{"id":39345,"date":"2021-01-28T17:00:33","date_gmt":"2021-01-28T17:00:33","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92702"},"modified":"2021-01-28T17:00:33","modified_gmt":"2021-01-28T17:00:33","slug":"5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/","title":{"rendered":"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond"},"content":{"rendered":"<p>When I outlined the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/5-identity-priorities-for-2020-preparing-for-what-s-next\/ba-p\/1131492\" target=\"_blank\" rel=\"noopener noreferrer\">five identity priorities for 2020<\/a>, the world was a very different place. Since then, the COVID-19 pandemic has forever changed how organizations run their businesses. It\u2019s also changed the way we work, learn, and collaborate. What hasn\u2019t changed is the critical role identity plays in helping organizations to be secure and productive.<\/p>\n<p>Yesterday, we shared the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/?p=92155\" target=\"_blank\" rel=\"noopener noreferrer\">progress we\u2019ve made with our integrated security, compliance, identity, and management solutions<\/a>. Identity alone has grown at an unprecedented pace\u2014from 300 million monthly active users (MAU) in March 2020 to 425 million today. Organizations around the world have accelerated the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/?p=92631\" target=\"_blank\" rel=\"noopener noreferrer\">adoption of security and collaboration apps<\/a>. But behind these numbers are stories of customers like you, working tirelessly to help your organizations stay ahead.<\/p>\n<p>As I prepare for our traditional customer co-innovation week and reflect on our customers\u2019 challenges and business goals, I want to share our five identity priorities for this year. Many of the recommendations I outlined last year still apply. In fact, they\u2019re even more relevant as organizations accept the new normal of flexible work while bad actors continue to master sophisticated cyber attack techniques. Our 2021 recommendations will help you strengthen your identity and security foundations for the long term, so you can be ready for whatever comes next.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92753 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01.png\" alt width=\"2250\" height=\"675\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01.png 2250w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01-300x90.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01-1024x307.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01-768x230.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01-1536x461.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2021\/01\/5-identity-priorities-for-2021-01-2048x614.png 2048w\" sizes=\"auto, (max-width: 2250px) 100vw, 2250px\"><\/h2>\n<h2>1. Trust in Zero Trust<\/h2>\n<p>Zero Trust is back this year, but this time it\u2019s at the top of the list. The \u201cassume breach\u201d mentality of Zero Trust has become a business imperative. Organizations need to harden their defenses to give employees the flexibility to work from anywhere, using applications that live outside of traditional corporate network protections. When the pandemic hit last year, we worked side by side with many of you. We noticed that organizations already on their Zero Trust journey had an easier time transitioning to remote work and strengthening their ability to fend off sophisticated attacks.<\/p>\n<p>The good news is that 94 percent of the security leaders <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/19\/microsoft-shows-pandemic-accelerating-transformation-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">we polled last July<\/a> told us they had already embarked on a Zero Trust journey. Wherever you are on <em>your<\/em> journey, we recommend making identity the foundation of your approach. You can protect against credentials compromise with essential tools like multifactor authentication (MFA) and benefit from innovations like <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/enhanced-ai-for-account-compromise-prevention\/ba-p\/1994653\" target=\"_blank\" rel=\"noopener noreferrer\">risk assessment in Identity Protection<\/a>, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/continuous-access-evaluation-in-azure-ad-is-now-in-public\/ba-p\/1751704\" target=\"_blank\" rel=\"noopener noreferrer\">continuous access evaluation<\/a>, Intune app-protection policies, as well as <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/azure-ad-application-proxy-now-natively-supports-apps-that-use\/ba-p\/1751707\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Azure Active Directory (Azure AD) Application Proxy<\/a> and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-endpoint-manager-blog\/introducing-microsoft-tunnel-for-remote-access-to-corporate\/ba-p\/1685044\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Tunnel<\/a>.