<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Josh Karnes, Author at OneLogin Identity Management Blog</title>
	<atom:link href="https://www.onelogin.com/blog/author/josh-karnes/feed" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Best Practices &#38; Advice</description>
	<lastBuildDate>Mon, 27 Nov 2023 14:42:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.3</generator>
	<item>
		<title>Strengthening Cyber Defenses: The Crucial Role of PAM and IGA Solutions</title>
		<link>https://www.onelogin.com/blog/strengthening-cyber-defenses-the-crucial-role-of-pam-and-iga-solutions</link>
		
		<dc:creator><![CDATA[Josh Karnes]]></dc:creator>
		<pubDate>Mon, 27 Nov 2023 14:42:11 +0000</pubDate>
				<category><![CDATA[OneLogin]]></category>
		<guid isPermaLink="false">https://www.onelogin.com/blog/?p=1428</guid>

					<description><![CDATA[<p>We recently published a blog titled Defending Your Organization Against Session Cookie Replay Attacks. This blog thoroughly examined the menace of session cookie replay attacks, shedding light on the potential risks and consequences they pose to online security. The post delved into the intricacies of session cookie replay attacks, detailing their working mechanisms and the [&#8230;]</p>
<p>The post <a href="https://www.onelogin.com/blog/strengthening-cyber-defenses-the-crucial-role-of-pam-and-iga-solutions">Strengthening Cyber Defenses: The Crucial Role of PAM and IGA Solutions</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-1429" src="https://www.onelogin.com/blog/wp-content/uploads/2023/11/BlogImage-Cookie-Replay-Attacks-vol2-PG-85707-03.png" alt="Strengthening Cyber Defenses: The Crucial Role of PAM and IGA Solutions" width="1100" height="500" srcset="https://www.onelogin.com/blog/wp-content/uploads/2023/11/BlogImage-Cookie-Replay-Attacks-vol2-PG-85707-03.png 1100w, https://www.onelogin.com/blog/wp-content/uploads/2023/11/BlogImage-Cookie-Replay-Attacks-vol2-PG-85707-03-300x136.png 300w, https://www.onelogin.com/blog/wp-content/uploads/2023/11/BlogImage-Cookie-Replay-Attacks-vol2-PG-85707-03-1024x465.png 1024w, https://www.onelogin.com/blog/wp-content/uploads/2023/11/BlogImage-Cookie-Replay-Attacks-vol2-PG-85707-03-768x349.png 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></p>
<p>We recently published a blog titled <a href="https://www.onelogin.com/blog/defending-your-organization-against-session-cookie-replay-attacks" rel="noopener noreferrer"><em>Defending Your Organization Against Session Cookie Replay Attacks</em></a>. This blog thoroughly examined the menace of session cookie replay attacks, shedding light on the potential risks and consequences they pose to online security. The post delved into the intricacies of session cookie replay attacks, detailing their working mechanisms and the extensive damage they can inflict and emphasizing the imperative need to comprehend and fortify against such threats.</p>
<p>As a quick recap, session cookie replay attacks involve the malicious use of stored session cookies to impersonate a user on a targeted website, typically acquired through methods like malware, Man-in-the-Middle attacks or the compromise of support systems. The repercussions extend from hijacking user accounts to compromising sensitive data and even potentially taking over an entire access management system.</p>
<p>Given the continuously evolving cyber threat landscape, the urgency to establish robust defense strategies against session cookie replay attacks and other sophisticated security breaches has escalated. It is clear that fortifying cybersecurity defenses for these evolving threats cannot be accomplished fully with access management solutions alone. Organizations should adopt a multi-layered approach that also includes the advanced capabilities found in Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. This blog further explores this integrated approach to countering session cookie replay attacks and similar threats.</p>
<h3 id="mcetoc_1hfpd2fcl0"><strong>Defending against session cookie attacks by integrating access management, PAM and IGA using the Unified Identity Platform</strong></h3>
<p>Protecting vulnerable accounts from unauthorized access in the form of session cookie replay attacks may be best handled with a multi-layered approach including access management, Privileged Access Management (PAM), and <a href="https://www.oneidentity.com/what-is-iga/" target="_blank" rel="noopener">Identity Governance and Administration (IGA)</a> tools working together. These three layers can be summarized as follows:</p>
