frei zugänglich ab 15.7.25 | Angenommene Version Download ( PDF | 363kB) |
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence
Puchta, Alexander
, Baumer, Thomas
, Müller, Mathis
und Pernul, Günther
(2024)
IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence.
In: DBSec 2024, 15.-17. Jul 2024, San José, CA, USA.
Veröffentlichungsdatum dieses Volltextes: 18 Jul 2024 06:44
Konferenz- oder Workshop-Beitrag
DOI zum Zitieren dieses Dokuments: 10.5283/epub.58658
Zusammenfassung
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event ...
Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks. However, when analyzing suspected or actual attacks, Security Information and Event Management (SIEM) systems and Cyber Threat Intelligence (CTI) are commonly employed but under-utilize valuable IAM data. IAM analysts can overcome such challenges by designing and implementing suitable mechanisms for a swift, easy-to-use, and faultless data transfer from IAM to SIEM. We contribute with a survey to identify ten central IAM findings relevant to CTI. We also evaluate their real-world feasibility by applying them within an anonymized data set of TrustCorp and make our tools open-source.
Alternative Links zum Volltext
Beteiligte Einrichtungen
Details
| Dokumentenart | Konferenz- oder Workshop-Beitrag (Paper) | ||||||
| ISBN | 978-3-031-65171-7, 978-3-031-65172-4 | ||||||
| Buchtitel: | Data and Applications Security and Privacy XXXVIII. DBSec 2024 | ||||||
|---|---|---|---|---|---|---|---|
| Verlag: | Springer | ||||||
| Ort der Veröffentlichung: | Cham | ||||||
| Sonstige Reihe: | Lecture Notes in Computer Science | ||||||
| Band: | 14901 | ||||||
| Seitenbereich: | S. 44-52 | ||||||
| Datum | 13 Juli 2024 | ||||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||||
| Identifikationsnummer |
| ||||||
| Verwandte URLs |
| ||||||
| Stichwörter / Keywords | IAM, CTI, SIEM, IDS | ||||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||||
| Status | Veröffentlicht | ||||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||||
| An der Universität Regensburg entstanden | Zum Teil | ||||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-586583 | ||||||
| Dokumenten-ID | 58658 |
Downloadstatistik
Downloadstatistik