TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/definition/What-is-machine-identity-management

What is machine identity management?

By Sean Michael Kerner

Machine identity management focuses on the machines connected to and accessing resources on a network. It aids in providing network authentication and authorization to machine entities and endpoints -- internet of things devices, servers, applications and workloads – across on-premises, multi-cloud and hybrid cloud environments.

The concept of identity, for many types of IT operations and applications, is critical to understanding a user or an entity. A machine, from an identity perspective, is a non-human entity. Traditional identity and access management (IAM) governed the identities of users as a function of granting proper access rights based on the user. At times, machine identity is part of a large IAM system that manages both human and non-human identities.

A machine identity is a unique descriptor for a device provided via digital credentials, such as a digital certificate that uses cryptographic keys to verify a specific entity. Machine identity management is an ongoing process that begins with discovery and features ongoing governance and protection as part of its lifecycle, which continues with renewal or ends with revocation.

How does machine identity management work?

At the foundation of nearly all machine identity is cryptography based on public key infrastructure (PKI), and it's the basis for the digital certificates that identify a specific device.

However, a PKI-based digital certificate isn't enough. To succeed, machine identity management's process follows multiple steps:

  1. Machine discovery and inventory. An organization's first step is to scan the entire network infrastructure to identify all machines, including physical devices, virtual machines, application programming interfaces (APIs) and other non-human entities. The completed scan makes possible an inventory of all machine identities, including details such as device type, purpose, location and current authentication methods.
  2. Assessment. With inventory complete, businesses evaluate the risk level and importance of each machine identity. Forward-thinking organizations classify machines based on their roles, the sensitivity of data handled and its impact if compromised.
  3. Policy definition. Next, organizations define and establish policies for issuance, renewal and revocation of machine identities. The policy must access control policies and provide governance to determine who can manage and use machine identities.
  4. Certificate authority setup. The digital certificate used for machine identities requires a certificate authority (CA), either internal or external, to issue and manage digital certificates.
  5. Identity creation and issuance. With CA set up, policies in place and an inventory of all systems, organizations then generate unique identities for each machine, typically in the form of digital certificates. Generating digital certificates for each machine first requires creating a certificate signing request, which is then submitted to the CA for signing.
  6. Deployment and configuration. Next, the issued certificates are installed on the correct machines.
  7. Centralized management. While the certificate authority performs some centralized machine identity management, it's best practice to specify one centralized platform to oversee all aspects of the lifecycle.
  8. Monitoring and auditing. The centralized management platform, including its integration with existing security tools such as security information and event management, often features continuous monitoring for all machine identities, tracking their status and usage as well as any anomalies.

Why is machine identity management important?

Machine identity management protects organizations in several essential ways and areas:

Challenges of machine identity management

There are ongoing challenges organizations face with machine identity management:

Main use cases for machine identity management

Among the many examples of machine identity management, the following handful are typical use cases:

The machine identity management lifecycle

The machine identity management lifecycle, including creation to eventual retirement, includes the following stages:

Machine identity management best practices

Machine identity management is often a complicated process, but following certain best practices tempers its inherent complexity and improves organizational outcomes. These best practices include the following:

06 Nov 2024

All Rights Reserved, Copyright 2000 - 2026, TechTarget | Read our Privacy Statement