The 76th Edition of the Identity Jedi Newsletter

Let's get Agile, the joys of MFA, getting ready for Identiverse

In partnership with

Click here to start your automation journey today!

Hey Jedi welcome to the 76th edition of the Identity Jedi Newsletter. Presented by our friends over at Readibots. I’ve mentioned before that the IAM industry is RIPE for disruption. Tis the way of the world in which we live friends. Well, the folks over at Readibots are thinking the EXACT same thing. I like to think of them as the Make.com of Identity. Their platform empowers customers to build out their identity solutions in an Agile manner. Automate what you can, when you can, and then add to it as you go. I love to see it. Make sure you check them out, and let them know the Identity Jedi sent ya!

This week's edition

NSA Debuts Top 10 Cloud Security Migration Strategies

I mean if it’s good enough for the NSA, then it’s good enough for us….right?

( Just kidding NSA, please don’t send a drone to kill me)

Multi-Factor Authentication Ain't Your Grandma's Security Blanket

In the digital essence of the 21st century, you know you’ve truly made it when the thing you type most often into your phone isn’t 'I love you' but ‘123456’... Wait, that's not how this is supposed to go. Security breaches have skyrocketed with the proliferation of online accounts, making our data as accessible as Wi-Fi at a coffee shop.

Enter Multi-Factor Authentication (MFA), the trusty sidekick of passwords. And like most great duos, this combination can triumph with unbeatable flair—or lead to an unmitigated disaster quicker than you can say "ThisIsMyPassword1!".

The Power Couple: Passwords and MFA

Passwords have been around since cavemen first daubed crude hieroglyphics on digital cave walls, but as any cybersecurity expert will tell you, these passcodes are about as secure as a toothpick fence in a tornado. MFA is the wolf that blows those flimsy passwords down, layering on additional verification like fingerprints, facial recognition, or one-time passcodes.

The beauty of MFA lies in its ability to double-check identities. It's a little like the most epic fact-checker at a potential misinformation party, making sure every 'truth' is verifiable. If someone knows your password, it's about as useful to them as a chocolate teapot unless they have access to your trusted devices, your body, or apparently your twins if your security setup is Face ID with the latest iPhones.

The Drama Between Convenience and Security

But, and this is a big but, here's where the plot thickens—MFA can slant from security superhero to villain in the convenience story. Don't pretend like you're not guilty of momentarily contemplating turning off your 2F when you're caught in a meeting and need to access an email real quick.

I get it. Life before MFA was simpler, your password was your handshake with the web. You logged in, you got to work, end of story. Now it's a digitally orchestrated rumba every single time you want to access your precious data. But—and this is an important 'but' (much like the one in the eye-roll-inducing instance of “butt-dialing”—multifaceted security is truly vital. It's not just about preventing data breaches; it's about having peace of mind online, something that's becoming more of a luxury than an expectation.

The Bottom Line: Rethinking MFA as Part of Daily Hygiene

Security is no longer like a trip to the dentist—something you dread but do once in a blue moon. It’s a daily digital hygiene practice, or should I say flossing for your online presence (I should definitely say flossing)?

We need to adjust our attitudes towards MFA. It’s not an inconvenient, over-the-top cauldron of hoops to jump through; rather, it’s an extra pair of eyes, a second opinion in a world that's too often a bustling metropolis of potential cyber threats.

In the dance of convenience and security, MFA might lead or follow, but it needs to be a part of the choreography. It's a harmonious relationship that ensures our digital front door has more than one lock—and it's the closest we can get to peace in the volatile realm of online data.

In a world where '123456' still ranks as one of the most commonly used passwords, MFA might just be the game-changer we need to remind us that security is as multi-layered as the human psyche. It’s an authentication tango—a dance of many parts—that promises to keep our online selves more secure, and if you ask me, that's a beat worth getting into.

Rethinking Agile Practices in Identity Management

A brand new blog post hits the internet today as part of our sponsorship with ReadiBots. Let’s examine Agile Practices in Identity.

