https://www.techtarget.com/searchsecurity/feature/identity-new-perimeter-enterprise-security
In the earliest generations of the internet, a simple IP address was often enough to identify a user. In many respects, that IP address was like the physical address where people live or work.
That hasn't been true for some time now, as IP addresses, especially IPv4 addresses, are often used and reused, sometimes with hundreds or even thousands of users sitting behind a single address. IP addresses are also increasingly ephemeral and not permanent in a way that an organization can trust as a reliable way to identify a user or entity.
Users and threats are no longer relegated to a single location or device, making it even more difficult for organizations to use traditional methods of the early Internet to understand who users are, where they are coming from and what threats they might pose.
The traditional perimeter, the demarcation point between an enterprise and the rest of the world, was well-defined.
CISOs and networking professionals could set up a firewall inside the enterprise's four walls. That firewall would serve as the logical wall between what is inside the organization and what is outside, effectively standing as the perimeter for defense. The networking team understood who was inside the perimeter, as those were local users.
Users outside the firewall were outside the perimeter and often identified with an IP address and, in some cases, a MAC address. Corporate users could get access from outside the firewall with a virtual private network (VPN) that provided tunneled access to the inside of the enterprise.
That traditional perimeter no longer exists and certainly hasn't for some time. All the resources that an organization requires are not within the company's four walls, and increasingly, neither are its users.
The modern organization uses a wide array of cloud software-as-a-service (SaaS)- based platforms to operate. Employees aren't always in the office, and they have multiple devices, including traditional laptops and smartphones. Workers now access corporate resources alongside cloud SaaS from diverse locations and user devices, often outside traditional network controls such as a firewall.
The old perimeter is gone. In its place, identity has emerged to enable users to gain access to resources. That could be a user identity, such as a username and password, or a device identity with an access token that provides authentication to a given service.
With identity being in many cases the 'key' to enabling access, rather than location or an IP address, identity in the modern era has become the new security perimeter.
As the perimeter, identity is now the core attack surface for cyber attackers who are looking to exploit organizations and their data. It is the literal key to unlocking access. Several factors have contributed to creating this situation, including the following:
Data from multiple industry reports statistically details the growing trend of identity-related cyberattacks. According to the IBM X-Force 2025 Threat Intelligence Index, abusing valid accounts remained the preferred entry point into victim environments for cybercriminals in 2024, representing 30% of all incidents X-Force responded to. The 2025 Verizon Data Breach Investigations Report highlights stolen credentials as the primary initial access vector in 22% of breaches, underscoring their role in facilitating unauthorized access.
There are many good reasons why enterprise boards should care about identity security. Simply put, identity security is not merely a technical concern; it is a strategic business issue that can have a non-trivial impact on an organization and its operations across multiple dimensions.
Defending the identity perimeter is not about implementing a single product or service. It's about having an overall strategy that accounts for the real threats and provides actionable capabilities to reduce risk, while ensuring secure access to organizational resources.
To effectively defend the identity perimeter, it's critical to focus on the following key action items, which address the most critical vulnerabilities and attack vectors.
IAM and identity governance and administration (IGA) are foundational elements for defending and securing the identity perimeter. It is imperative that organizations evaluate, select and then implement both IAM and IGA.
Proper IAM deployment centralizes identity management, which enables organizations to set up and enforce unified polices across all modalities and workflows. IGA provides an overall view of identities and the actual access rights that each identity has been granted, enabling real time monitoring of access patterns and potential security violations
Beyond standard IAM, organizations must implement privileged access management (PAM) to secure high-risk accounts with elevated permissions. PAM solutions provide additional controls for administrative accounts and sensitive system access.
Establish policies and procedures for managing identities with the IAM and IGA systems. This includes deprovisioning older, unused identities and regular auditing. Conduct automated access reviews to identify and rectify cases where users may have accumulated unnecessary or excessive permissions over time.
A key area of weakness for many organizations is the fact that they have separate identities inside the organization that are different from the cloud. Some form of control that manages and unifies that identity, which can come from IAM and IGA, needs to be part of the overall strategy. Technologies such as single sign-on and federated identity management can help.
Multi-factor authentication (MFA) is critical to securing identities. Simply having a username and a single password isn't enough. Cyber attackers easily steal user credentials and passwords through various attacks, including data breaches and phishing. MFA provides another layer of authentication beyond a single password, making it more resilient.
It's important to train employees on best practices for managing their own identities. This can include awareness about phishing risks and education about why MFA is important.
IoT, agentic AI, servers and APIs are all part of the technology landscape, and none of them are human. Those technologies all must also have some form of identity that is actively managed and monitored through automated threat detection and response capabilities that can identify anomalous behavior patterns.
Just as a company's financial controls require coordinated oversight between the CFO, auditors, and board to prevent fraud and ensure compliance, identity security demands similar executive alignment to protect the organization's most valuable digital assets.
The following framework outlines the critical areas where CISOs, CIOs and board members must collaborate to ensure organizational protection and business continuity.
Focus Area | CISO Responsibilities | CIO Responsibilities | Board Member Oversight |
Strategic Business Alignment |
|
|
|
Risk & Compliance Governance |
|
|
|
Technology Investment Priorities |
|
|
|
Future-Ready Security Posture |
|
|
|
Cross-Functional Accountability |
|
|
|
Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.
06 Jun 2025