Identity-based security
Identity-based security is a kind of security which includes security components that provide visibility and controls on the user activity in a particular network. It offers a more robust network security system which includes a user's human identity as part of the firewall rule matching criteria [1].
The concept includes treating a user's identity as the 8th Layer (also known as the HUMAN layer) in the network protocol stack, thus, attaching user identity to security while authenticating, authorizing and auditing the network. This takes organizations a step ahead of conventional security app. [2] Such an approach allows organisations to create security policies that align to users and groups rather than to IP addresses which ultimately gives them more precise control over who can access the network—and what they can access. [3].
Identity based security prevents systems against address spoofing attacks by combining the point of encryption, authentication, and access control into a single unit.[4]
- ^ Cyberoam Identity based security
- ^ Layer 8 Technology
- ^ Cisco Identity-Based Firewall Security
- ^ [hhttp://www.arubanetworks.com/pdf/solutions/identity-based-security.pdf Identity-Based Security] - Aruba Networks