<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Justin Leblanc, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/justin-leblanc/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/justin-leblanc/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 26 Mar 2025 14:31:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Justin Leblanc, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/justin-leblanc/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AI4Cyb: how will AI improve your company&#8217;s cyber capabilities?</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/03/ai4cyb-how-will-ai-improve-your-companys-cyber-capabilities/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/03/ai4cyb-how-will-ai-improve-your-companys-cyber-capabilities/#respond</comments>
		
		<dc:creator><![CDATA[Justin Leblanc]]></dc:creator>
		<pubDate>Wed, 26 Mar 2025 14:31:51 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[chat GPT]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[genai]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25677</guid>

					<description><![CDATA[<p>Will AI also revolutionize cybersecurity? Today, there&#8217;s every reason to believe so! After a decade of massive investment in cybersecurity, we are a period of consolidation. Optimization is becoming the watchword: automate repetitive tasks, rationalize resources, detect ever faster and...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/ai4cyb-how-will-ai-improve-your-companys-cyber-capabilities/">AI4Cyb: how will AI improve your company&#8217;s cyber capabilities?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: justify;">Will AI also revolutionize cybersecurity?</h2>
<p style="text-align: justify;">Today, there&#8217;s every reason to believe so!</p>
<p style="text-align: justify;">After a decade of massive investment in cybersecurity, we are a period of consolidation. Optimization is becoming the watchword: automate repetitive tasks, rationalize resources, detect ever faster and respond ever better.</p>
<p style="text-align: justify;">AI, among other things, is a response to these objectives.</p>
<p style="text-align: justify;">But in concrete terms, what changes has it already brought? What use cases are transforming the daily lives of cyber teams? And how far can we go?</p>
<p style="text-align: justify;">Let&#8217;s explore together how AI will revolutionize cybersecurity.</p>
<p> </p>
<h2 style="text-align: justify;">Raising awareness: AI is changing the game!</h2>
<p style="text-align: justify;">In a nutshell: 20% of cyber incidents are related to phishing and the use of stolen accounts (<a href="https://www.wavestone.com/fr/insight/rapport-cert-wavestone-2024/#:~:text=Avec%2020%25%20chacun%2C%20le%20phishing,vecteurs%20d%27intrusion%20fortement%20utilis%C3%A9.">according to the CERT-Wavestone 2024 report: trends, analyses and lessons for 2025</a>).</p>
<p style="text-align: justify;">Training teams is therefore essential. But it&#8217;s an onerous task, requiring time, resources and the right approach to capture attention and guarantee real impact. AI is changing the game by automating awareness campaigns, making them more interactive and engaging.</p>
<p style="text-align: justify;">There&#8217;s no longer any excuse for excluding an entity from your campaign because they don&#8217;t speak English, or for failing to tailor your communications to the issues faced by different departments (HR, Finance, IT&#8230;).</p>
<p style="text-align: justify;">With a little background on the different teams targeted, and an initial version of your awareness campaign, GenAI<sup>1</sup><sup> </sup>templates can quickly break down your campaigns into customized copies for each target group. AI makes it possible to create, with minimal effort, content tailored to the issues of the awareness program&#8217;s targets, increasing employee engagement and interest thanks to a message that is fully addressed to them and deals with their own issues. This saves time, performance and quality, enabling you to transform massive, generic awareness campaigns into <strong>targeted, personalized campaigns that are undeniably more relevant.</strong></p>
<p style="text-align: justify;">Two possibilities are emerging for implementing this use case:</p>
<ul style="text-align: justify;">
<li><strong>Use your company&#8217;s trusted GenAI templates</strong> to help you generate your campaign elements. The advantage here is, of course, the low costs involved.</li>
<li><strong>Use an external supplier.</strong> Many service providers who assist companies with standard phishing campaigns use GenAI internally to deliver a customized solution quickly.</li>
</ul>
<p style="text-align: justify;">In short, AI will reduce the cost and time taken to roll out awareness programs, while improving their adherence and effectiveness to make safety a responsibility shared by all.</p>
