Managing Adaptive Security and Risk Providers
This section describes adaptive security and risk providers, how to activate adaptive security, how to configure the Default risk provider, how to add a third-party risk provider.
Required Policy or Role
- Be a member of the Administrators group
- Be granted the Identity Domain Administrator role or the Security Administrator role
- Be a member of a group granted
manage
domains
To understand more about policies and roles, see The Administrators Group, Policy, and Administrator Roles, Understanding Administrator Roles, and Understanding Policies.
Understand Adaptive Security
Adaptive Security provides strong authentication capabilities for your users, based on their behavior within, and across multiple heterogeneous on-premises applications and cloud services.
Adaptive Security analyzes a user’s risk profile based on their historical behavior, such as too many unsuccessful sign-on attempts and too many unsuccessful MFA attempts. To evaluate the user’s behavior across other systems with which IAM isn’t directly involved, Adaptive Security allows you to configure your existing risk providers to obtain the user’s risk score from third-party risk providers, such as Symantec CloudSOC Cloud Access Security Broker (CASB). With this context and risk information, Adaptive Security profiles each user, and arrives at its own risk score and an overall consolidated risk level (High, Medium, Low).
These scores and risk levels can be used with policies to enforce a remediation action, such as allowing or denying the user from accessing IAM and its protected applications and resources, requiring the user to provide a second factor to authenticate into IAM.
Administrators can also view how the user’s risk profile trended over time, and drill down to see details associated with each event.
Understanding Risk Providers
Identity domain administrators and security administrators use identity domain risk providers to configure various contextual and threat events to be analyzed within an identity domain. An identity domain can also consume user risk scores from third-party risk providers.
Default Risk Provider
An identity domain includes a default risk provider with a list of supported contextual and threat events, such as too many unsuccessful login attempts or too many unsuccessful MFA attempts. Administrators can enable events of interest, and specify weighting or severity for each of these events. The system uses the configured weighting to compute the user’s risk score.
- Access from an unknown device
- Too many unsuccessful login attempts
- Too many unsuccessful MFA attempts
- Access from suspicious IP addresses
- Access from an unfamiliar location
- Impossible travel between locations
- low risk range (0-25)
- medium risk range (26-75)
- high risk range (76-100)
Third-Party Risk Providers
Administrators can add risk providers to obtain a user’s risk score from the Symantec third-party risk engine. This risk engine provides additional intelligence on the user’s behavior across heterogeneous systems with which IAM isn’t directly involved.
To provide a consolidated risk profile of the user at any time, IAM takes the highest level of the risk scores of both the default IAM risk provider and the configured third-party risk providers, and qualifies the user as a high-risk, medium-risk, or low-risk user. For example, if a user’s risk score from the default risk provider is within the Low range, but the risk score from a third-party risk provider is within the Medium range, then the user’s consolidated risk level is set to Medium.
Administrators can then use the identity domain risk score, third-party risk score, or consolidated user risk level as conditions that can be used with identity domain sign-on policies to enforce a remediation action, such as allowing or denying the user from accessing an identity domain and its protected applications and resources, requiring the user to provide a second factor to authenticate into an identity domain, and so on.
Using the Console
Start evaluating contextual and threat analysis, and obtain user risk scores from the configured third-party risk providers by turning on adaptive security.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains. Select the identity domain you want to work in and click Security and then Adaptive security.
- In the Adaptive security page, turn on Adaptive intelligence.
Stop performing contextual and threat event analytics, and obtaining user risk scores from third-party risk providers by turning off adaptive security.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains. Select the identity domain you want to work in and click Security and then Adaptive security.
- In the Adaptive security page, turn off Adaptive intelligence.
You can modify the default risk provider that's associated with an identity domain.
You can add a risk provider that can be used to obtain a user’s risk score from the Symantec third-party risk engine. This risk score provides additional intelligence on the user’s behavior across heterogeneous systems with which IAM isn’t directly involved. Administrators can then use this third-party risk score with identity domain sign-on policies to enforce a remediation action, such as allowing or denying the user from accessing an identity domain and its protected applications and resources, requiring the user to provide a second factor to authenticate, and so on.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains. Select the identity domain you want to work in and click Security and then Adaptive security.
- In the Risk providers section, click the Actions menu to the right of the risk provider that you want to activate.
- Select Activate risk provider.
- Confirm the activation.
If the default risk provider is deactivated, then none of the events configured in this risk provider is used for the user’s risk score analysis. If third-party risk providers are deactivated, risk scores are not retrieved from these risk providers.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains. Select the identity domain you want to work in and click Security and then Adaptive security.
- In the Risk providers section, click the Actions menu to the right of the risk provider that you want to deactivate.
- Select Deactivate risk provider.
- Confirm the deactivation.
View details such as the name, company, and activation status of each risk provider. You can also see other information, such as the risk levels and authentication information associated with the risk provider.
After viewing details about, activating, or deactivating a risk provider that you added, you can modify it.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains. Select the identity domain you want to work in and click Security and then Adaptive security.
- In the Risk providers section, click the Actions menu to the right of the risk provider that you want to modify and select Edit risk provider.
- Make any necessary changes.
- Click Validate risk provider. Verify that you see the The connection to the {risk_provider_name} risk provider has been validated. message. If you receive an error message, then check the values that you changed for the Risk provider URL and Authentication type fields.
- Click Save changes.
- Confirm the changes.
If a third-party risk provider is no longer needed to provide its user risk score, then you can remove it.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains. Select the identity domain you want to work in and click Security and then Adaptive security.
- In the Adaptive Security page, if the risk provider that you want to remove is activated, then deactivate it. See Deactivating a Risk Provider.
- In the Risk providers section, click the Actions menu to the right of the risk provider that you want to delete.
- Select Delete risk provider.
- Confirm the deletion.