frei zugänglich ab 15.7.25 | Accepted Version Download ( PDF | 363kB) |
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence
Puchta, Alexander
, Baumer, Thomas
, Müller, Mathis
and Pernul, Günther
(2024)
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
In: DBSec 2024, 15.-17. Jul 2024, San José, CA, USA.
Date of publication of this fulltext: 18 Jul 2024 06:44
Conference or workshop item
DOI to cite this document: 10.5283/epub.58658
Abstract
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event Management (SIEM) systems and Cyber Threat Intelligence (CTI) are commonly employed but under-utilize valuable IAM data. IAM analysts can overcome such challenges by designing and implementing suitable mechanisms for a swift, easy-to-use, and faultless data transfer from IAM to SIEM. We contribute with a survey to identify ten central IAM findings relevant to CTI. We also evaluate their real-world feasibility by applying them within an anonymized data set of TrustCorp and make our tools open-source.
Involved Institutions
Details
| Item type | Conference or workshop item (Paper) | ||||||
| ISBN | 978-3-031-65171-7, 978-3-031-65172-4 | ||||||
| Title of Book: | Data and Applications Security and Privacy XXXVIII. DBSec 2024 | ||||||
|---|---|---|---|---|---|---|---|
| Publisher: | Springer | ||||||
| Place of Publication: | Cham | ||||||
| Other Series: | Lecture Notes in Computer Science | ||||||
| Volume: | 14901 | ||||||
| Page Range: | pp. 44-52 | ||||||
| Date | 13 July 2024 | ||||||
| Institutions | Business, Economics and Information Systems > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatics and Data Science > Department Information Systems > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||||
| Identification Number |
| ||||||
| Related URLs |
| ||||||
| Keywords | IAM, CTI, SIEM, IDS | ||||||
| Dewey Decimal Classification | 000 Computer science, information & general works > 004 Computer science 300 Social sciences > 330 Economics | ||||||
| Status | Published | ||||||
| Refereed | Yes, this version has been refereed | ||||||
| Created at the University of Regensburg | Partially | ||||||
| URN of the UB Regensburg | urn:nbn:de:bvb:355-epub-586583 | ||||||
| Item ID | 58658 |
Download Statistics
Download Statistics