<p style="text-align: justify;">These same AI models can also be customized and used by cybersecurity teams for other purposes, such as <strong>facilitating access to cybersecurity repositories.</strong></p>
<p> </p>
<h2 style="text-align: justify;">CISO GPT: simplified access to the cyber repository for the business</h2>
<p style="text-align: justify;">Internal cybersecurity documents and regulations are generally comprehensive and well mastered by the teams involved in drawing them up. However, they remain little known to other company departments.</p>
<p style="text-align: justify;">These documents are full of useful information for the business, but due to a lack of visibility, policies are not applied. Cyber teams are called upon to respond to recurring requests for information, even though these are well documented.</p>
<p style="text-align: justify;">With AI chatbots, this information becomes easily accessible. No need to scroll through entire pages: a simple question provides clear, instant answers, making it easier to apply best practices and react quickly in the event of an incident</p>
<p style="text-align: justify;">More and more companies are adopting chatbots based on generative AI to answer users&#8217; questions and guide them to the right information. These tools, powered by models such as ChatGPT, Gemini or LLaMA, access up-to-date, high-quality internal data.</p>
<p style="text-align: justify;">Result: users quickly find the answers they need.</p>
<p style="text-align: justify;">At Wavestone, we have developed <strong>CISO GPT</strong>. This chatbot, connected to internal security repositories, becomes a veritable cybersecurity assistant. It answers common questions, facilitates access to best practices and relieves cyber teams of repetitive requests</p>
<p style="text-align: justify;">Answering business questions with AI is all well and good. But it&#8217;s possible to do so much more!</p>
<p style="text-align: justify;">As well as providing rapid access to information, AI can also automate time-consuming tasks. Incident management, alert analysis, reporting&#8230; these are all processes that consume time and resources. What if AI could speed them up, or even take them over?</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Save time with AI: Automate time-consuming tasks</h2>
<p style="text-align: justify;">Everyday business life is full of time-consuming tasks. AI can certainly automate many of them, but which ones should you focus on first for maximum value?</p>
<h3 style="text-align: justify;">Automating data classification with AI</h3>
<p style="text-align: justify;">Here&#8217;s a first answer with another figure: <strong>77% of recorded cyber-attacks resulted in data theft.</strong> (<a href="https://www.wavestone.com/fr/insight/rapport-cert-wavestone-2024/#:~:text=Avec%2020%25%20chacun%2C%20le%20phishing,vecteurs%20d%27intrusion%20fortement%20utilis%C3%A9.">According to the CERT-Wavestone 2024 report: trends, analyses and lessons for 2025</a></p>
<p style="text-align: justify;">And this trend is unlikely to slow down. The explosion in data volumes, accelerated by the rise of AI, makes securing them more complex.</p>
<p style="text-align: justify;">Faced with this challenge, Data Classification remains an essential pillar in building effective DLP (Data Loss Prevention) rules. The aim: to identify and categorize data according to its sensitivity, and apply the appropriate protection measures.</p>
<p style="text-align: justify;">But classifying data by hand is <strong>impossible on a large scale.</strong> Fortunately, machine learning can automate the process. No need for GenAI here: specialized algorithms can analyze immense volumes of documents, understand their nature and predict their level of sensitivity.</p>
<p style="text-align: justify;">These models are based on several criteria:</p>
<ul style="text-align: justify;">
<li><strong>The presence of sensitive indicators</strong> (bank numbers, personal data, strategic information, ).</li>
<li><strong>User behavior</strong> to detect anomalies and report abnormally exposed files.</li>
</ul>
<p style="text-align: justify;">By combining Data Classification and AI, companies can finally regain control of their data and drastically reduce the risk of data leakage.</p>
<p style="text-align: justify;">This is where DSPM (Data Security Posture Management) comes in. These solutions go beyond simple classification, offering complete visibility of data exposure in cloud and hybrid environments. They can detect poorly protected data, monitor access and automate compliance.</p>
<p style="text-align: justify;">And compliance is another time-consuming process!</p>
<p> </p>
<h3 style="text-align: justify;">Simplify compliance: automate it with AI</h3>
<p style="text-align: justify;">Complying with standards and regulations is a tedious task. With every new standard comes a new compliance process!</p>
<p style="text-align: justify;">For an international player, subject to several regulatory authorities, it&#8217;s a never-ending loop.</p>
