TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/feature/identity-new-perimeter-enterprise-security

Why identity is the new perimeter – and how to defend it

By Sean Michael Kerner

In the earliest generations of the internet, a simple IP address was often enough to identify a user. In many respects, that IP address was like the physical address where people live or work.

That hasn't been true for some time now, as IP addresses, especially IPv4 addresses, are often used and reused, sometimes with hundreds or even thousands of users sitting behind a single address. IP addresses are also increasingly ephemeral and not permanent in a way that an organization can trust as a reliable way to identify a user or entity.

Users and threats are no longer relegated to a single location or device, making it even more difficult for organizations to use traditional methods of the early Internet to understand who users are, where they are coming from and what threats they might pose.

The end of the traditional perimeter

The traditional perimeter, the demarcation point between an enterprise and the rest of the world, was well-defined.

CISOs and networking professionals could set up a firewall inside the enterprise's four walls. That firewall would serve as the logical wall between what is inside the organization and what is outside, effectively standing as the perimeter for defense. The networking team understood who was inside the perimeter, as those were local users.

Users outside the firewall were outside the perimeter and often identified with an IP address and, in some cases, a MAC address. Corporate users could get access from outside the firewall with a virtual private network (VPN) that provided tunneled access to the inside of the enterprise.

That traditional perimeter no longer exists and certainly hasn't for some time. All the resources that an organization requires are not within the company's four walls, and increasingly, neither are its users.

The modern organization uses a wide array of cloud software-as-a-service (SaaS)- based platforms to operate. Employees aren't always in the office, and they have multiple devices, including traditional laptops and smartphones. Workers now access corporate resources alongside cloud SaaS from diverse locations and user devices, often outside traditional network controls such as a firewall.

The old perimeter is gone. In its place, identity has emerged to enable users to gain access to resources. That could be a user identity, such as a username and password, or a device identity with an access token that provides authentication to a given service.

Why identity is now the core attack surface

With identity being in many cases the 'key' to enabling access, rather than location or an IP address, identity in the modern era has become the new security perimeter.

As the perimeter, identity is now the core attack surface for cyber attackers who are looking to exploit organizations and their data. It is the literal key to unlocking access. Several factors have contributed to creating this situation, including the following:

Data from multiple industry reports statistically details the growing trend of identity-related cyberattacks. According to the IBM X-Force 2025 Threat Intelligence Index, abusing valid accounts remained the preferred entry point into victim environments for cybercriminals in 2024, representing 30% of all incidents X-Force responded to. The 2025 Verizon Data Breach Investigations Report highlights stolen credentials as the primary initial access vector in 22% of breaches, underscoring their role in facilitating unauthorized access.

Why should enterprise boards care about identity security?

There are many good reasons why enterprise boards should care about identity security. Simply put, identity security is not merely a technical concern; it is a strategic business issue that can have a non-trivial impact on an organization and its operations across multiple dimensions.

Executive priorities for defending the identity perimeter

Defending the identity perimeter is not about implementing a single product or service. It's about having an overall strategy that accounts for the real threats and provides actionable capabilities to reduce risk, while ensuring secure access to organizational resources.

To effectively defend the identity perimeter, it's critical to focus on the following key action items, which address the most critical vulnerabilities and attack vectors.

Invest in robust IAM and IGA

IAM and identity governance and administration (IGA) are foundational elements for defending and securing the identity perimeter. It is imperative that organizations evaluate, select and then implement both IAM and IGA.

Proper IAM deployment centralizes identity management, which enables organizations to set up and enforce unified polices across all modalities and workflows. IGA provides an overall view of identities and the actual access rights that each identity has been granted, enabling real time monitoring of access patterns and potential security violations

Implement privileged access management

Beyond standard IAM, organizations must implement privileged access management (PAM) to secure high-risk accounts with elevated permissions. PAM solutions provide additional controls for administrative accounts and sensitive system access.

Develop a comprehensive identity governance framework

Establish policies and procedures for managing identities with the IAM and IGA systems. This includes deprovisioning older, unused identities and regular auditing. Conduct automated access reviews to identify and rectify cases where users may have accumulated unnecessary or excessive permissions over time.

Understand the intersection of enterprise identity and cloud identity

A key area of weakness for many organizations is the fact that they have separate identities inside the organization that are different from the cloud. Some form of control that manages and unifies that identity, which can come from IAM and IGA, needs to be part of the overall strategy. Technologies such as single sign-on and federated identity management can help.

Embrace MFA

Multi-factor authentication (MFA) is critical to securing identities. Simply having a username and a single password isn't enough. Cyber attackers easily steal user credentials and passwords through various attacks, including data breaches and phishing. MFA provides another layer of authentication beyond a single password, making it more resilient.

Focus on employee awareness and training

It's important to train employees on best practices for managing their own identities. This can include awareness about phishing risks and education about why MFA is important.

Pay attention to non-human entities

IoT, agentic AI, servers and APIs are all part of the technology landscape, and none of them are human. Those technologies all must also have some form of identity that is actively managed and monitored through automated threat detection and response capabilities that can identify anomalous behavior patterns.

A C-suite roadmap to identity security

Just as a company's financial controls require coordinated oversight between the CFO, auditors, and board to prevent fraud and ensure compliance, identity security demands similar executive alignment to protect the organization's most valuable digital assets.

The following framework outlines the critical areas where CISOs, CIOs and board members must collaborate to ensure organizational protection and business continuity.

Focus Area CISO Responsibilities CIO Responsibilities Board Member Oversight
Strategic Business Alignment
  • Define an identity security strategy that balances protection with user experience.
  • Ensure technology infrastructure supports business objectives.
  • Maintain productivity.
  • Recognize identity management as a boardroom imperative.
  • Approve strategic investments.
Risk & Compliance Governance
  • Implement continuous audit capabilities.
  • Ensure real time compliance reporting dashboards.
  • Understand financial impact and fiduciary responsibility.
  • Establish risk tolerance levels
Technology Investment Priorities
  • Specify security requirements for IAM/IGA solutions and zero-trust architecture
  • Lead unified platform strategy and automation initiatives that deliver faster reviews.
  • Allocate a budget for technologies that provide organizational visibility into identity.
Future-Ready Security Posture
  • Plan AI/machine learning integration for identity threat detection and behavioral analytics.
  • Build a scalable infrastructure that adapts to evolving business requirements.
  • Support long-term vision for identity-centric security transformation.
Cross-Functional Accountability
  • Own security strategy and incident response protocols.
  • Execute technical implementation and system integration.
  • Provide governance oversight.

Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.

06 Jun 2025

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement