Security overview
Identity Security Insights automatically analyzes identity data, system configurations, and activities across on-premises networks, cloud platforms, SaaS apps, and identity providers (IdPs). This lets you spot and address potential security threats—like privileged access vulnerabilities—before attackers can exploit them.
Monitoring
Monitoring allows Insights to:
- Collect and forward logs, metrics, and traces to a centralized observability platform
- Enable audit trails and collect security events, forwarding them to a centralized SIEM platform
- Implement real-time monitoring to detect anomalies, suspicious behavior, and performance issues
- Store all logs centrally and restricts access to employees who need them to fulfill their duties
Artificial intelligence (AI) and machine learning (ML)
Insights uses AI and machine learning, directed by security experts, to refine and analyze identity data and spot any unusual activity or anomalies.
Its unique approach elevates raw identity security data to a common semantic level, which allows for more effective processing using AI and ML techniques. Without this, the analysis could miss important patterns. This method allows for more precise focus on privileged access risks across diverse platforms, significantly reducing false positives.
From the first round of analysis, Identity Security Insights generates clear, actionable insights. If AI detects certain patterns that could signal a security issue, it’s flagged for further investigation. These potential threats are then displayed in the user interface with precise, context-rich recommendations and detections.
Data retention and decommissioning
Application data retention: Permanent unless manually deleted. This data includes user, connector, exclusion, and notification configuration.
Processed output retention:
- Inventory: Purged after 15 days of inactivity
- Event data: Permanent
Decommission: Data is deleted 38 days after trial or license expiration.
Data collected
Identity Security Insights collects account privileges, including:
- Permissions
- Groups
- Roles
- Entitlements
- Application permissions
- Policy
- User information (such as email address, user name, user attributes, and user activity, including event logs).
Data ingestion is through in-application, customer-managed first-party and third-party connectors.
The data is used to identify and consolidate accounts, define user roles, and set security permissions. The Identity Security Insights pipeline processes this information to generate identity threat detections and recommendations.
Note
For more information, see Identity Security Insights Connectors.
Identity Security Insights does not share personal identifiable information (PII) or security sensitive data with any third-party service.
Cloud uptime
BeyondTrust's Cloud Service Guide states in Section 4. Availability Service Level, subsection (4) that BeyondTrust's availability SLA for the service shall be 99.9% during a calendar month.
Note
For more information, see BeyondTrust Corporation Cloud Service Guide.
Architecture
Infrastructure
Identity Security Insights is hosted in AWS and leverages Kubernetes' capabilities to ensure the high availability and scalability of our applications and services.
An on-premises service can be optionally deployed within your network to support local functions for Identity Security Insights, such as collecting data from on-premises Active Directory.
Physical security
Note
For more information, see Physical Access in AWS Cloud Security.
Data security and encryption
Storage, backup, and recovery
Identity Security Insights stores customer data securely in a production AWS account, using Amazon S3 and RDS SQL databases.
Amazon S3 ensures 99.999999999% durability for data and enables versioning by default via infrastructure as code (IaC) for added resiliency. Details on AWS S3 data durability can be found here: Data protection in Amazon S3.
RDS databases are backed up daily with encrypted snapshots, retained for 21 days, in line with AWS best practices. Details on the AWS RDS Automated Backup process can be found here: Introduction to backups.
Data recovery is available through the AWS S3 and RDS consoles.
Network security
The production AWS network follows a three-tier networking architecture, consisting of:
- Presentation tier: Public facing services (such as AWS CloudFront and AWS Application Load Balancers)
- Workload tier: Workloads (such as nodes for AWS EKS and AWS Lambda functions that require network access)
- Data tier: Storage media (such as AWS RDS databases)
The data tier is only accessible from the workload tier and does not have outbound internet access. The workload tier is only accessible from the presentation tier.
All network devices and controls are configured to enable:
- Traffic filtering (such as AWS security groups)
- Inspection (such as VPC flow logs)
- Encryption (such as HTTPS-only transit)
- Principal of least privilege (such as workload identity-based access and ports only open for required tasks)
In AWS, Virtual Private Clouds (VPCs) and Security Groups implement network controls.
IP and port restrictions
For organizations that wish to restrict access to Insights by IP address, you must allow the following public IP addresses.
Note
Determine the location of your tenant by clicking Manage Tenants on the Insights Home page.
US tenants
- 54.163.153.193
- 54.225.135.48
- 50.16.236.14
EU tenants
- 3.72.126.244
- 3.78.41.126
- 3.125.93.216
The on-premises service of Identity Security Insights (Insights Collector) connects to Active Directory using SSL and TCP-636.
- If SSL/636 is not available, configure the service to use TCP-389.
- The service connects outbound to Identity Security Insights via the following URLs:
- Authentication: https://login.beyondtrust.io
- Events: https://ingest.beyondtrust.io
Note
For more information see, Insights collector.
Tenant isolation
Within platform services and the lakehouse, tenants are primarily separated using row-level security. Data from all tenants resides in the same data stores, but the user's identity and roles determine which tenants they can access, if any.
Encryption in motion
All internet and intranet connections are encrypted end-to-end and authenticated using industry-standard cryptography (at minimum TLS v1.2, ECDHE_RSA, and AES128-GCM).
Encryption at rest
AES 256 separate keys for each storage container.
Encryption in use
Scoped to least privilege with access granted only to authorized workloads.
Authentication to on-premises services
On-premises services are registered with Identity Security Insights using installation keys for secure communication. Authentication is enabled via OAuth.
Security and compliance
BeyondTrust has established and continues to maintain a thorough information security program to ensure the protection of sensitive data through multiple layers of defense. The program aims to safeguard systems and customer information from internal and external security threats and prevent unauthorized disclosure of this information.
This document aims to detail the various controls, methodologies, and guidelines implemented by BeyondTrust to secure customer information. Robust control measures are implemented to aid our organization in meeting the requirements outlined within ISO/IEC 27001 and ISO/IEC 27701, which are standards for managing information security and data protection.
BeyondTrust holds certifications under these standards and the services environment undergoes a SOC 2 Type II audit which can be shared under an NDA.
Note
For more information, see Industry Certifications & Compliance.
Updated 5 days ago