<\/p>\n<p>Looking ahead, as more services act like people by running applications (via API calls or automation) and accessing or changing data, secure them using the same principles: make sure they only get access to the data they need, when they need it, and protect their credentials from misuse.<\/p>\n<blockquote>\n<p><strong>Where to start: <\/strong>Take the <a href=\"https:\/\/info.microsoft.com\/ww-landing-Zero-Trust-Assessment.html\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust assessment<\/a>&nbsp;and visit our <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/zero-trust\/\" target=\"_blank\" rel=\"noopener noreferrer\">Deployment Center<\/a> for deployment guidelines.<\/p>\n<\/blockquote>\n<h2>2. Secure access to all apps<\/h2>\n<p>This was our top recommendation last year, and it couldn\u2019t be more critical today. The growth in <a href=\"https:\/\/www.microsoft.com\/security\/blog\/?p=92631\" target=\"_blank\" rel=\"noopener noreferrer\">app usage with Azure AD<\/a> shows that organizations are connecting more apps to single sign-on. While this provides seamless and secure access to more apps, the best experience will come from connecting <em>all<\/em> apps to Azure AD so people can complete all work-related tasks from home and stay safer during the pandemic. Connecting all apps to Azure AD also simplifies the identity lifecycle, tightens controls, and minimizes the use of weak passwords. The result is stronger security at a lower cost: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/13\/new-forrester-study-customers-microsoft-azure-ad-benefit-123-roi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester estimates<\/a> that such a move can save an average enterprise almost USD 2 million over three years.<\/p>\n<p>Azure AD app gallery includes thousands of pre-integrated apps that simplify deployment of single sign-on and user provisioning. If you want to extend MFA and Conditional Access to legacy on-premises apps, including header-based apps, use <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/azure-ad-application-proxy-now-natively-supports-apps-that-use\/ba-p\/1751707\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD Application Proxy<\/a> or an integrated solution from one of our <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/sso\/secure-hybrid-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">secure hybrid access partners<\/a>. With our migration tools, you can <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/migration-resources\" target=\"_blank\" rel=\"noopener noreferrer\">modernize authentication of all apps<\/a> and retire your ADFS implementation. This will help prevent attacks that are particularly difficult to detect in <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/understanding-quot-solorigate-quot-s-identity-iocs-for-identity\/ba-p\/2007610\" target=\"_blank\" rel=\"noopener noreferrer\">on-premises identity systems<\/a>.<\/p>\n<p>It\u2019s also important to limit the number of admins who can manage apps across your organization, to protect privileged accounts with MFA and Conditional Access, and to require just-in-time (JIT) elevation into admin roles with <a href=\"https:\/\/docs.microsoft.com\/azure\/active-directory\/privileged-identity-management\/pim-configure\" target=\"_blank\" rel=\"noopener noreferrer\">Privileged Identity Management<\/a>.<\/p>\n<blockquote>\n<p><strong>Where to start: <\/strong>Learn how to use&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\/secure-application-access\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD to connect your workforce to all the apps<\/a>&nbsp;they need.<\/p>\n<\/blockquote>\n<h2>3. Go passwordless<\/h2>\n<p>We\u2019ll keep repeating the mantra \u201c<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity\/passwordless\" target=\"_blank\" rel=\"noopener noreferrer\">Go passwordless<\/a>\u201d as long as passwords remain difficult for people to remember and easy for hackers to guess or steal. Since last year we\u2019ve seen great progress: in May, we shared that over 150 million users across Azure AD and Microsoft consumer accounts were using passwordless authentication. By November, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/17\/a-breakthrough-year-for-passwordless-technology\/\" target=\"_blank\" rel=\"noopener noreferrer\">passwordless usage in Azure AD alone had grown by more than 50 percent year-over-year<\/a> across Windows Hello for Business, Microsoft Authenticator, and FIDO2 security keys from partners like AuthenTrend, Feitian, or Yubico.