<p style="text-align: justify;">Good news: AI can automate much of the work. GenAI-based solutions can verify and anticipate compliance deviations.</p>
<p style="text-align: justify;">AI excels at analyzing and comparing structured data. For example, a GenAI model can compare a document with an internal or external repository to validate its compliance. Need to check an ISP against NIST recommendations? AI can identify discrepancies and suggest adjustments.</p>
<p> </p>
<h3 style="text-align: justify;">Simplify vulnerability management</h3>
<p style="text-align: justify;">AI has no shortage of solutions when it to vulnerability management. It can automate several key tasks:</p>
<ul style="text-align: justify;">
<li><strong>Verification of firewall rules</strong>: GenAI can analyze a flow matrix and compare it with the rules actually implemented. It detects inconsistencies and can even anticipate the impact of a rule change.</li>
<li><strong>Code review</strong>: AI scans code for security flaws and suggests optimizations. With these tools, <strong>teams reduce the risk of error, speed up </strong>processes and free up time to concentrate on higher value-added tasks.</li>
</ul>
<p style="text-align: justify;">Automating compliance and vulnerability management reinforces upstream security and anticipates threats. But sometimes it&#8217;s already too late!</p>
<p style="text-align: justify;">Faced with ever more innovative attackers, how can AI help to better detect and respond to incidents?</p>
<p> </p>
<h2 style="text-align: justify;">Incident detection and response: AI on the front line</h2>
<p style="text-align: justify;">Let&#8217;s start with a clear observation: cyberthreats are constantly evolving!</p>
<p style="text-align: justify;">Attackers are adapting and innovating, and it is imperative to react quickly and effectively to increasingly sophisticated incidents. Security Operations Centers (SOCs) are at the forefront of incident management.</p>
<p style="text-align: justify;">With the AI on their side, they now have a new ally!</p>
<p> </p>
<h3 style="text-align: justify;">AI at the heart of the SOC: detect faster&#8230;.</h3>
<p style="text-align: justify;">One of the most widely used and damaging attack vectors in recent years is phishing, and the attempts are not only more recurrent, but also more elaborate than in the past: QR-Code, BEC (Business Email Compromise) &#8230;</p>
<p style="text-align: justify;">As mentioned above, awareness-raising campaigns are essential to deal with this threat, but it is now possible to <strong>reinforce the first lines of defense against this type of attack thanks to deep learning</strong>.</p>
<p style="text-align: justify;">NLP language processing algorithms don&#8217;t just analyze the raw content of e-mails. They also detect subtle signals such as an alarmist tone, an urgent request or an unusual style. By comparing each message with the usual patterns, AI can more effectively spot fraud attempts. These solutions go much further than traditional anti-spam solutions, which are often based solely on indicators of compromise.</p>
<p style="text-align: justify;">Apart from this very specific case, AI will become indispensable for the detection of deviant behavior (UEBA). The ever-increasing size and diversity of IS makes it impossible to build individual rules to detect anomalies. Thanks to machine learning, we can continuously analyze the activities of users and systems to identify significant deviations from normal behavior. This makes it possible to detect threats that are difficult to identify with static rules, such as a compromised account suddenly accessing sensitive resources, or a user adopting unusual behavior outside his or her normal working hours.</p>
<p style="text-align: justify;">These solutions are not new: as early as 2015, solution vendors were proposing the incorporation of behavioral analysis algorithms into their solutions!</p>
<p style="text-align: justify;">AI also plays a key role in accelerating and automating response. Faced with ever faster and more sophisticated attacks, let&#8217;s see how AI enables SOC teams to react with greater efficiency and precision.</p>
<p> </p>
<h3 style="text-align: justify;">&#8230; answer louder</h3>
<p style="text-align: justify;">SOC analysts, overwhelmed by a growing volume of alerts, have to deal with ever more of them, with teams that are not growing. To help them, new GenAI assistants dedicated to SOC are emerging on the market, optimizing the entire incident processing chain. The aim is to do more with less, by redirecting analysts towards higher value-added tasks and limiting the well-known syndrome of &#8220;alert fatigue&#8221;</p>
<p style="text-align: justify;">Starting with prioritization, operational teams are overwhelmed by alerts, and must constantly <strong>distinguish between true and false, priority and low priority</strong>. On a list of 20 alerts in front of me, which ones represent a real attack on my IS? AI&#8217;s strength lies precisely in ensuring better alert processing by correlating current events. In an instant, AI excludes false positives and returns the list of priority incidents to be investigated</p>
