Transcript
A (0:02)
You're listening to the Cyberwire Network powered by N2K. At Talas, they know cybersecurity can be tough and you can't protect everything. But with Thales, you can secure what matters most. With Thales industry leading platforms, you can protect critical applications, data and identities anywhere and at scale with the highest roi. That's why the most trusted brands and largest banks, retailers and healthcare companies in the world rely on TALAS to protect what matters most applications, data and identity. That's Talas T H A L E S learn more at talasgroup.com cyber.
B (1:02)
The word is identity orchestration spelled identity as in a set of verifiable attributions regarding a person, a device, or a workload, and orchestration as in an automated series of processes to configure, coordinate and manage computer systems, data or software software Definitions A subset of security orchestration the management of identities across an organization's set of digital islands. Example sentence Identity orchestration ensures that all the various steps of identity management occur in the right sequence, origin and context the idea of security orchestration has been around since about 2015. It manifested from the trend that over the years most organizations had deployed too many security tools to manage effectively. The administrative complexity had placed such a burden on IT and security professionals that the benefit of potentially reduced risk to the business wasn't worth the effort. Security orchestration was the strategy to manage that complexity more easily, usually with a centralized platform to host the policy that distributed the specific tool controls across all the organization's data islands like mobile devices, data centers, SaaS, and cloud deployments. Typically, security orchestration applied to traditional detection and prevention tools like firewalls, intrusion detection systems, XDR or extended Detection and Response, and they're supporting systems like SIEMS and soar. Recently, though, a subset of security orchestration has emerged as being even more critical than keeping the security tools up to date. It's called identity orchestration and is a way of organizing identity access management, or iam, across those same data islands. It's also a subset of a concept called software defined perimeter, where users, systems and devices needing access to a workload would go to a broker independent of the workload. The broker would first verify the identity and second check if that asset is authorized to access the workload. If it was, then the broker would establish an encrypted connection between the asset and the workload. Identity orchestration is the first part of that process. Nerd Reference there's this trope in spy movies where the good guys eventually decide that they need to talk to the bad guys before the last act happens when they all try to kill each other. But the good guys don't grab an Uber, rock up to the bad guys evil lair, knock on the door and say hey, got a minute? That's just not how it's done. Instead the good guys meet with the bad guys at some agreed upon location nowhere near the evil lair. Some vetting gets done on both sides in the form of weapons, pat downs and insult trading, which are usually quite funny. And then once both parties are satisfied, the bad guys put bags over the good guys heads and whisk them off to some safe house somewhere. And that's exactly what happens with the software defined perimeter model and the first half of Identity orchestration. The parties meet at some specified location, identities are checked and vetted on both sides, and then the asset in question is allowed access to the workload. Word Notes is written by Tim Nodar, executive produced by Peter Kilpe and edited by John Petrick and me, Rick Howard. The mix, sound design and original music have all been crafted by the ridiculously talented Elliot Peltzman. Thanks for listening.
![Identity Orchestration (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F343f42cc-97d5-11f0-ad41-533c2fd4fba7%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)