Embracing zero-trust: a look at the NSAs recommended IAM best practices for administrators – CSO Online
By now, most of the industry has realized were seeing a shift from the legacy perimeter-based security model to an identity-centric approach to cybersecurity. If defenders havent realized this, malicious actors certainly have, with 80% of web application attacks utilizing stolen credentials and 40% of breaches that dont involve insider threats and user error involving stolen credentials, according to sources such as the 2022 Verizon Data Breach Investigation Report.
Compromised credentials were involved in incidents such as the 2021 Colonial national gas pipeline breach, the 2021 Oldsmar Florida water treatment plant attack, and an attack on the South Staffordshire water treatment plant in the UK in 2022, illustrating that these incidents can and have spilled over from the digital realm to the physical, impacting critical infrastructure.
Luckily, were seeing a change in the industry to pivot to a zero-trust model of cybersecurity, underpinned by an emphasis on identity and data rather than the legacy castle-and-moat approach that preceded it and led to several decades of brittle defense and massive data breaches. This pivot includes guidance from leading organizations such as the National Security Agency (NSA), which in conjunction with the Cybersecurity and Infrastructure Security Agency (CISA) recently released a Recommended Best Practices for Administrations - Identity and Access Management (IAM) guide.
The guidance opens by discussing the current threat landscape along with an overview of threat mitigation techniques. The NSA points out that some of the most common techniques used by malicious actors include activities such as creating new accounts to maintain persistence, exploiting vulnerabilities to forge authentication assertions, exploiting existing users and their access, and exploiting insecure system defaults and configurations. The guides most salient sections are dedicated to identity governance, environmental hardening, identity federation and single sign-on (SSO), multifactor authentication (MFA), and auditing and monitoring, which we will discuss below.
Identity governance helps organizations centralize and orchestrate activities associated with both user- and non-person entities (NPE) such as service accounts to align with their organizational policies. These activities cover the entire lifecycle of an account or identity, such as when an individual joins, moves, or leaves an organization or a team, triggering activities associated with their credentials and associated permissions. That same concept applies to NPEs such as machine-based identities that need credentials and permissions to carry out activities within an architecture.
Determining who has access to what and the risks associated with that access and then dynamically managing the access appropriately is no easy task. Identity governance enables a centralized approach to ensure the broad application of organizational policies, as well as mitigating risks such as identity sprawl and permission creep, in which individuals accounts are properly managed but their associated permissions regularly extended beyond what they actually need for their jobs. When this occurs and those credentials are compromised or abused, it can wreak havoc on organizations.
Leveraging innovative and emerging technologies, organizations can enable this governance while also taking advantage of capabilities such as conditional-based access control and dynamic least-permissive access control rather than long-lived credentials and access. Implementing identity governance can help mitigate attacks such as phishing, insider threats, and malicious actors creating accounts to maintain persistence beyond their initially compromised account. The NSA guidance also recommends utilizing privileged access management (PAM) solutions for advanced capabilities such as just-in-time access control.
Identity governance utilizes hardware, software, and digital environments to enable its implementation, and this is where environmental hardening comes into play. The NSA guidance points out that environmental hardening activities such as patching, asset management, and networking segmentation, along with other security best practices are key to mitigating the potential for compromised credentials, as well as limiting the blast radius, should an incident occur.
It is well known that malicious actors regularly try to compromise IAM components, so ensuring the security of environments in which those components operate is a key consideration. This includes performing activities such as creating a comprehensive asset inventory, understanding the connectivity of the assets youve identified, and protecting assets appropriately based on how critical they are to a business. You dont apply the same level of resources and rigor to a publicly available, non-sensitive system as you do to your crown jewel systems, for example.
Knowing that credentials are a key target for malicious actors, utilizing techniques such as identity federation and single sign-on can mitigate the potential for identity sprawl, local accounts, and a lack of identity governance. This may involve extending SSO across internal systems and also externally to other systems and business partners.
SSO also brings the benefit of reducing the cognitive load and burden on users by allowing them to use a single set of credentials across systems in the enterprise, rather than needing to create and remember disparate credentials. Failing to implement identity federation and SSO inevitably leads to credential sprawl with disparate local credentials that generally arent maintained or governed and represent ripe targets for bad actors.
SSO is generally facilitated by protocols such as SAML or Open ID Connect (OIDC). These protocols help exchange authentication and authorization data between entities such as Identity Providers (IdP)s and service providers. It is key for organizations utilizing SSO to understand the protocols involved as well as how the service providers involved have secured the protocols and the services themselves. The guidance provides a logical depiction of an example authorization data flow.
Best practices for implementing identity federation and SSO include knowing what systems in the environment are integrated with SSO or utilizing local identities, understanding how your trusted partners may leverage local accounts, and utilizing configuration management solutions to support identifying, tracking, and reporting on local account usage in an environment while working to get more systems federated and integrated with SSO to cut down on local account usage and its associated risks.
By now, most CISOs should be familiar with MFA. But for those who arent, at a high level, MFA requires users to utilize multiple factors as part of their authentication activities. Think of a username and password plus an SMS text or code sent to an authentication app on your phone. As shown in the NSA guidance, these factors typically take the form of using something you have, know, or are (such as biometrics) as validation tools.
We know that malicious actors are after credentials to carry out their activities and the use of MFA significantly decreases the risk of compromised credentials, particularly high-assurance approaches such as phishing-resistant MFA.
MFA helps mitigate situations in which passwords have been exposed through external system compromises or by unauthorized users who convince victims to share their passwords. The use of strong MFA form factors ensures that the exposure of a username and password alone wont leave an account compromised. The NSA guidance ranks MFA types, from weakest to strongest as SMS or voice, app-based MFA, and phishing-resistant MFA such as PKI-based systems and fast-identity hardware tokens (FIDO).
It is often said that many organizations are already compromised they just dont know it yet. This is where activities such as identity access management auditing and monitoring come into play, with value beyond compliance purposes: it helps identify anomalous or malicious activity present in an environment.
IAM auditing can provide insight into how systems are being used or abused, detect problems earlier in their lifecycle, aid in gathering forensic evidence which may be needed later as well as ensure privileged users know their activities are being monitored.
To prepare to implement successful and effective IAM auditing and monitoring, organizations need to first understand what normal behavior is, be familiar with organizationally defined policies and processes, as well as identify users with access to critical assets so they know what users and activities are the most critical to audit and monitor.
Organizations also need to ensure they have sufficient tooling and analytical capabilities in place to make use of the collected data and telemetry, as well as ensuring they have tooling in place to gather and consolidate it, to begin with. Organizations will also want to ensure they are not collecting noise and irrelevant data that simply distract from signals that are of real concern and pose risks to the organization.
Organizations looking to implement NSA-recommended identity and access management (IAM) protocols, the agency provides an appendix in the guidance that provides a detailed checklist for each of the areas discussed throughout this article. This provides a quick punch list approach to allow organizations to tackle the most pressing and key activities when it comes to securing their IAM processes and systems.