<p style="text-align: justify;">The analyst can then rely on this feedback to launch his investigation. And here again, the AI supports him in his research. The GenAI assistant is capable of generating queries based on natural language, making it easy to interrogate all network equipment. Based on its knowledge, the AI can also suggest the steps to follow for the investigation: who should I question? What should I check?</p>
<p style="text-align: justify;">The results returned will not be comparable to the analysis  an expert SOC engineer. On the other hand, they will enable more junior analysts to begin their investigation before escalating it in the event of difficulties.</p>
<p style="text-align: justify;">But the job doesn&#8217;t stop there: you need to be able to <strong>take the necessary remediation actions following the discovery of an attack</strong>. Once again, the AI assistant keeps the focus on the decision-making process, and quickly provides the user with a set of actions to take to contain the threat: hosts to isolate, IPs to block&#8230;</p>
<p style="text-align: justify;">The power of these use cases also lies in the ability of AI assistants to provide structured feedback, which makes it much easier not only for analysts to understand, but also to archive and explain incidents to a third party.</p>
<p style="text-align: justify;">Of course, these are not the only use cases to date, and many more will emerge in the years to come. For incident response teams, the next step is clear: <strong>automate remediation and protection actions</strong>. We are already seeing this for our most mature customers, and the arrival of AI<sup> </sup>agents<sup>2</sup> will only accelerate this trend.</p>
<p style="text-align: justify;">The next use cases are clear: AI active rights over corporate resources to enable <strong>a real-time response to block the spread of a threat</strong>. Following an autonomous investigation, the AI will be able to <strong>decide on its own whether to adapt firewall rules, revoke a user&#8217;s access on the fly, or initiate a new strong authentication request</strong>. Of course, such advanced autonomy is still some way off, but it&#8217;s clear that we&#8217;re heading in that direction&#8230;</p>
<p style="text-align: justify;">Finally, integrating these use cases raises another major challenge: <strong>price</strong>. Adding these use cases has a cost. In a tense economic climate, the budgets of security teams are not being revised upwards &#8211; quite the contrary. The next step will be <strong>to find a compromise between security gains and financial costs.</strong></p>
<p> </p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">Cybersecurity teams are faced with a plethora of AI solutions on offer, making the choice a complex one. To move forward effectively, it&#8217;s essential to adopt a pragmatic and structured approach. Our recommendations:</p>
<ul style="text-align: justify;">
<li><span style="font-weight: normal !msorm;"><strong>Get trained in AI </strong></span>to better assess the added value of certain products, and avoid &#8216;gimmicky&#8217; solutions.</li>
<li><strong>Choose the right use cases </strong>according to their added value (optimization of resources, economies of scale, improved risk coverage) and complexity (technology base, data management, HR and financial costs).</li>
<li><strong>Define the right development strategy</strong>, choosing between an in-house approach or using existing market solutions.</li>
<li><strong>Focus on impact </strong>rather than completeness, aiming for efficient deployment of use cases.</li>
<li><strong>Anticipate the challenges of securing AI</strong>, including model robustness, bias management and resistance to adversarial attacks.</li>
</ul>
<p style="text-align: justify;">Ten years ago, DARPA launched a challenge on autonomous cars. What was then science fiction is now reality. In 2025, AI will transform cybersecurity. We&#8217;re only at the beginning: how far will AI agents go in 10 years&#8217; time?</p>
<p> </p>
<p>&#8211;</p>
<p>1: GenAI (Generative Artificial Intelligence) refers to a branch of AI capable of creating original content (text, images, code, etc.) based on models trained on large datasets.<br />2: AI agent refers to an artificial intelligence capable of acting autonomously to achieve complex goals, by planning, making decisions and interacting with its environment without constant human supervision.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/03/ai4cyb-how-will-ai-improve-your-companys-cyber-capabilities/">AI4Cyb: how will AI improve your company&#8217;s cyber capabilities?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/03/ai4cyb-how-will-ai-improve-your-companys-cyber-capabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zero trust and identity as the new perimeter : what about tokens ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/#respond</comments>
		