<p><strong>Protect privileged accounts</strong></p>
<p>Restrict access to sensitive or high-risk accounts, including admin accounts on your access management system, by requiring access through a <a href="https://www.oneidentity.com/learn/what-is-a-privileged-access-management-pam-tool.aspx" target="_blank" rel="noopener noreferrer">Privileged Access Management (PAM) tool</a>. Using a PAM system to control access to these accounts enables session recording and control, real-time monitoring of privileged access, password rotation and just-in-time privilege assignment.</p>
<p><strong>Detect rogue actors</strong></p>
<p>Control access to vaulted privileged accounts protected by the PAM solution by limiting <a href="https://www.onelogin.com/learn/how-single-sign-on-works" rel="noopener noreferrer">SSO</a> access to only authorized users in your access management system. Users must securely authenticate into the access management system to have access to the PAM tool. A user security policy for these admin and privileged users should be employed to restrict access to only trusted devices and to limit the session inactivity timeout to a small timeframe, such as five minutes. This will reduce the opportunity timeframe for attempted session cookie replay attacks to the shortest possible time.</p>
<p>Since access to these admin accounts are granted only through the PAM tool, the admin account should be deactivated and the session should be closed right after the administrative tasks are complete, so a short inactivity timeout would not cause undue inconvenience to the administrative users. Additionally, an application security policy should be employed to require reauthentication and MFA whenever the PAM application is launched.</p>
<p>Further, a module of the PAM system should apply user behavior analytics, which can distinguish the attacker from the authorized user of the account by analyzing keystrokes and mouse movement patterns. With this capability employed, the session can be terminated automatically when such an attack is detected.</p>
<p><strong>Enforce and remediate</strong></p>
<p>Use <a href="https://www.onelogin.com/learn/rbac-vs-abac" rel="noopener noreferrer">Role-Based Access Control (RBAC)</a> from the Identity Governance and Administration (IGA) solution to assign access to the privileged accounts within the PAM system, and to assign access to the PAM application on the user’s access management dashboard to only authorized administrative and privileged users, creating a condition of least privilege. These RBAC policies should reduce the attack surface by revoking unneeded access for users who have been terminated or who have changed job roles, revoking PAM system’s privileged account access and assigning the PAM application in the access management tool.</p>
<p>Use policies to ensure the access control security policies in the access management system are correctly applied to users, admins and the <a href="https://www.oneidentity.com/what-is-privileged-access-management/" target="_blank" rel="noopener noreferrer">PAM application</a>. Additionally, use policies to detect rogue or orphaned accounts which may be vulnerable to attack. Employ regular access reviews in the form of attestations or certifications to ensure least privilege is maintained.</p>
<h3 id="mcetoc_1hfpd2fcl1"><strong>Conclusion</strong></h3>
<p>A successful <a href="https://www.oneidentity.com/what-is-a-unified-identity-security-platform/" target="_blank" rel="noopener noreferrer">unified approach</a> uses the whole cybersecurity toolkit in an integrated fashion to create this multilayered approach to identity security. The One Identity Unified Identity Platform provides the necessary framework to most effectively defend against session cookie replay attacks and to ensure the organization remains protected.</p>
<p>Used together within the One Identity Unified Identity Platform, access management, PAM, and IGA can build a layered defense against session cookie replay attacks and other evolving cyber threats. This integrative approach enables the innovation needed to create best practices, empowering organizations to stay ahead in the face of emerging threats.</p>
