s never been a better opportunity.

Hannah Young
.
3 min
 read
It’s Not Just You: IT Security Audits are Stressful

IT security audits can be a pain for everyone involved: check out our solutions to make this auditing season just a little bit easier.

Hannah Young
.
5 min
 read
Why RBAC is obsolete

RBAC lacks sophistication and flexibility, failing to address the access needs of the modern company.

Hannah Young
.
3 min
 read
Defending Against Threats in Identity Security; Part 1: Detect

This is Part 1: Detect of a two-part series setting up emerging problems in identity security.

Hannah Young
.
5 min
 read
Identity Is a Co-owned Problem Between Security and IT

Who owns identity at your org? Identity is (and should be treated as) a co-owned problem between security and IT.

Hannah Young
.
5 min
 read
Your Okta Groups Should Be (Mostly) Empty

Yep, you heard that right; we at Crosswire believe that your Okta groups should be as empty as possible.

Hannah Young
.
2 min
 read
The Founding of Crosswire as Told by Its Values

Crosswire, and its co-founders Johnny and Nick, are building the future of enterprise identity in new and exciting ways.

Hannah Young
.
7 min
 read
RSA Conference™ 2023: Stronger Together

The theme for 2023’s RSA Conference™ is “Stronger Together.” When info security is more important than ever, so is collaboration.

Hannah Young
.
6 min
 read
6 Early Warning Signs of an Under-Resourced IT Organization

It’s no secret that your IT organization is crucial to your company. But are they getting all of the resources they need?

Hannah Young
.
5 min
 read
Cybersecurity Is More Critical Than Ever, and You (Yes, You) Can Do Something About It Now

Why cybersecurity is more crucial than ever and what you can do to make your organization more secure, no matter your role.

Hannah Young
.
7 min
 read
Understanding Automation: How To Do More Than You Have the Resources For

Five significant ways to improve your workflows with automation and get more results than your resources permit.

Hannah Young
.
5 min
 read
Google Workplace Organizational Units (OUs) according to Parks and Rec

What are Google Workplace Organizational Units, and how do they work (according to Parks and Rec)?

Hannah Young
.
5 min
 read
Practical Survival Guide to Okta Lifecycle Management

Crosswire’s technical usability guide to Okta Lifecycle Management (LCM), from onboarding to offboarding.

Hannah Young
.
6 min
 read
Authorization (AuthZ) and Authentication (AuthN): A Brief History

Authentication is who you are, and authorization is what you can do. Here, we dive into the history of these terms.

Hannah Young
.
5 min
 read