		<dc:creator><![CDATA[Justin Leblanc]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 09:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[AAD]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19101</guid>

					<description><![CDATA[<p>Introduced just over 10 years ago by Forrester, Zero Trust is a security philosophy that starts from the premise that the cyber threat is omnipresent, both outside and inside the IS, and consequently proposes an access management strategy based on...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/">Zero trust and identity as the new perimeter : what about tokens ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Introduced just over 10 years ago by <a href="https://www.forrester.com/blogs/the-definition-of-modern-zero-trust/">Forrester</a>, <em>Zero Trust</em> is a security philosophy that starts from the premise that the cyber threat is omnipresent, both outside and inside the IS, and consequently proposes an access management strategy based on the three basic principles: explicit verification, minimising privileges, and constant monitoring.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-19102 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN.png" alt="" width="602" height="134" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN.png 602w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN-437x97.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/1EN-600x134.png 600w" sizes="(max-width: 602px) 100vw, 602px" /></p>
<p style="text-align: center;"><strong><em>Figure 1 :</em></strong><em> The three fundamental principles of the Zero Trust model</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Despise these principles being well-known now, their practical implementation still represents a challenge for many organisations.</p>
<p style="text-align: justify;">Currently, there is not and will not be a specific product that can be used to implement a Zero Trust model, instead, there are many distinctive implementation architectures. For user access, Zero Trust can be applied using two main architectural models (which are not in conflict and can be complementary):</p>
<ul style="text-align: justify;">
<li>A model using a cut-off infrastructure element, e.g., a Secure Access Service Edge (SASE) approach. It dynamically controls network access to IS resources (where the user&#8217;s identity and posture are being used to make the decision).</li>
<li>An approach where only identity is used to make the cut: access to IS resources is conditional, requiring proof of authentication and authorisation. In this approach, access control is carried out by an identity provider (identity manager or IdP) and by the targeted resources themselves.</li>
</ul>
<p style="text-align: justify;">The second type of architecture will be the topic of this article. We will focus on the implementation process which uses Azure Active Directory (AAD) as the Identity Provider.</p>
<p style="text-align: justify;">Before understanding how the Identity Provider can be used to implement Zero Trust, here is a small description of the theory on the token-based access management mechanism.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">AAD-based access management: a token story</h1>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">AAD-based access management follows the principles of the access scheme involving an Identity Provider, i.e. a service to which the target resource delegates the management of the life cycle of user identities and their authentication.</p>
<p style="text-align: justify;">In this scheme, a user&#8217;s access to a resource requires the presentation of a valid pass, issued by the Identity Provider after the user’s authentication process and (potentially) verification of his entitlement to access the target resource. These passes are called tokens and are cryptographically signed to protect against the use of fake tokens.</p>
<p style="text-align: justify;"><em>What is a token?</em> A token is a string of characters containing various information called clauses, transmitted, for example, by HTTP (HyperText Transfer Protocol) requests.</p>
<p style="text-align: justify;">AAD, as an identity provider, can issue three types of tokens, known as Security Tokens:</p>
<p> </p>
<p style="text-align: justify;"><em><img decoding="async" class="alignleft wp-image-19126 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-1.png" alt="" width="46" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-1.png 46w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-1-44x39.png 44w" sizes="(max-width: 46px) 100vw, 46px" />ID Token:</em> <strong>Evidence of user authentication. </strong>It contains information about the user&#8217;s identity and the authentication context. It is not associated with any specific resource nor involved in access control.</p>
