ITDR is an approach to protecting the integrity of your identity systems in an era when identity has become a basic business need and the new network perimeter. The controls, threat intelligence and processes in Identity Threat Detection and Response enable you to detect and respond to identity threats that elude the protection provided by your identity and access management (IAM) tools.
Your identity systems are designed for prevention and built around tools like IAM, privileged access management (PAM) and identity governance and administration (IGA) to stop illicit network access. They strengthen account hygiene and keep you ahead of attackers by exposing and mitigating misconfigurations. They identify and apply additional prevention to protect your business-critical assets.
Identity systems are part of your competitive advantage, making collaboration possible among your employees, customers and business partners. No wonder those systems have become ripe targets for cybercriminals attempting to steal credentials (usernames and passwords), thwart multifactor authentication (MFA) and undermine prevention outright.
Identity Threat Detection and Response reinforces your up-front prevention with detection – continuous monitoring of factors like indicators of compromise (IOC) and user behavior analytics (UBA). When a threat is identified, ITDR processes and tools apply a response aimed at neutralizing it, mitigating the risk of breach and providing for recovery back to a known good state.
Network Detection and Response (NDR) focuses on finding and stopping abnormal behavior in network traffic, which has long been the main focus of enterprise security. NDR includes firewalls and deep packet inspection to keep attackers out by continuously analyzing raw network packets or traffic metadata in search of anomalous behavior. It is designed to detect the results of a data breach, such as ransomware, insider threats and lateral movement within the network.
NDR relates to malware defenses (CIS Control 8) and implementing a security awareness and training program (Control 17). In the NIST Framework, NDR supports three aspects: protect, detect and respond.
Endpoint Detection and Response (EDR) corresponds to the growth in computing on endpoints (workstations, laptops, tablets, mobile devices), especially outside of the network perimeter. As attacks on endpoints have increased, EDR has emerged as an approach for defending against security threats by monitoring and analyzing the activity of the organization’s endpoints. It detects when threats have been identified; provides investigation, response and alerts; and retains endpoint data for historical analysis and threat hunting.
EDR supports the limitation and control of network ports, protocols and services (CIS Control 9) and boundary defense (Control 12). In the NIST Framework, EDR covers two aspects: detect and respond.
Extended detection and response (XDR) is focused on security incident detection and automated response across the infrastructure. XDR tools integrate cyber threat intelligence and telemetry data from multiple sources. They turn the data into security analytics that help security operations center (SOC) and incident response teams see security alerts in context and connect the dots among them. The tools are also capable of automating responses to threats according to playbooks.
XDR covers controlled use of administrative privileges (CIS Control 4), malware defenses (Control 8) and application software security (Control 18). In the NIST Framework, XDR deals with two aspects: detect and respond.
AD is the centerpiece of the identity system in many enterprises. As such, it is continually used as an attack vector both in the data center and to move to the cloud or Microsoft 365 for greater access.
AD TDR is focused on defending against threats to AD, for example by using a platform-specific tool to detect and send alerts on the misuse of the AD Group Policy infrastructure. Attackers try to exploit Group Policy because of its systems management capability inside the AD identity platform. AD TDR detects changes to Group Policy Objects and any affected identities, then responds according to an identity threat playbook or by notifying security teams. It protects the secure operation of AD as an integral part of the enterprise identity infrastructure.
As Gartner notes, “AD TDR tools fulfill this mission by applying threat intelligence, behavioral signatures, heuristics, statistical analysis, analyses of known tactics, techniques and procedures (TTPs) and machine learning algorithms to discover indicators of exposure and indicators of compromise in Active Directory.”
As organizations make it easier for employees, customers and business partners to access their data from anywhere with any device, identity becomes the new perimeter – the key to that access. As a result, attacks on users’ identities and on the identity systems themselves have increased in frequency and force.
Enterprises that subscribe to Identity Threat Detection and Response effectively give identity its own security discipline based on prevention, detection and response:
Identity Access Management (IAM) and Identity Threat Detection (ITDR) serve complementary but distinct purposes in cybersecurity. IAM focuses on prevention and access control — ensuring the right people and resources have appropriate access to systems they need. It manages user permissions, authentication, and access across various applications and systems.
While ITDR monitors for threats targeting identity systems, it also focuses on protection and prevention by maintaining robust identity infrastructure hygiene to prevent attacks before they occur. We refer to the protection and prevention aspects as “the silent P” in ITDR. Protection/prevention and detection operate in what we call a virtuous cycle, where each informs the other for constant improvement.
This preventive aspect includes continuously assessing and hardening identity systems, eliminating misconfigurations, and ensuring secure architecture. While IAM prevents unauthorized access through authentication and permissions, ITDR provides comprehensive protection of the identity infrastructure itself, actively monitors for threats that may bypass IAM controls, and responds to potential compromises. Think of IAM as the front-line defense controlling who gets in, while ITDR both strengthens the underlying identity foundation and actively monitors for threats that may have slipped through or are attempting to undermine those controls.
Identity systems face an evolving landscape of sophisticated threats that can compromise organizational security. One of the most prevalent vulnerabilities is credential-based attacks, where cybercriminals attempt to steal or compromise usernames, passwords, and even multi-factor authentication systems. Another significant concern is the growing sophistication of phishing attacks, particularly those leveraging generative AI and dark web resources to target identity systems.
The expanding attack surface, especially with the proliferation of IoT devices and cloud services, creates additional vulnerabilities. Common weak points include:
Identity Threat Detection and Response (ITDR) provides organizations with crucial capabilities to protect their identity infrastructure in today's evolving threat landscape. By implementing ITDR, organizations gain both preventative protection through improved identity infrastructure hygiene and continuous monitoring of identity systems, enabling them to detect and respond to potential compromises and suspicious activities quickly. This goes beyond traditional IAM prevention controls, offering a more comprehensive approach to identity security.
ITDR delivers value through several key advantages: