Use Case:
Access Management Checks Cloud Access Security Broker

Access Management has integration with Cloud Access Security Broker and its compromised credential database, it will utilize this integration to verify that the user attempting to authenticate has an uncompromised account. If this account is compromised, Access Management can react accordingly.

Scenario

Access Management checks for a compromised account prior to authenticating users.

Actions

– Click for larger image –

Success Criteria

  1. End User has been securely authenticated.
  2. End User is challenged and forced to reset passwords when identified as compromised.

IDSA Security Controls

Risk-based Authentication

Authentication based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).