<p style="text-align: justify;"><em style="font-size: revert; color: initial;"><img decoding="async" class="alignleft wp-image-19128 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-2.png" alt="" width="46" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-2.png 46w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-2-44x39.png 44w" sizes="(max-width: 46px) 100vw, 46px" />Access Token:</em> <strong style="font-size: revert; color: initial;">A pass authorising access to a particular resource</strong><span style="font-size: revert; color: initial;">. It may contain attributes or claims that allows the targeted resource to refine access control, such as the permissions delegated to the client application (scopes) on the resource. However, in case of Azure AD (a </span><strong style="font-size: revert; color: initial;">self-supporting token (*) (</strong><span style="font-size: revert; color: initial;">JWT</span><strong style="font-size: revert; color: initial;">)</strong><span style="font-size: revert; color: initial;">): it </span><strong style="font-size: revert; color: initial;">cannot be revoked after it has been issued</strong><span style="font-size: revert; color: initial;">. Its </span><strong style="font-size: revert; color: initial;">lifetime has an average of one hour</strong><span style="font-size: revert; color: initial;">. In other words, an Access Token remains valid until its lifetime ends. <br /></span><strong style="font-size: revert; color: initial;"><em><sup>(*)</sup></em></strong><em style="font-size: revert; color: initial;">Another implementation of OAuth could have been with opaque tokens which requires querying the Authorization server in order to find the details. This type of implementation would allow for easier revocation. This is not the choice made by Microsoft.</em></p>
<p style="text-align: justify;"><em><img loading="lazy" decoding="async" class="alignleft wp-image-19130 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-3.png" alt="" width="44" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-3.png 44w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Icone-3-42x39.png 42w" sizes="auto, (max-width: 44px) 100vw, 44px" />Refresh Token:</em> is provided at the same time as the Access Token; <strong>it allows obtaining a new Access Token/Refresh Token pair after the expiration of the previous Access Token, without explicit user re-authentication</strong>. It also allows to retrieve Access Tokens for other resources without explicit user authentication. In the context of Azure AD, its lifetime is 90 days or 24 hours for Single Page Applications, and unlike Access Token, it can be revoked before its expiration.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">It should be noted that Microsoft has defined a fourth type of token, the Primary Refresh Token, which allows single sign-in between applications on a given device. This token will not be mentioned in the rest of the document for the sake of simplicity.</p>
<p style="text-align: justify;">Now we need to understand how these different tokens circulate from actor to actor!</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;"><strong>Initial access to the target resource</strong></h2>
<p> </p>
<p style="text-align: justify;">At the time of the initial access, we assume that there are no valid tokens: no Access Tokens for the target resource nor Refresh Tokens. When the user wants to access the target resource, he will be redirected to AAD to be authenticated (and eventually authorised).</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19114 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO.png" alt="" width="4398" height="2434" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO.png 4398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-345x191.png 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-768x425.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-1536x850.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-1-VO-2048x1133.png 2048w" sizes="auto, (max-width: 4398px) 100vw, 4398px" /></p>
<p style="text-align: center;"><strong><em>Figure 2:</em></strong><em> Dynamic process of obtaining an Access Token/Refresh Token pair during the initial access to the resource</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The resulting Access Token will be included in each request to the target resource. The target resource will process them as long as the access token has not expired.</p>
<p> </p>
<h2 style="text-align: justify;"><strong>Renewal of access rights to the resource</strong></h2>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">After the expiration of the initial Access Token, the Refresh Token will be used to silently retrieve, without user intervention, a new Access Token/Refresh Token pair.</p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19118 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO.png" alt="" width="4398" height="2482" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO.png 4398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-1536x867.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-2048x1156.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/Schema-2-VO-800x450.png 800w" sizes="auto, (max-width: 4398px) 100vw, 4398px" /></p>
<p style="text-align: center;"><strong><em>Figure 3:</em></strong><em> Access session dynamic maintenance via the renewal of the Access Token/Refresh Token pair</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In an access management model, which involves an Identity Provider such as AAD, it can be noticed that <strong>the tokens are the keys to the castle and the Identity Provider is the gatekeeper</strong>. Let&#8217;s now look at how well this access management model implements the principles of Zero Trust for applications that rely on AAD to manage their login sessions.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Tokens: vulnerable vehicles of implicit trust</h2>
<p> </p>
<p style="text-align: justify;">Looking at how Azure AD-based access management works, we see that:</p>
<ul style="text-align: justify;">
<li>Access to any resource delegating access management requires proof of authentication and authorisation, through the presentation of a valid Access Token, regardless of the network origin of the access.</li>
<li>An Access Token only gives access to one resource. Access to a different resource requires a dedicated Access Token from the Identity Provide.</li>
<li>The Refresh Token allows to obtain Access Tokens for all resources to which the user is authorised</li>
</ul>
<p style="text-align: justify;">The application of Zero Trust principles is partial and perfectible at this stage:</p>
<ul style="text-align: justify;">
<li>By default, the delivery of the Access Token is done against a basic authentication (login and password)</li>
<li>The validity of the Access Token is decorrelated from the context. It can be used during its validity period, independent of the potential compromised signals that could have been detected</li>
<li>The Access Token can be renewed without verification, if the authentication context did not changed</li>
</ul>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Conditional Access (CA) reinforces the conditions for issuing tokens and securing of the sessions</h3>
<p style="text-align: justify;">Conditional Access (CA) is an AAD function requiring an AAD Premium P1 or M365 Business Premium licence that allows context to be considered in access management.</p>
<p style="text-align: justify;">Thanks to CA, it is possible to integrate a set of signals related to the user&#8217;s identity, the terminal used, the target resource, the access context and/or the risk level into the access authorisation decision.</p>
<p style="text-align: justify;">The CA also allows non-binary authorisation decisions to be applied. Thus, an access carried out in a certain context can be authorised under specific conditions, which aim to compensate and reduce the level of risk associated with the access context. </p>
<p> </p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19142 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN.png" alt="" width="1604" height="705" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN.png 1604w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-435x191.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-768x338.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/2EN-1536x675.png 1536w" sizes="auto, (max-width: 1604px) 100vw, 1604px" /></p>
<p style="text-align: center;"><strong><em>Figure 4:</em></strong><em> The principal of Conditional Access</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The distribution of an Access Token can be conditioned by implementing a two-factor authentication, which helps to protect against unauthorised access (as a result of stolen credentials).</p>
<p style="text-align: justify;">In addition, the CA offers other mechanisms for conditioning the use of tokens. Here we will focus on two mechanisms in particular: Sign-In Frequency (SIF) and Continuous Access Evaluation (CAE).</p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;">The Sign-In Frequency: influences the frequency of explicit user authentication</h3>
<p style="text-align: justify;">The Sign-In Frequency is used to define a maximum duration during which the user must re-authenticate after having been initially authorised access to the target resource.</p>
<p style="text-align: justify;">Beyond the given timeframe, the Refresh Token cannot be anymore used to implicitly renew the Access Token/Refresh Token pair.</p>
<p style="text-align: justify;">The SIF is thus a means of <strong>limiting the implicit trust given to Refresh Tokens over time</strong>.</p>
<p style="text-align: justify;">The operation of the mechanism is illustrated below, for a SIF set at 90 minutes.</p>
<p> </p>
