What is ITDR?

Hannah Young
Hannah Young
.
October 19, 2023
5 min
 read

ITDR stands for Identity Threat Detection and Response, a term coined in the 2022 Gartner Report. According to the report, “ITDR is a security discipline that encompasses threat intelligence, best practices, a knowledge base, tools and processes to protect identity systems. It works by implementing detection mechanisms, investigating suspect posture changes and activities, and responding to attacks to restore the integrity of the identity infrastructure.”

What does an Identity Threat Detection and Response tool do?

Detection and Response

As the name implies, ITDR tools detect identity threats. They detect suspicious activity primarily dynamically (real-time identity compromises in your environment), but they can also cover static issues (gaps in static configurations).

However, detection alone is not enough. Given that identity products tend to produce a sizeable amount of false positives, if an admin has to sift through each one individually, that’s a substantial amount of extra work. Similarly, when there’s an active threat in your environment, time to response becomes crucial to containing a breach and minimizing the attack radius. So, the automated response aspect of ITDR tools helps to ease those problems.

Identity

Three panel comic. First panel shows a woman with a face mask sitting across from a short haired man with a face mask and she is saying "Our Zero Trust SIEM will SOAR your DMZ...". The second panel shows the same image with a new speech bubble of the woman saying "And it WAFs your IGA enabled IPS for the IAM...". The third panel shows the woman holding up a pamphlet and saying "And our Cloud Based ML adds SASE to your Splunk" while the man turns to the camera and says "Thank God they're cancelling RSA.".

Every organization of significant size has identity problems since there always needs to be some system for identifying employees, machines, and services. As a result, identity practices tend to look substantially similar across most enterprises (a concept we expand on in “CISOs on Identity Security Maturity in the Enterprise”). So, for instance, I can go secure Salesforce’s identity stack and that process will look substantially similar to securing the identity stack at Notion, Asana, and so on. This, coupled with the fact that employee identity management is rarely a revenue center for a business, leads to a logical outsourcing of identity (especially ITDR) to SaaS products.

This helps companies reduce costs because instead of every org using their resources to recreate the same tool, baseline ITDR measures can be implemented and allow in-house teams to specialize. So, continuing the example, now Salesforce’s in-house detection team can specialize in detecting threats specific to Salesforce and Notion’s can focus on detecting threats specific to Notion while their ITDR SaaS covers their shared ground.

Why does identity need its own detection and response solution?

Graph from the Gartner Report titled "ITDR Works as Second and Third Layers of Defense After Prevention” showing “Identity Threats” (symbolized by a skull) going through Prevention (MFA, IGA, etc.) and into “ITDR Responsibilities” split into “Detection” (symbolized with an eye) and “Response” (symbolized with a person speaking at a podium)

Part of what makes identity so difficult is that there isn’t a good source of truth for identity TTPs, specifically cloud-native IdP TTPs, meaning you need to do a ton of research to identify what’s out there, and then continue maintaining that work.

A common misconception is that identity governance is all that you need in terms of securing your identity, but just because you have access rules and onboarding/offboarding workflows doesn’t mean that you’re detecting threats.

image titled “How ITDR Works With Infrastructure Security to Detect and Respond to Identity Threats”. On the left is a box with a skull icon titled “Identity Threats” and examples such as “Password spray,” “SAML golden ticket,” and “Unusual user activity,” this box has an arrow pointing to the right to a box titled “Identity Infrastructure.” The “Identity Infrastructure” box has examples like “AM,” “IGA,” “PAM,” and “MFA” and has an arrow pointing to the right to a box titled “ITDR.” The “ITDR” box has an infinity sign/loop encompassing “Detection” (symbolized with an eye) and “Response” (symbolized with a person talking at a podium) and is pointing to a box above it titled “Infrastructure Security and Operations.” The “Infrastructure Security and Operations” box has a fire icon and examples like “NDR,” “EDR,” “XDR,” “SIEM,” and “SOAR,” and is pointed back to the “ITDR” box below it. Below the “ITDR” box is a box titled “IT Infrastructure” that has a building icon named “On-Premises,” a cylindrical icon with 2D shapes inside named “Apps,” a cell phone icon named “Devices,” and a cloud icon named “Cloud.”

In other words, even proper configuration of your IdP doesn’t save you from needing to look for identity threats. For example, just because you disabled SMS as a second factor for your employees doesn’t mean you’re safe: an attacker could phish one of your IdP admins, enable SMS as a factor, disable an employee’s authenticator factor, and enable SMS to bypass your MFA, so at minimum, you need protections in place that can alert you when these things happen.

Identity threat detection is also not just vanilla detection engineering. Detection engineers have to spend their time on all sorts of things, from network traffic analysis (like firewall logs) to host analysis (like MDM logs) to cloud analysis (like AWS logs). This makes identity tricky because there may not be a dedicated person looking for identity threats, which require dedicated research and analysis, and might require different log sources (like Okta logs) while your detection engineering team divides its attention across several domains.

What about D&R (Detection & Response) Hunts?

Three-panel comic titled “Little Bobby.” The first panel shows a young kid standing on a stage in front of a crowd saying “—And THAT’S why you need threat hunting.” while a person from the audience raises a hand and says “OUR product now does threat hunting!” The second panel shows the kid saying “—and be sure to use threat behavior analytics for detection.” and the same person from the audience, with a frantic expression, says (in an exclamatory speech bubble) “our anomaly detection is now THREAT BEHAVIORAL ANOMALY DETECTION!!” The last panel shows the kid, with an exasperated expression, saying “Investigations are also key—” before he is cut off by the same person from the audience with another exclamatory speech bubble that says “And now we have investigations powered by blockchain!!!” with the kid responding “Dude, stop.”

The traditional D&R “hunt” model is designed to look for a very specific pattern within a single timespan (for example, >10 GB data exfiltrated over 7 days). On the contrary, identity-related threats often emerge as some kind of abnormal user behavioral pattern that are revealed through continuous observation of a user behavioral baseline (for example, a user has never logged in on this day of the week for the last year). This is exacerbated by a shortage of talent who knows identity-related security issues well, resulting in bad hunts that don’t detect relevant identity-security problems or miss signals that emerge.

The ITDR TL;DR

Identity Threat Detection and Response (ITDR) tools play a crucial role in safeguarding identity systems against threats by, in Gartner’s words, “implementing detection mechanisms, investigating suspect posture changes and activities, and responding to attacks to restore the integrity of the identity infrastructure.”

Crosswire logo and "Crosswire" written over a cyan, blue, white, pink, and orange gradient background

The complexity and universality of identity necessitates the need for dedicated ITDR solutions and makes the outsourcing of ITDR to SaaS products like Crosswire a method of reducing costs and enabling in-house teams to specialize in detecting threats specific to their respective environments.

To stay up to date with Crosswire and see how your organization fits into the future of ITDR, contact us for a demo here and subscribe to our blog below!

More from our blog

UPDATE: Customer Impact in the Okta Salesforce Breach

An update on Crosswire and the September 2023 breach of Okta’s Salesforce instance.

Crosswire Security Team
.
1 min
 read
Breaking Down the October 2023 Okta Breach

A comprehensive timeline and breakdown of the October 2023 Okta Support Case Management System breach.

Hannah Young
.
7 min
 read
October 2023 Okta Compromise Guidance

In light of October 2023 Okta support compromise, Crosswire sent the following message to its customers.

Crosswire Security Team
.
5 min
 read
CISOs on Identity Security Maturity in the Enterprise

CISOs Chris Castaldo and Tanner Randolph share insights on security maturity and identity in the enterprise.

Hannah Young
.
5 min
 read
Black Hat Guide for Conference Veterans

Whether this is your 1st or 21st time at Black Hat, these tips can help you weather a jam-packed and intense week.

Hannah Young
.
10 min
 read
You Should Feel ‘Positively’ About Your Security Tools: How We’re Mitigating False Positives in Identity Security

False positives are a huge problem in security: see what Crosswire is doing to prevent them and mitigate their effects.