<h3 id="mcetoc_1hfpd2fcl2"><strong>Call to Action</strong></h3>
<p>We urge organizations to consider the adoption of the One Identity Unified Identity Platform, including access management, PAM and IGA working together to fortify their defense mechanisms against emerging cyber threats. Embracing a comprehensive security strategy and adapting to the evolving threat landscape are critical steps toward safeguarding digital assets.</p>
<p>The post <a href="https://www.onelogin.com/blog/strengthening-cyber-defenses-the-crucial-role-of-pam-and-iga-solutions">Strengthening Cyber Defenses: The Crucial Role of PAM and IGA Solutions</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations</title>
		<link>https://www.onelogin.com/blog/breaking-down-silos-why-integrated-access-management-and-iga-is-crucial-for-modern-organizations</link>
		
		<dc:creator><![CDATA[Josh Karnes]]></dc:creator>
		<pubDate>Mon, 08 May 2023 15:16:24 +0000</pubDate>
				<category><![CDATA[Identity Governance and Administration]]></category>
		<category><![CDATA[Access Management]]></category>
		<category><![CDATA[IGA]]></category>
		<guid isPermaLink="false">https://www.onelogin.com/blog/?p=1325</guid>

					<description><![CDATA[<p>Identity and Access Management (IAM) in most organizations is typically provided by Access Management, Privileged Access Management (PAM) and Identity Governance and Administration (IGA) solutions. Unfortunately, many of these solutions work independently in silos, and efforts to integrate them to work together can be patchwork at best. Even if each pillar across Access Management, PAM [&#8230;]</p>
<p>The post <a href="https://www.onelogin.com/blog/breaking-down-silos-why-integrated-access-management-and-iga-is-crucial-for-modern-organizations">Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignnone size-full wp-image-1326" src="https://www.onelogin.com/blog/wp-content/uploads/2023/05/BlogImage-Behavior-Driven-Gvernance-PG-78356-v2.jpg.optimal.jpg" alt="BlogImage-Behavior-Driven-Gvernance" width="1100" height="500" srcset="https://www.onelogin.com/blog/wp-content/uploads/2023/05/BlogImage-Behavior-Driven-Gvernance-PG-78356-v2.jpg.optimal.jpg 1100w, https://www.onelogin.com/blog/wp-content/uploads/2023/05/BlogImage-Behavior-Driven-Gvernance-PG-78356-v2-300x136.jpg.optimal.jpg 300w, https://www.onelogin.com/blog/wp-content/uploads/2023/05/BlogImage-Behavior-Driven-Gvernance-PG-78356-v2-1024x465.jpg.optimal.jpg 1024w, https://www.onelogin.com/blog/wp-content/uploads/2023/05/BlogImage-Behavior-Driven-Gvernance-PG-78356-v2-768x349.jpg.optimal.jpg 768w" sizes="(max-width: 1100px) 100vw, 1100px" /></p>
<p><a href="https://www.onelogin.com/learn/iam" target="_blank" rel="noopener noreferrer">Identity and Access Management (IAM)</a> in most organizations is typically provided by Access Management, <a href="/what-is-privileged-access-management/" target="_blank" rel="noopener noreferrer">Privileged Access Management (PAM)</a> and <a href="/what-is-iga/" target="_blank" rel="noopener noreferrer">Identity Governance and Administration (IGA)</a> solutions. Unfortunately, many of these solutions work independently in silos, and efforts to integrate them to work together can be patchwork at best. Even if each pillar across Access Management, PAM and IGA work flawlessly independently, there’s still plenty of opportunity for bad actors to exploit the gaps between them to gain access to critical systems. Integrating these solutions can result in increased identity security effectiveness.</p>
<p>Let’s talk through an example use case of how gaps in Access Management and IGA tools can manifest.</p>
<h3 id="mcetoc_1gufj1bqi0">Example Use Case: Zoom</h3>
<p>The transition to work-from-home and remote learning led to an explosion in growth for Zoom. To end users, Zoom is just an application. However, Zoom offers a selection of three user roles that can apply to an account:</p>
<ul>
<li><strong>Owner:</strong> Has all privileges that include role management</li>
<li><strong>Admin:</strong> Can add, remove or edit users, as well as manage advanced features, such as API, <a href="https://www.onelogin.com/learn/how-single-sign-on-works" target="_blank" rel="noopener noreferrer">SSO</a>, Billing, Meeting Connector and App Marketplace</li>
<li><strong>Members:</strong> Have no administrative privileges and can only adjust their own user settings, unless locked by an admin at the Account or Group level settings</li>
