Use Case - Access Management Checks Cloud Access Security Broker
Recommended Implementation Details
Scenario Access Management checks for a compromised account prior to authenticating users
Description Access Management has integration with Cloud Access Security Broker and its compromised credential database, it will utilize this integration to verify that the user attempting to authenticate has an uncompromised account. If this account is compromised, Access Management can react accordingly.
IDSA Security Control
Success Criteria
  1. End User has been securely authenticated 
  2. End User is challenged and forced to reset passwords when identified as compromised