Hannah Young
.
5 min
 read
Decoding the (Broken) Modern Identity Stack

We've made the modern identity stack entirely too convoluted and broken, but not for the reasons you think.

Hannah Young
.
10 min
 read
The Secret Third Step to Threat Detection and Response: Protection

How are you protecting your accounts before an incident can occur (or slowing an incident down before it really ramps up)?

Hannah Young
.
6 min
 read
How to Detect and Remediate Identity Threats; Solution 2: Remediate

This is Solution 2: Remediate of a two-part series on how to detect and remediate evolving identity threats.

Hannah Young
.
5 min
 read
How to Detect and Remediate Identity Threats; Solution 1: Detect

This is Solution 1: Detect of a two-part series on how to detect and remediate evolving identity threats.

Hannah Young
.
5 min
 read
AI D&R: AI (in Security) is Dead; Long Live AI (in Security)

Explore the historical use, modern approaches, and future applications of AI in detection and response (D&R).

Hannah Young
.
8 min
 read
Quick RSAC 2023 Recap: We’re Back (and Stronger Together)

From Armisen to AI/ML, catch up on what you missed from RSA Conference 2023 with Crosswire!

Hannah Young
.
4 min
 read
Defending Against Threats in Identity Security; Part 2: Remediate

This is Part 2: Remediate of a two-part series setting up emerging problems in identity security.

Hannah Young
.
6 min
 read
Why Now’s the Perfect Time to Join an Early-Stage Startup

If you’re looking for the right time to join a high-risk, high-reward venture, we’d argue that there’s never been a better opportunity.

Hannah Young
.
3 min
 read
It’s Not Just You: IT Security Audits are Stressful

IT security audits can be a pain for everyone involved: check out our solutions to make this auditing season just a little bit easier.

Hannah Young
.
5 min
 read
Why RBAC is obsolete

RBAC lacks sophistication and flexibility, failing to address the access needs of the modern company.

Hannah Young
.
3 min
 read
Defending Against Threats in Identity Security; Part 1: Detect

This is Part 1: Detect of a two-part series setting up emerging problems in identity security.

Hannah Young
.
5 min
 read
Identity Is a Co-owned Problem Between Security and IT

Who owns identity at your org? Identity is (and should be treated as) a co-owned problem between security and IT.

Hannah Young
.
5 min
 read
Your Okta Groups Should Be (Mostly) Empty

Yep, you heard that right; we at Crosswire believe that your Okta groups should be as empty as possible.

Hannah Young
.
2 min
 read
The Founding of Crosswire as Told by Its Values

Crosswire, and its co-founders Johnny and Nick, are building the future of enterprise identity in new and exciting ways.

Hannah Young
.
7 min
 read
RSA Conference™ 2023: Stronger Together

The theme for 2023’s RSA Conference™ is “Stronger Together.” When info security is more important than ever, so is collaboration.

Hannah Young
.
6 min
 read
6 Early Warning Signs of an Under-Resourced IT Organization

It’s no secret that your IT organization is crucial to your company. But are they getting all of the resources they need?

Hannah Young
.
5 min
 read
Cybersecurity Is More Critical Than Ever, and You (Yes, You) Can Do Something About It Now

Why cybersecurity is more crucial than ever and what you can do to make your organization more secure, no matter your role.

Hannah Young
.
7 min
 read
Understanding Automation: How To Do More Than You Have the Resources For

Five significant ways to improve your workflows with automation and get more results than your resources permit.

Hannah Young
.
5 min
 read
Google Workplace Organizational Units (OUs) according to Parks and Rec

What are Google Workplace Organizational Units, and how do they work (according to Parks and Rec)?

Hannah Young
.
5 min
 read
Practical Survival Guide to Okta Lifecycle Management

Crosswire’s technical usability guide to Okta Lifecycle Management (LCM), from onboarding to offboarding.

Hannah Young
.
6 min
 read
Authorization (AuthZ) and Authentication (AuthN): A Brief History

Authentication is who you are, and authorization is what you can do. Here, we dive into the history of these terms.

Hannah Young
.
5 min
 read