</ul>
<p>For organizations that use Access Management solutions, that means users have, at minimum:</p>
<ul>
<li>An account with the Access Management system</li>
<li>The Zoom app assigned to the account, likely via a role (an entitlement)</li>
<li>A Zoom account</li>
<li>The correct role assignment for their user type in Zoom (an entitlement)</li>
<li>A license for the Zoom account</li>
</ul>
<p>As in-office work and in-person learning have resumed, Zoom usage within many organizations has decreased.</p>
<p>Access Management solutions don’t typically govern the Zoom account, or the entitlements applied, whether it’s roles, group memberships or license status for the account. Typically, this is handled by an <a href="/what-is-iga/" target="_blank" rel="noopener noreferrer">IGA solution</a>.</p>
<p>As a result, the Access Management solution will continue doing its job controlling user authentication, while the IGA tool will continue to give users <a href="https://www.oneidentity.com/what-is-the-principle-of-least-privilege/">least privilege access</a> based on their role.</p>
<p>However, if a user is no longer using Zoom—or any other application for that matter—they will continue to have access to that application, even if they’re no longer actively using it.</p>
<p>Permissions and continued access to Zoom after it’s no longer used—on the whole—may seem to be low stakes at first. However, at the end of the day, risk is not only represented by that unused Zoom account. It’s also present in that Active Directory account with group memberships associated with that user and the role membership and licensing in an IGA tool. Altogether, 10-12 distinct items associated with a user typically are governed independently by disparate solutions.</p>
<h3 id="mcetoc_1gufj1bqi1">The main problem</h3>
<p>Your IGA system has done a great job of provisioning access to users according to their specified roles and has maintained that governance with set and required policies. However, how is an IGA team equipped to know if access to a particular application is required at any given point in time? Is the least possible amount of privilege actually assigned to each user role? By itself, an IGA system will not know the last time a user used an application.</p>
<p>This lapse leaves a big gap between the privileges a user is issued versus what they need to perform their job.</p>
<p>What are the implications when applying that assessment of risk and vulnerabilities across an organization? What other applications have fallen out of use by users who still have accounts that are used daily by others? For example, external partners or vendors who have been granted access to a proprietary internal application. What dormant accounts exist on those applications or target systems that could be potentially exploited through their vulnerabilities?</p>
<h3 id="mcetoc_1gufj1bqi2">The serious pitfalls that come with siloed Access Management and IGA</h3>
<p>It’s clear that the silos that exist between Access Management and IGA solutions result in a few key pitfalls:</p>
<ul>
<li><strong>No correlated access</strong>
<ul>
<li>Across all of these tools, how will all systems know if a user’s access is actually still required? Is the current level of access assigned in your IGA system the least possible amount of privilege assigned to a user? By itself, an <a href="/what-is-iga/">IGA system</a> will not know when a user last logged in to an application, or to revoke access if a user hasn’t logged in in the last 90 days</li>
</ul>
</li>
</ul>
<ul>
<li><strong>Time-consuming application recertification</strong>
<ul>
<li>Whether driven by an audit or regular role and privilege evaluations, every organization will need to establish whether or not users have appropriate access levels assigned across applications to adhere to compliance and regulation policies and maintain the integrity of enterprise information. Recertification can be incredibly time consuming and resource intensive</li>
</ul>
</li>
</ul>
<ul>
<li><strong>Increased licensing costs</strong>
<ul>
<li>User seats for software and applications aren’t free. Budget is associated with every user and application used. Under-utilized applications with lots of users or applications where users no longer need access increase overall licensing costs</li>
</ul>
</li>
</ul>
<ul>
