{"id":130,"date":"2021-03-05T14:05:55","date_gmt":"2021-03-05T14:05:55","guid":{"rendered":"https:\/\/iamtec.eu\/en\/?page_id=130"},"modified":"2021-04-23T23:39:25","modified_gmt":"2021-04-23T21:39:25","slug":"security","status":"publish","type":"page","link":"https:\/\/iamtec.eu\/en\/security\/","title":{"rendered":"Security of Identities and\/or Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"130\" class=\"elementor elementor-130\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d810c31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d810c31\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e99a297\" data-id=\"e99a297\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d7e6e9 elementor-widget elementor-widget-image\" data-id=\"7d7e6e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/iamtec.eu\/en\/wp-content\/uploads\/sites\/5\/2021\/03\/shield_128x128.png\" class=\"attachment-large size-large wp-image-127\" alt=\"Security\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9b6ca1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9b6ca1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d3a614\" data-id=\"1d3a614\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b80cadf elementor-widget elementor-widget-text-editor\" data-id=\"b80cadf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For the security of both identities and systems, we use both the &#8220;defense&#8221; approach and the &#8220;attack&#8221; approach. From a defense perspective, both identities and systems must be secured as best as possible. With this a healthy balance between &#8220;security&#8221; and &#8220;user experience&#8221; is achieved. We do not want (too) strict security that results in a bad user experience. Bad user experience in turn will result in poor security due to incorrect behavior. To prevent that additional guidance or tooling is needed. Nevertheless, sometimes you really need to bite the bullet if you are behind on (new) security standards. Subsequently, both identities and systems must be approached from an attack perspective. The main reason for this is to learn which weaknesses still exist in order to (be able to) take measures. Those measures further mitigate risks and where possible even eliminate them completely.<\/p><p>Ask yourself the following question: &#8220;<i>why not use the knowledge of possible weaknesses yourself to make improvements, instead of having a malicious person use it against you?<\/i>&#8220;<\/p><p>Ultimately, it&#8217;s all about ensuring:<\/p><ul><li>identities have correct and most recent security settings;<\/li><li>identities have unique and strong passwords instead of shared and weak\/compromised passwords;<\/li><li>identities receive additional authentication verification through some form of MFA where and when applicable;<\/li><li>where possible identities no longer use (additional) passwords (at all), but instead use other stronger authentication mechanisms (passwordless), or at least less passwords;<\/li><li>malicious people are blocked and employees can continue to do their work with minimal or no impact;<br \/>authentication systems are as secure as possible and use the most recent settings and protocols;<\/li><li>abnormal events are detected in time with, if necessary, follow-up risk mitigation measures.<\/li><\/ul><p>Remember, Active Directory at this point in time for many organizations is still the foundation in a hybrid identity scenario, but also a primary attack vector. Make sure to be and stay in control, discover and fix weaknesses before attackers use them against your organization.<\/p><p>Do you know what the security posture is of your core identity systems? Would you like to know?<\/p><p>Be secure, stay secure, but also ahead!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c4f116a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c4f116a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9b7847d\" data-id=\"9b7847d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35fa12e elementor-widget elementor-widget-image\" data-id=\"35fa12e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/iamtec.eu\/en\/contact-us\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/iamtec.eu\/en\/wp-content\/uploads\/sites\/5\/elementor\/thumbs\/contact-us-q7qg7oyudlt6xta5iwrttm1wzxpuwgicnj0xnuztme.png\" title=\"contact-us\" alt=\"contact-us\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-93b0792 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"93b0792\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e05f2b3\" data-id=\"e05f2b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-133fc88 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"133fc88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f786631 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f786631\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7757335\" data-id=\"7757335\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be50d29 elementor-widget elementor-widget-text-editor\" data-id=\"be50d29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-family: Abel; font-size: 16px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; text-align: center;\">CoC (NL): 78.70.27.20 || VAT ID: NL002970959B74<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d34e2aa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d34e2aa\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec69009\" data-id=\"ec69009\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c3c91e elementor-widget elementor-widget-text-editor\" data-id=\"6c3c91e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Abel; font-size: 16px; font-style: normal; font-weight: 400;\">Unless otherwise stated and\/or agreed, the NLdigital Terms and Conditions 2020 (<\/span><a href=\"http:\/\/tiny.cc\/TermsAndConditionsIAMTEC\" target=\"_blank\" rel=\"noopener\" style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Abel; font-size: 16px; font-style: normal; font-weight: 400;\">English version<\/a><span style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Abel; font-size: 16px; font-style: normal; font-weight: 400;\">) (<\/span><a href=\"http:\/\/tiny.cc\/AlgemeneVoorwaardenIAMTEC\" target=\"_blank\" rel=\"noopener\" style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Abel; font-size: 16px; font-style: normal; font-weight: 400;\">Dutch version<\/a><span style=\"font-variant-ligatures: normal; font-variant-caps: normal; font-family: Abel; font-size: 16px; font-style: normal; font-weight: 400;\">) apply to all our offers and agreements, deposited at the District Court Midden-Nederland, location Utrecht. In the event of disputes concerning interpretation of the English version of the NLdigital Terms, the Dutch version takes precedence.<\/span><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a18387 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a18387\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d884cc7\" data-id=\"d884cc7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3dd0c22 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3dd0c22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f15c439 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f15c439\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0602123\" data-id=\"0602123\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aaf54f9 elementor-widget elementor-widget-html\" data-id=\"aaf54f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div align=\"center\">Icons made by <a href=\"https:\/\/www.flaticon.com\/authors\/eucalyp\" title=\"Eucalyp\" target=\"_blank\">Eucalyp<\/a> from <a href=\"https:\/\/www.flaticon.com\/\" title=\"Flaticon\" target=\"_blank\">www.flaticon.com<\/a><\/div>\r\n\r\n<div align=\"center\">Icons made by <a href=\"https:\/\/www.freepik.com\" title=\"Freepik\" target=\"_blank\">Freepik<\/a> from <a href=\"https:\/\/www.flaticon.com\/\" title=\"Flaticon\" target=\"_blank\">www.flaticon.com<\/a><\/div>\r\n\r\n<div align=\"center\"><a href=\"https:\/\/www.freepik.com\/photos\/background\" title=\"Freepik\" target=\"_blank\">Background photo created by rawpixel.com - www.freepik.com<\/a><\/div>\r\n\r\n<div align=\"center\"><a href=\"https:\/\/www.freepik.com\/vectors\/technology\" title=\"Freepik\" target=\"_blank\">Technology vector created by upklyak - www.freepik.com<\/a><\/div>\r\n\r\n<div align=\"center\"><a href=\"https:\/\/www.freepik.com\/vectors\/business\" title=\"Freepik\" target=\"_blank\">Business vector created by freepik - www.freepik.com<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>For the security of both identities and systems, we use both the &#8220;defense&#8221; approach and the &#8220;attack&#8221; approach. From a defense perspective, both identities and systems must be secured as best as possible. With this a healthy balance between &#8220;security&#8221;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-130","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/pages\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":48,"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/pages\/130\/revisions"}],"predecessor-version":[{"id":568,"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/pages\/130\/revisions\/568"}],"wp:attachment":[{"href":"https:\/\/iamtec.eu\/en\/wp-json\/wp\/v2\/media?parent=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}