#276 - CloudSec with Kat Traxler of TrustOnCloud

Listen to this episode from Identity at the Center on Spotify. In this thought-provoking episode of Identity at the Center, hosts Jim McDonald and Jeff Steadman engage in a candid conversation with security researcher Kat Traxler from TrustOnCloud. They delve into the intricacies of cloud identity management, discussing the unique challenges and strategies for securing assets in cloud environments like GCP and AWS. Kat sheds light on the importance of understanding the resource hierarchy in GCP and the nuances that differentiate it from AWS. The trio also explores the evolution of IAM tools and their applicability in the cloud, the debate between least privilege and zero standing privilege, and the ongoing journey toward securing the cloud beyond IAM. As they unpack the complexities of cloud security, Kat shares her insights on the significance of asset inventories and the impact of policy inheritance on cloud platforms. The conversation also touches on the future of cloud security conferences and the value of hands-on experiences in understanding cloud security. Amidst the technical deep dive, the episode takes a lighter turn as the hosts and guest contemplate what life might look like outside the realm of technology, revealing personal aspirations ranging from farming to bronze sculpting. For those looking to expand their cloud security knowledge, Kat recommends checking out the GCP 101 series on her blog and the Forward Cloud SEC conference for a comprehensive learning experience. Connect with Kat: https://www.linkedin.com/in/kat-traxler-85a6592/ GCP 101 Series (Blog): https://kattraxler.cloud/gcp/iam/101/2024/03/03/gcp-series-101.html Google Cloud Adoption Framework: https://cloud.google.com/adoption-framework Learn more about TrustOnCloud: https://trustoncloud.com/ fwd:cloudsec conference: https://fwdcloudsec.org/ Identiverse 2024: As an IDAC listener, you can register with 25% off by using code IDV24-IDAC25 at https://events.identiverse.com/identiverse2024/register?code=IDV24-IDAC25 Attending the European Identity and Cloud Conference in Berlin? Use Discount Code: EIC24idac25 for 25% off. Register at https://www.kuppingercole.com/events/eic2024 Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Europe: https://www.terrapinn.com/exhibition/identity-week/ America: https://www.terrapinn.com/exhibition/identity-week-america Asia: https://www.terrapinn.com/exhibition/identity-week-asia/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.

The Evolution of Unified Management in Business

Listen to this episode from The Didi & Lital Show on Spotify. Didi and Lital discuss the stressful process of moving homes, the desire for chaos and change in life, and their personal home renovation project focusing on the importance of recessed outlets. They touch on their differing opinions on change and how managing a home project can cause 'hysteria mode'. The conversation shifts to the professional realm, discussing unified management systems within corporate and tech environments. They explore the challenges and necessities of unifying management for better efficiency, including the importance of single sign-on (SSO), persona-centric approaches, and the pitfalls of aiming for a 'single pane of glass' in product management. The discussion includes practical advice for startups on integrating into existing ecosystems and emphasizes the need for understanding user journeys and the importance of standards and APIs for easier integration. The episode wraps up with advice on developing unified platforms, considering real-life disunity among various professional roles.Topics:00:27 The Stress of Moving and Embracing Change01:31 Home Improvement Woes: The Quest for Recessed Outlets03:51 Unified Management Systems: From Home Chaos to Business Solutions07:14 The Evolution of Unified Management in Business10:09 Understanding Customer Needs: The Key to Successful Product Management15:41 The Evolution of User Interfaces and Consistency in Tech16:33 The Importance of a Unified User Experience16:50 Streamlining Security Operations with Unified Platforms17:38 Challenges of Tool Consolidation and Training18:19 The Basics of Effective Tool Use and Integration25:08 Leveraging Standards and APIs for Startup Success27:24 Strategic Integration and Management for Startups31:24 Understanding Your User and Building for the Future36:04 Closing Thoughts on Unified Platforms and User-Centric Design

Identity Jedi Show Podcast

Quick update. I know it’s been a while since our last upload, but we’ve got some great content coming your way. It just took a while to get guests scheduled. In the meantime, check out some of our backlog, and let us know what your favorite episode has been so far!

The Last Word

Conference season is in full swing as we get ready for RSA ( which I’m skipping by the way) and then the GrandDaddy of them all. Idenitverse. I mean, it’s like the Rose Bowl but for Identity, right? ( You’ll only get that reference Anyway, I digress. I am excited for this year’s Identiverse, as always, because it’s going to be great to see everyone and hear some amazing sessions. I’ll be there with the crew doing interviews, recording podcasts, and, yes, presenting as well. I’ll be doing one of the Masterclass sessions, and I’m working on the material RIGHT NOW. It will be great; I’m focusing on ensuring you can walk away with usable skills and have a good time.

Also, a quick word about sponsorships and the IDJ universe. We'll entertain more sponsorships as we continue to grow the newsletter and the podcast. Some of the sponsorships are other newsletters that come to us via Beehiiv, and then there are sponsors like Readibots, Acsence who come to us and are in the IAM industry. Our goal with these is to be fair, honest, and transparent. If it’s a platform/company we believe in and can see the value, we have very transparent conversations with the companies before we decide to partner on activities.

Baby steps to building this community. There are more things we want to do with vendors across the IDJ universe, so stay tuned. IF you are a vendor reading this..Let’s talk.

Until next time folks

Be Good to each other, Be Kind to each other, Love each other

-Identity Jedi

What did you think of this weeks newsletter?

Login or Subscribe to participate in polls.

Join the conversation

or to participate.