<li><strong>Exposure to standing user privileges</strong>
<ul>
<li>Users with standing privileges—especially those with high-level privileges—can pose a serious risk to a business. If individuals with standing privileges are compromised, bad actors can often use those privileges to quickly move to exploit to other applications</li>
</ul>
</li>
</ul>
<ul>
<li><strong>The information you already have is useless and impractical to apply</strong>
<ul>
<li>Access Management and IGA solutions collect and store an abundant amount of data on users. While that information may be useful within the context of each individual tool, trying to cross-reference that data from one tool to another is time consuming and impractical</li>
</ul>
</li>
</ul>
<h3 id="mcetoc_1gufj1bqi3">Using Behavior-Driven Governance to integrate Access Management and IGA</h3>
<p>Behavior-Driven Governance (BDG) allows organizations with Access Management and IGA solutions to implement policies to recommend or automatically remove unnecessary entitlements and accounts from users based on how those entitlements and accounts are being used.</p>
<p>For example, event data (like application access frequency) can be correlated to associated accounts and entitlements. From there, attestation can be directed to a user’s manager or other responsible party to give them an opportunity to revoke access that may not be needed due to a lack of application use.</p>
<p>Alternatively, unnecessary access can automatically be revoked if a user fails to meet set criteria.</p>
<h3 id="mcetoc_1gufj1bqi4">The benefits of Behavior-Driven Governance</h3>
<p>Behavior-Driven Governance combines the power of Access Management and IGA to deliver key benefits:</p>
<ul>
<li><strong>Enhanced visibility and governance</strong>
<ul>
<li>Rather than governing users and identities through two separate systems, Behavior-Driven Governance allows organizations to monitor application usage and apply policies based on usage behavior. As a result, entitlements are managed through adaptive policies and real-world identity behavior metrics that allow organizations to govern both <a href="https://www.onelogin.com/learn/iam" target="_blank" rel="noopener noreferrer">Access Management</a> and IGA tools as a unit</li>
</ul>
</li>
<li><strong>Lower costs</strong>
<ul>
<li>By having a comprehensive view of usage and activity, it’s a much simpler task to determine which licenses and user seats aren’t being used. Organizations can then recover the cost of unused licenses and lower the overall identity administrative burden</li>
</ul>
</li>
<li><strong>Stronger compliance</strong>
<ul>
<li>Inconsistent governance is a continual red flag for compliance. With Behavior-Driven Governance, the ability to consistently meet audit requirements by ensuring only needed entitlements are granted makes compliance much more attainable across an enterprise</li>
</ul>
</li>
<li><strong>Increased security</strong>
<ul>
<li>Removing unused accounts and entitlements from users reduces the overall risks that standing privileges can pose, and in turn, increase an organization’s overall security posture</li>
</ul>
</li>
</ul>
<p>Organizations must consider where potential gaps and silos between <a href="https://www.onelogin.com/learn/iam" target="_blank" rel="noopener noreferrer">Access Management</a> and IGA tools may present issues and vulnerabilities. Are there applications in your organizational ecosystem where, even if access permissions are granted to users because of their roles, their usage would indicate that they likely don’t need those permissions anymore?</p>
<p>Enhanced visibility, insight and improved controls with Behavior-Driven Governance is a crucial steppingstone to maintaining least privilege and enhancing an organization’s overall security posture.</p>
<p>View how One Identity&#8217;s Behavior Driven Governance works by watching this brief <a href="https://www.onelogin.com/resource-center/webinars/ol-webcast-one-identity-behavior-driven-governance">webcast</a>.</p>
<p>The post <a href="https://www.onelogin.com/blog/breaking-down-silos-why-integrated-access-management-and-iga-is-crucial-for-modern-organizations">Breaking Down Silos: Why integrated Access Management and IGA is crucial for modern organizations</a> appeared first on <a href="https://www.onelogin.com/blog">OneLogin Identity Management Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