See the original post:
Embracing zero-trust: a look at the NSAs recommended IAM best practices for administrators - CSO Online
- NSA whistleblower Reality Winner on rebuilding her life in new memoir - MSN - September 21st, 2025 [September 21st, 2025]
- Assessing the Valuation of National Storage Affiliates Trust (NSA) After Recent Share Price Moves - simplywall.st - September 19th, 2025 [September 19th, 2025]
- NSA Warns iPhone And Android UsersClose All Apps If You See This - Forbes - September 17th, 2025 [September 17th, 2025]
- US' Ex-NSA John Bolton: Trump Should Call Modi, Fix Relations, And Visit India For QUAD Summit' - Times of India - September 17th, 2025 [September 17th, 2025]
- 'Come To India': Ex-NSA's Words Of Wisdom To Trump On Tariff, Indo-US Ties - Times of India - September 17th, 2025 [September 17th, 2025]
- Video NSA whistleblower Reality Winner on rebuilding her life in new memoir - ABC News - September 17th, 2025 [September 17th, 2025]
- Former US NSA calls India proud and strong, criticises Trumps India strategy - The Shillong Times - September 17th, 2025 [September 17th, 2025]
- Video | Ex-US NSA's Explosive Interview: 'Navarro Keeps Picking Fights' - NDTV - September 15th, 2025 [September 15th, 2025]
- NSA, EFCC, DSS urged to probe alleged funding of bandits in Zamfara - The Guardian Nigeria News - September 15th, 2025 [September 15th, 2025]
- Ex-US NSA Reveals Navarro Once Attempted Confrontation Between Donald Trump, PM Modi - News18 - September 15th, 2025 [September 15th, 2025]
- Navarro tried to provoke Modi-Trump clash, claims ex-US NSA; says India should ignore the sideshow - Moneycontrol - September 15th, 2025 [September 15th, 2025]
- 'Erratic behaviour': Ex-US NSA John Bolton slams Trumps India tariffs; rejects claim of brokering India- - The Times of India - September 13th, 2025 [September 13th, 2025]
- Unqualified to be US Ambassador to India: Ex-US NSA slams Sergio Gor nomination; dismisses Navarros re - The Times of India - September 13th, 2025 [September 13th, 2025]
- Trump's not thinking about the effects of his actions: Ex-US NSA John Bolton - The Times of India - September 13th, 2025 [September 13th, 2025]
- NSA leaker Reality Winner is rebuilding her life -- and looking back at her past - NPR - September 13th, 2025 [September 13th, 2025]
- India should see Trump as one-time proposition: Ex-US NSA John Bolton flags number of concerns on Indian side - Mint - September 13th, 2025 [September 13th, 2025]
- Peter Navarro Tried To Start Fight Between Trump, PM Modi: Ex US NSA - NDTV - September 13th, 2025 [September 13th, 2025]
- 'Erratic behaviour': Ex-US NSA John Bolton slams Trumps India tariffs; rejects claim of brokering India-Pak peace - MSN - September 13th, 2025 [September 13th, 2025]
- India should see Trump as one-time proposition and act in its national interest: Ex-US NSA John Bolton - Tribune India - September 13th, 2025 [September 13th, 2025]
- Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' - The Record from Recorded Future News - September 11th, 2025 [September 11th, 2025]
- Cyber Command, NSA to remain under the leadership of one person - SC Media - September 11th, 2025 [September 11th, 2025]
- CISA, NSA and Partners Release Shared Vision of Software Bill of Materials for Cybersecurity Guide - Homeland Security Today - September 11th, 2025 [September 11th, 2025]
- New Research Reveals How NSA is Affecting Providers, Consumers - MedLearn Publishing - September 11th, 2025 [September 11th, 2025]
- NSA, CISA and others urge for unified approach to strengthen cybersecurity resilience - Digital Watch Observatory - September 9th, 2025 [September 9th, 2025]
- Federal firefighter stationed at NSA Portsmouth saves passenger in cardiac arrest with life-saving CPR during flight - KREM - September 9th, 2025 [September 9th, 2025]
- NSA Director-General reassigned to Ministry of Finance - GhanaWeb - September 9th, 2025 [September 9th, 2025]
- Federal firefighter stationed at NSA Portsmouth saves passenger in cardiac arrest with life-saving CPR during flight - ABC10 - September 9th, 2025 [September 9th, 2025]
