Overview#
IDSA Integration Framework is a concept from Identity Defined Security Alliance which classifies various components for the Framework.
Identity and Access Management#
- Access Management - Provides the authentication and authorization mechanisms (Single Sign-On, Multi-Factor Authentication, Graded Authentication) ensuring appropriate security levels are enforced.
- Identity Governance - Facilitates the management of a user’s identity as it pertains to access, authorization and adherence to compliance requirements.
- Identity Administration - Enables Self-Service Access Request, Password Management, Profile Management and Identity Lifecycle Management.
Security Operations (SecOps)#
- Security Information and Event Management (SIEM) - Enables bi-directional sharing of data for better visibility and intelligent decision making
- User and Entity Behavior Analytics (UEBA) - Behavior-based security intelligence to detect and assess risky activity on the network and alter authentication processes in response.
- Service Management - Provides a tracking mechanism to capture potential security considerations that warrant additional analysis.
- Fraud and Risk - Utilizes machine learning to find and prevent fraud, as well as the ability to correlate Security Incidents from disparate sources and ensure compliance with corporate and industry regulations.
Risk Management#
- Privileged Access Management - Provides enhanced visibility and adaptive threat response to attacks, with an emphasis on detecting abnormal authentication activity with Privileged Identity.
- Governance Risk Management And Compliance (GRC) - Provides visibility to potential security risks and allows organization an enforcement mechanism to remediate issues.
- Network Security (NetSec) - Facilitates communication across private and public cloud infrastructures for the purposes of providing a single layer of application security.
Data Protection#
- Data Access Governance (DAG) - The discovery and Data Protection of data across the enterprise and manages the process of how users are granted access to this data
- Enterprise Mobility Management (EMM) - Allows the registration of Mobile Devices to safely leverage Single Sign-On (SSO) for access to cloud computing and Native applications. In addition, the chain of trust associated with a registered device exposes device attributes and compliance rules.
- Data Loss Prevention (DLP) - Prevention of the distribution of sensitive data by utilizing sufficient risk based definitions to determine the appropriate level of assurance.
- Cloud Access Security Broker (CASB) - Utilizes the deep analysis capabilities to provide Adaptive Risk analytics to identify compromised credentials and potential risks that can then be used in authentication decisions.