Access Management Checks Cloud Access Security Broker
Access Management has integration with Cloud Access Security Broker and its compromised credential database, it will utilize this integration to verify that the user attempting to authenticate has an uncompromised account. If this account is compromised, Access Management can react accordingly.
Access Management checks for a compromised account prior to authenticating users.
– Click for larger image –
- End User has been securely authenticated.
- End User is challenged and forced to reset passwords when identified as compromised.
IDSA Security Controls
Authentication based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).