- Federal firefighter stationed at NSA Portsmouth saves passenger in cardiac arrest with life-saving CPR during flight - 12News - September 9th, 2025 [September 9th, 2025]
- Federal firefighter stationed at NSA Portsmouth saves passenger in cardiac arrest with life-saving CPR during flight - 13newsnow.com - September 6th, 2025 [September 6th, 2025]
- Trump expected to nominate Lt. Gen. William Hartman to lead NSA, Cyber Command - Politico - September 5th, 2025 [September 5th, 2025]
- Trumps personal rapport with PM Modi is gone, says former US NSA John Bolton; warns ties wont shield le - The Times of India - September 5th, 2025 [September 5th, 2025]
- Trump threw aside India ties for family's business with Pakistan, says Ex-US NSA Jake Sullivan | Latest News India - Hindustan Times - September 5th, 2025 [September 5th, 2025]
- CISA, NSA, global partners release SBOM Guidance urging cross-border adoption to boost software supply chain security - Industrial Cyber - September 5th, 2025 [September 5th, 2025]
- Trump wrecked India ties for business interests in Pakistan: Fmr NSA | World News - The Times of India - September 5th, 2025 [September 5th, 2025]
- Core4ce Appoints Former NSA Cybersecurity Director David Luber to Board of Advisors - Business Wire - September 5th, 2025 [September 5th, 2025]
- Court to Either Trash or Withhold Controversy 'NSA Calls Log Evidence' Today - liberianobserver.com - September 5th, 2025 [September 5th, 2025]
- Trump-Modi's very good relationship is gone now: Former US NSA Bolton - Business Standard - September 5th, 2025 [September 5th, 2025]
- 'Threw India ties aside for Pakistan business': Ex-US NSA Jake Sullivan blasts Trump; calls it a 'huge st - The Times of India - September 3rd, 2025 [September 3rd, 2025]
- Former NSA Jake Sullivan accuses Trump of prioritising familys business ventures in Pakistan over India relations - The Indian Express - September 3rd, 2025 [September 3rd, 2025]
- Predicting NSA.PRA trend using moving averages - Trade Volume Report & AI Powered Buy/Sell Recommendations - Newser - September 3rd, 2025 [September 3rd, 2025]
- Is it time to cut losses on NSA.PRA - 2025 Year in Review & Real-Time Buy Zone Alerts - Newser - September 3rd, 2025 [September 3rd, 2025]
- Can trapped investors hope for a rebound in NSA.PRB - July 2025 Action & Daily Profit Focused Stock Screening - Newser - September 1st, 2025 [September 1st, 2025]
- Price action breakdown for NSA.PRA - July 2025 Pullbacks & Risk Adjusted Buy/Sell Alerts - Newser - September 1st, 2025 [September 1st, 2025]
- Can a trend reversal in NSA.PRA lead to recovery - CPI Data & AI Powered Buy and Sell Recommendations - Newser - September 1st, 2025 [September 1st, 2025]
- NSA, Other Agencies Release Advisory Against China-Sponsored Cyberthreats - ExecutiveGov - August 29th, 2025 [August 29th, 2025]
- NSA, NCSC, and allies detailed TTPs associated with Chinese APT actors targeting critical infrastructure Orgs - Security Affairs - August 29th, 2025 [August 29th, 2025]
- Former National Security Agency (NSA) Director and Commander of U.S. Cyber Command Joins Accrete, Inc. as Strategic Board Advisor - Yahoo Finance - August 29th, 2025 [August 29th, 2025]
- NSA.PRA stock outlook for YEAR - Quarterly Profit Summary & Long-Term Safe Investment Ideas - Newser - August 29th, 2025 [August 29th, 2025]
- NSA, FBI, Others Say Chinese Tech Firms are Aiding Salt Typhoon Attacks - Security Boulevard - August 29th, 2025 [August 29th, 2025]
- American brand globally is in the toilet: Former US NSA Jake Sullivan says Trumps massive trade offen - The Times of India - August 29th, 2025 [August 29th, 2025]
- CISA, NSA, And FBI Warn Of Ongoing Chinese State-Sponsored Cyber Espionage - Information Security Buzz - August 29th, 2025 [August 29th, 2025]
- What recovery options are there for NSA.PRA - July 2025 Update & Verified Momentum Watchlists - Newser - August 27th, 2025 [August 27th, 2025]
