Identity protection with UBA

Ronak D Jain

Jan 245 min read

Try AD360

Table of Content

Read more
  • 5 pain points you can overcome in AD user account management  
    Manual vs. automated identity life cycle management  
    Active Directory clean-up: Should you automate it?  
  • Maintain confidentiality of critical information by implementing the POLP  
    6 essential capabilities of a modern UBA solution  
    How can SSO help in reinforcing password security?  
  • Authentication vs. authorization  
    5 simple steps to HIPAA compliance  
    Smart strategies to provision and de-provision Active Directory  

Why detective security controls are as important as preventive security controls

Historically, a major part of security investments have been allocated to preventive security controls. Although this may seem like a good strategy in theory, preventive security controls are not preventive security controls are not effective against data breaches all the time.

This is primarily because network boundaries are vanishing as companies adopt cloud.

This shift made digital identities the center of network security. The extended network perimeter poses a huge challenge for security teams especially in protecting the integrity of data and threat detection. To tackle these challenges, they need a new age behavioral analytics tool. This article elaborates

What is user behavior analytics (UBA)?

User behavior analytics, or UBA, is a technology used to detect anomalies in user behavior patterns to spot threats within the network. According to Research and Markets, the global security analytics market size is projected to grow to USD $18.1 billion by 2024 at a compound annual growth rate (CAGR) of 18.2 percent. This growth will be fueled by the demand for insider threat and compromised account detection capabilities that traditional security systems lack.

UBA solutions use data analytics and machine learning (ML) algorithms to create a baseline behavior specific to each user. They detect deviations from this baseline thus helps to detect potential security threats at its early stage.

But how is UBA really different from traditional security solutions? What does it offer that they can't? Let's take a look.

Limitations of traditional security solutions

  • False positives mask the real threats: Traditional security tools bombard admins with an overload of mislabeled security alerts since they employ rule-based threat detection techniques, unlike UBA solutions that employ ML-based techniques to detect the anomalies effectively and accurately. This makes it tough to uncover information that truly indicates a potential for real attack using traditional security solutions. In spite of organizations keeping their perimeters secure and carefully scrutinizing every move made by insiders and outsiders alike, most administrators miss the indicators of compromise amidst an overwhelming volume of false alarms.
  • Inability to detect abnormalities: The auditing techniques used by traditional security solutions can’t accurately detect unusual user behavior. Alert thresholds are subjective and unique to each network, plus they change over time, so you can’t rely on alerts to spot threats, especially slow attacks. You can detect deviations using machine learning without setting any threshold values. Machine learning analyzes user behavior over time, and spots any minor user abnormalities.

What UBA offers

  • Efficiency: Improve detection speed to help analyze the impact of security incidents and respond to them quickly.
  • Precision: Move beyond simple rules and leverage machine-learning-based techniques to accurately detect slow and targeted attacks at its early stage.
  • Reduced false positives: With false positive alerts being a source of distraction that delay breach detection, unique alert thresholds—which are specific to each user in the organization—become important. UBA calculates the threshold value for each user based on their level of activity instead of using a blanket threshold across all users.
  • Better threat detection: Traditional security solutions fail to analyze user behavior and don't detect anomalies in this behavior. As a result, when an employee is working with sensitive data, it can be hard to know whether they are just doing their job or something malicious. UBA solutions rely on the baseline activities of users to identify unusual user behavior that points to potential attacks.

UBA in action

While existing security solutions use static threshold values to differentiate between what is normal and what is not, UBA solutions use an analytical approach—a combination of data analytics and machine learning—to implement dynamic thresholds based on real-world user behavior.

UBA collects information on what users across the organization are doing over an extended period of time, then creates a baseline of "normal" activities specific to each user. Whenever there is a deviation from the established baseline, the UBA solution considers this abnormal and alerts the administrator.

The cornerstone of UBA solutions is the premise that behaviors are hard to mimic. So, when an external entity does try to break into the network, it's going to be easy to spot.

The various stages of how UBA works:

  • Collect information on users over an extended period of time.
  • Model a baseline of normal activities specific to each user.
  • Define unique thresholds based on real-world user behavior.
  • Find deviations from the norm.
  • Notify the concerned security personnel.
  • Update thresholds continuously based on recent data.

Identity protection with UBA using AD360

AD360, ManageEngine's real-time Active Directory change monitoring software, doesn't stop with just auditing your domain controllers. It goes a step further by incorporating UBA to detect insider threats more efficiently. Its built-in UBA engine helps you:

Monitor rogue users

Let's take a use case. Assume a disgruntled employee departing from the organization wants to steal critical financial information. The employee copies 200 documents containing corporate financial data. Since the user normally accesses around 10 documents a day, this behavior is abnormal. The UBA solution recognizes this abnormal behavior, and triggers an alert to the administrator.

Monitor rogue users

A traditional security without UBA capabilities can't establish a baseline of normal user activity to spot abnormalities, and would not see this level of file access as strange. However, this is a clear case where the user's activity is abnormal and requires an administrator’s attention.

Check for compromised accounts

A disgruntled employee wants to steal important information by using a coworker's credentials. After the coworker goes home for the day, the attacker attempts to log on from the coworker's computer to avoid flagging a logon event from the wrong computer. After several incorrect guesses at the coworker's password, the attacker successfully enters the correct password and logs on.

Having calculated the typical logon time of the coworker for the past months, the UBA solution detects an abnormal logon time. With UBA, not only is the unusual logon time detected, but an alert is raised and sent immediately to the administrator.

Check for compromised accounts

Detect unusual processes on member servers

An employee gets a malicious application installed when browsing the internet. They then connect to the server, where they have administrator privileges, to perform administrative tasks. The UBA solution detects this new action on the server and triggers an alert. More quickly detecting an attack enables administrators to mitigate its impact.

Detect unusual processes on member servers

Detect privilege abuse

AD360’s UBA module detects abnormal user behavior of privileged users to protect sensitive data. For instance, if a privileged user tries to access a critical file or folder and perform an unusually large volume of file modifications, AD360 will flag this event and send an alert about the possible threat.

Spot security threats caused by users' mistakes

If a user accidentally opens the door for a breach or damages data by mistake, AD360’s UBA engine can spot this anomaly immediately. Consider a user who accidentally grants everyone in the organization permission to access a sensitive file. AD360 will detect the unusual volume of file activity and trigger an alert. An admin can then take a look into why this file was suddenly accessed so many times, and detect the data breach.

Spot security threats caused by users' mistakes

Perform risk assessment

You can identify the weak points in your network by filtering the users connected to the most assets, as well as hyperactive accounts. AD360 offers risk assessment reports for monitoring these vulnerable accounts. For instance, you can find out which accounts have the highest activity count (e.g. high file activity) by running a query in the risk assessment reports.

Perform risk assessment