<p style="text-align: justify;"> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19163 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN.png" alt="" width="1096" height="517" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN.png 1096w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN-405x191.png 405w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/EN-768x362.png 768w" sizes="auto, (max-width: 1096px) 100vw, 1096px" /></p>
<p style="text-align: center;"><strong><em>Figure 5:</em></strong><em> Illustration of the operation of the Sign-in Frequency</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Note that the <strong>SIF has no effect on the validity of Access Tokens already issued</strong>. An Access Token that has not yet expired can still be used to access the associated resource, even after the maximum duration defined by the SIF has expired. The SIF only intervenes to prevent an implicit renewal of Access Tokens already issued or the implicit obtaining of new Access Tokens. In order to act on the Access Tokens already issued, it is necessary to turn to the Continuous Access Evaluation (CAE).</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Continuous Access Evaluation (CAE) represents the way of linking the validity of Access Tokens to the context</h3>
<p style="text-align: justify;">CAE is a CA feature, available since January 2022, that allows <strong>context to be considered throughout the access session and not only at the time of the initial authorisation</strong>, so that it can <strong>force a renewal of the Access Token already issued in response to certain signals</strong>, including signals that suggests a compromise.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19146 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN.png" alt="" width="3124" height="473" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN.png 3124w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-437x66.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-71x11.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-768x116.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-1536x233.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/11/4EN-2048x310.png 2048w" sizes="auto, (max-width: 3124px) 100vw, 3124px" /></p>
<p style="text-align: center;"><strong><em>Figure 6:</em></strong><em> Types of signals that can force the renewal of the Access Token</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">CAE requires a communication link between AAD and the target resource to notify the latter of signals requiring re-authentication and to retrieve the conditional access policies defined for it. When the target resource receives an access request, it checks if it has not previously received a notification about the concerned user and whether the access context is different from the one allowed by the conditional access policies or not. If so, it rejects the access request and sends the user back to AAD with a request (challenge) for explicit re-authentication and a re-evaluation of the applicable access policies.</p>
<p style="text-align: justify;">It should be noted that <strong>CAE is not a transparent mechanism for the target resources and its implementation requires changes in their operating logic</strong>. The implementation of CAE requires a CAE-capable client application capable of interpreting the request (challenge) returned by the target resource while redirecting the user to AAD. Microsoft has started to implement AAD for its <a href="https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-continuous-access-evaluation">M365 collaboration suite applications</a>.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><em>Summary</em></h1>
<p style="text-align: justify;">Nowadays, it is possible to implement a Zero Trust access philosophy based on identity, however, to avoid falling into the shortcomings of historical security models, the conditions for issuing and using these tokens must be tightened up, otherwise they will become carriers of implicit and excessive trust.</p>
<p style="text-align: justify;">The use of mechanisms allows us to integrate signals that authorises the evaluation of context and allows a continuous control on the issued tokens when necessary.</p>
<p style="text-align: justify;">However, it must be kept in mind that, in the face of a token theft scenario, these mechanisms play a reactive role depending on detection capabilities, and not a preventive role capable of preventing the use of stolen tokens. We will have the opportunity return with more details in a future article, discussing the problems of a token theft and the various existing and emerging solutions for dealing with them. </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/">Zero trust and identity as the new perimeter : what about tokens ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/zero-trust-and-identity-as-the-new-perimeter-what-about-tokens/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