- Top Resilience and Healthcare Keynote Speaker, Artist, Burn Survivor, and Entrepreneur, Allison Massari, Inducted into NSA Speaker Hall of Fame--A... - August 27th, 2025 [August 27th, 2025]
- Top Resilience and Healthcare Keynote Speaker, Artist, Burn Survivor, and Entrepreneur, Allison Massari, Inducted into NSA Speaker Hall of Famea... - August 27th, 2025 [August 27th, 2025]
- Joseph Francescon Announced as Next NSA Deputy Director - Homeland Security Today - August 26th, 2025 [August 26th, 2025]
- Former National Security Agency (NSA) Director and Commander of U.S. Cyber Command Joins Accrete, Inc. as Strategic Board Advisor - PR Newswire - August 26th, 2025 [August 26th, 2025]
- Former CRPF DG Anish Dayal Singh appointed deputy NSA - The Hindu - August 26th, 2025 [August 26th, 2025]
- FBI raids Trump ex-NSA John Bolton days after outburst on India tariff - Tribune India - August 24th, 2025 [August 24th, 2025]
- Is NSA.PRA reversing from oversold territory - 2025 Short Interest & Risk Adjusted Buy and Sell Alerts - Newser - August 24th, 2025 [August 24th, 2025]
- Will a bounce in NSA.PRB offer an exit - Swing Trade & Weekly Top Performers Watchlists - Newser - August 24th, 2025 [August 24th, 2025]
- Who is John Bolton? From Trump's ex-NSA to FBI target in classified information probe - Hindustan Times - Hindustan Times - August 22nd, 2025 [August 22nd, 2025]
- Former intelligence analyst is named NSA deputy director - The Washington Post - August 22nd, 2025 [August 22nd, 2025]
- FBI Raids Former US NSA John Bolton's Home Days After He Criticised Trump's Tariffs On India - Republic World - August 22nd, 2025 [August 22nd, 2025]
- FBI raids home of former NSA John Bolton as part of investigation into classified documents - Audacy - August 22nd, 2025 [August 22nd, 2025]
- 'Sanctions don't prohibit': Former Trump NSA John Bolton on India buying Russian oil | Latest News India - Hindustan Times - Hindustan Times - August 22nd, 2025 [August 22nd, 2025]
- FBI raids Trump's former NSA John Bolton's Maryland residence after India tariffs outburst - theweek.in - August 22nd, 2025 [August 22nd, 2025]
- FBI raids ex-Trump NSA John Boltons house, days after he criticised penalty tariffs on India - ThePrint - August 22nd, 2025 [August 22nd, 2025]
- 'Sanctions don't prohibit': Former Trump NSA John Bolton on India buying Russian oil - MSN - August 22nd, 2025 [August 22nd, 2025]
- Will NSA.PRB outperform during market rallies - Portfolio Performance Report & Verified Technical Signals - baoquankhu1.vn - August 22nd, 2025 [August 22nd, 2025]
- TYC stages another protest as Chinese FM Wang Yi meets Indias NSA Doval - Phayul - August 20th, 2025 [August 20th, 2025]
- News - The Future of Fitness: NSA Souda Bay and MWR Raise the Bar - DVIDS - August 20th, 2025 [August 20th, 2025]
- There is an upward trend in India-China ties, NSA Ajit Doval says - The Economic Times - August 20th, 2025 [August 20th, 2025]
- Heltonville's Matt Craig Honored with Circle of Corydon Award for NSA - Hoodline - August 18th, 2025 [August 18th, 2025]
- Trump's Former NSA John Bolton Rips Tariffs On Russian Oil As 'Unforced Error,' Warns Move Could Push India Into Moscow's Arms - Benzinga - August 18th, 2025 [August 18th, 2025]
- Is This a Bottoming Phase for NSA.PRA - July 2025 WrapUp & Weekly Top Stock Performers List - thegnnews.com - August 14th, 2025 [August 14th, 2025]
- Promoting Human Rights in Iraqs Counter-Terrorism Efforts: UNOCT and NSA Host a Workshop for Women working in Security Entities | Office of... - August 12th, 2025 [August 12th, 2025]
- Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World - WIRED - August 9th, 2025 [August 9th, 2025]
- Excited to receive Putin in India: NSA Doval in Moscow amid Trumps tariff bullying over Russian oil - MSN - August 9th, 2025 [August 9th, 2025]
- Ex-US NSA John Bolton calls Trump's tariffs on India 'enormous mistake', says THIS about China, Russia - WION - August 9th, 2025 [August 9th, 2025]
- Putin-Trump Summit: Defining eventdefinitely have an impact on India, says former Deputy NSA Saran - Rising Kashmir - August 9th, 2025 [August 9th, 2025]