Direkt zum Inhalt

Puchta, Alexander ; Baumer, Thomas ; Müller, Mathis ; Pernul, Günther

IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence

Puchta, Alexander , Baumer, Thomas , Müller, Mathis and Pernul, Günther (2024) IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence. In: DBSec 2024, 15.-17. Jul 2024, San José, CA, USA.

Date of publication of this fulltext: 18 Jul 2024 06:44
Conference or workshop item
DOI to cite this document: 10.5283/epub.58658

[img]
frei zugänglich ab 15.7.25
Accepted Version
Download ( PDF | 363kB)

Abstract

Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...

Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event Management (SIEM) systems and Cyber Threat Intelligence (CTI) are commonly employed but under-utilize valuable IAM data. IAM analysts can overcome such challenges by designing and implementing suitable mechanisms for a swift, easy-to-use, and faultless data transfer from IAM to SIEM. We contribute with a survey to identify ten central IAM findings relevant to CTI. We also evaluate their real-world feasibility by applying them within an anonymized data set of TrustCorp and make our tools open-source.



Involved Institutions


Details

Item typeConference or workshop item (Paper)
ISBN978-3-031-65171-7, 978-3-031-65172-4
Title of Book:Data and Applications Security and Privacy XXXVIII. DBSec 2024
Publisher:Springer
Place of Publication:Cham
Other Series:Lecture Notes in Computer Science
Volume:14901
Page Range:pp. 44-52
Date13 July 2024
InstitutionsBusiness, Economics and Information Systems > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Informatics and Data Science > Department Information Systems > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul)
Identification Number
ValueType
10.1007/978-3-031-65172-4_3DOI
Related URLs
URLURL Type
https://devise.ur.deProject
https://github.com/IAMmeetsCTI/IAM-meets-CTISoftware
KeywordsIAM, CTI, SIEM, IDS
Dewey Decimal Classification000 Computer science, information & general works > 004 Computer science
300 Social sciences > 330 Economics
StatusPublished
RefereedYes, this version has been refereed
Created at the University of RegensburgPartially
URN of the UB Regensburgurn:nbn:de:bvb:355-epub-586583
Item ID58658

Export bibliographical data

Owner only: item control page

nach oben