How is your organization evolving its IAM infrastructure? Can you share any examples of high-impact changes that can increase interoperability and/or agility?
Sort by:
We are aligned with that approach, focusing on threat response and automation. We use CrowdStrike's Identity Falcon model for automatic threat response and are growing our identity infrastructure as code (IaC) capabilities. Automation is a key focus, with Ansible and ServiceNow facilitating self-service offerings in the identity space.
In our legacy systems, not much has changed, but for newer systems, we have adopted passwordless authentication for elevated and highly privileged access. This approach is MFA agnostic, supporting both Entra and Microsoft MFA. We integrated external authentication methods, allowing users to choose passwordless options while scrambling passwords on those accounts. This change improved interoperability, user experience, and our security posture.
When I assessed our security environment upon joining the organization, identity and access management was a top priority. We operate in Azure, AWS, and Google environments, with numerous in-house applications. To ensure strong access control, we decided to use Okta as our identity provider. With this integration, all logins, particularly with new technologies, go through Okta. We also offer flexibility by allowing users to choose between Okta's Authenticator or Microsoft's Authenticator, making the process more user-friendly.
Our organization is currently at an immature stage in terms of IAM infrastructure, as security has not been a priority. My focus has been on developing a security strategy, with privileged access management being a top priority. We've made significant progress in implementing privileged access management across the organization, but we face challenges in consolidating multiple tools and ensuring all requirements are met. We are working on strategic guidelines to address these issues.
Our organization is focused on protecting the environment and enhancing threat detection. We have adopted a zero-trust model and are working on continuous authentication based on network location, device health, and user behavior. We implemented self-service password resets to eliminate help desk errors and transformed our identity team into an identity SOC. This team focuses on threat detection and response, leveraging their subject matter expertise for quick action.