The new identity-focused defense and ITDR detection and response to committed credentials

Published 4 min de lectura 153 reading

In recent years the form of attack has changed: it is no longer so much about "forcing doors" on servers as about taking advantage of valid credentials to enter and move with apparent normal. Engaged accounts and internal threats are today the most frequent and effective vector, because they allow attackers to operate in the appearance of legitimate users. Organizations that depend only on preventive measures are beginning to understand that they need a much deeper visibility of IT events to detect malicious activity before it causes irreparable damage.

Simple but effective techniques - phishing, password reuse, spraying passwords or social engineering - can be automated and run on a large scale, which generates a constant flow of attempts that can collapse the best filters. Reports such as DBIR from Verizon show that the theft of credentials remains a recurring cause of gaps. So, beyond blocking malicious emails and demanding multiple factors authentication, organizations need to know what happens in their real-time environments.

The new identity-focused defense and ITDR detection and response to committed credentials
Image generated with IA.

This is where the concept of identity-centred detection and response, known as Identity Threat Detection & Response (ITDR), enters. ITDR does not replace preventive measures; it complements them providing the context necessary to detect suspicious movements and activate a rapid response. By recording and analysing login events, changes in permits, account creation and policy modification, an ITDR system helps to discern between legitimate activity and alarm signals.

Many security reference frameworks, including the Zero Trust approach promoted by agencies such as NIST they recommend to assume that any identity can be a point of commitment and apply continuous controls. Within that paradigm, Identity governance and comprehensive event registration are key pieces to reduce the time between engagement and detection, which limits the damage a attacker can cause.

Detecting anomalies means first knowing the "normal" of each user: regular working hours, applications and resources that you usually consult, reasonable access volumes. With this reference model, atypical patterns can be identified, such as access in unusual times, peaks of failed authentication attempts, login from unexpected locations, or the appearance of administrative accounts outside established discharge processes. The technique of using valid accounts to move laterally is documented in the frame MITRE ATT & CK as "Valid Accounts" and stresses why identity telemetry is crucial.

The effective response requires not only alerts, but also an interface to investigate and act: being able to filter events by system, type of event or user; traces showing which resources were accessed; and easy access to contextual information to decide whether to disconnect a session, reset credentials or block privileges temporarily. Having consolidated records and analysis tools accelerates research and reduces exposure time.

Classical measures such as mail filters, multifactor authentication and access control by the principle of minimum privilege (PLP) remain essential and must form the basis of any strategy. However, none of these are infallible. Mature organizations combine prevention with identity-based detection and continuous governance, so that they do not depend only on a mechanism avoiding intrusion, but can quickly identify if any failure.

For IT and security equipment this means investing in platforms that integrate identity governance (role management, high and low automation, access reviews) with event audit and analysis capabilities at no additional cost per module or feature. A unified solution reduces operational friction and makes it easier for security officials to reach rapid conclusions on the health of the identity environment.

The adoption of such solutions also has a cultural benefit: it forces organizations to document processes, standardize high and permit changes, and create clear workflows to respond when something is considered suspicious. It also provides audits and compliance checks by maintaining a consulting history of who did what, when and from where.

The new identity-focused defense and ITDR detection and response to committed credentials
Image generated with IA.

If you want to deepen how to articulate an identity-centred defense, there are useful resources developed by the industry that can help design the road map: the guides on multi-factor authentication CISA, articles and security tips about identity in the blog Microsoft Security, and TTPCs analysis on MITRE ATT & CK.

If you are looking for a practical option to start gathering identity governance and event audit on a single platform, there are suppliers that offer custom demos and tours to show how these concepts are translated into daily operations. The key is to stop reacting and start seeing, correlate and respond before the attacker completes his goal.. If you are interested in seeing an example of a platform that integrates these capabilities, you can consult Tenfold and request a custom demonstration on tenfold.software.

Article sponsored and prepared by Tenfolk Software.

Coverage

Related

More news on the same subject.