<\/p>\n<p>Passwordless authentication can minimize or eliminate many identity attack vectors, including those exploited in the most sophisticated cyberattacks. At a minimum, going passwordless should be non-negotiable for admin-level accounts. Moreover, providing employees with a fast, easy sign-in experience saves time and reduces frustration. <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4D5iu\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester estimates<\/a> that consolidating to a single identity solution and&nbsp;providing&nbsp;one set of credentials saves each employee 10 minutes a week on average, or more than 40 hours a year. Imagine additional savings from not having to reset passwords or mitigate phishing attacks.<\/p>\n<blockquote>\n<p><strong>Where to start: <\/strong>Read the Forrester Report, \u201c<a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4D5iu\" target=\"_blank\" rel=\"noopener noreferrer\">The Total Economic Impact\u2122 Of Securing Apps With Microsoft Azure Active Directory<\/a>.\u201d<\/p>\n<\/blockquote>\n<h2>4. Choose and build secure-by-design apps<\/h2>\n<p>Because attacks on applications are growing, it\u2019s important to go a step beyond integrating apps with Azure AD to deploying apps that are secure by design. Build secure authentication into the apps you write yourself using the <a href=\"https:\/\/developer.microsoft.com\/en-us\/identity\/secure-your-application\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Authentication Library (MSAL)<\/a>. Ideally, apps should go passwordless too, so ensure they\u2019re using strong credentials like certificates. If your apps interact with other Microsoft services, take advantage of the identity APIs in <a href=\"https:\/\/developer.microsoft.com\/en-us\/graph\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Graph<\/a>. Whenever possible, choose third-party apps from verified publishers. Since <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/publisher-verification-and-app-consent-policies-are-now\/ba-p\/1257374\" target=\"_blank\" rel=\"noopener noreferrer\">publisher verification<\/a> badges make it easier to determine whether an app comes from an authentic source, encourage your ISV partners to become verified publishers if they haven\u2019t already.<\/p>\n<p>Since most apps ask to access company data, administrators may choose to review consent requests before granting permissions. While neglecting to review requests is a security risk, doing it for every single app used by every single employee takes too much time and costs too much. Fortunately, new features like <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/publisher-verification-and-app-consent-policies-are-now\/ba-p\/1257374\" target=\"_blank\" rel=\"noopener noreferrer\">app consent policies<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/configure-admin-consent-workflow\" target=\"_blank\" rel=\"noopener noreferrer\">admin consent workflow<\/a> help avoid the extreme choices of reviewing all requests or delegating full responsibility to employees. Regularly review your apps portfolio and <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/manage-apps\/manage-application-permissions\" target=\"_blank\" rel=\"noopener noreferrer\">take action<\/a> on overprivileged, suspicious, or inactive apps.<\/p>\n<blockquote>\n<p><strong>Where to start: <\/strong>Update your applications to use <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/update-your-applications-to-use-microsoft-authentication-library\/ba-p\/1257363\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Authentication Library and Microsoft Graph API<\/a>, adopt <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/publisher-verification-and-app-consent-policies-are-now\/ba-p\/1257374\" target=\"_blank\" rel=\"noopener noreferrer\">app consent policies and publisher verification<\/a> practices, and follow <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/develop\/identity-platform-integration-checklist\" target=\"_blank\" rel=\"noopener noreferrer\">identity platform best practices<\/a>.<\/p>\n<\/blockquote>\n<h2>5. Break collaboration boundaries<\/h2>\n<p>We know that partners, customers, and frontline workers are essential to your business. They, too, need simple and secure access to apps and resources, so they can collaborate and be productive, while administrators need visibility and controls to protect sensitive data.<\/p>\n<p>Simplify collaboration for external users with intuitive <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/evolving-azure-ad-for-every-user-and-any-identity-with-external\/ba-p\/1257361\" target=\"_blank\" rel=\"noopener noreferrer\">self-service sign-up flows<\/a> and the convenience of using their existing email or social account. For frontline workers, Azure AD offers simple access, through sign-in with a one-time SMS passcode, which eliminates the need to remember new credentials. For frontline managers, the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/roles\/my-staff-configure\" target=\"_blank\" rel=\"noopener noreferrer\">My Staff portal<\/a> makes it easy to set up SMS sign-in, to reset passwords, and to grant access to resources and shared devices without relying on help desk or IT.<\/p>\n<p>Visibility and control are easier to achieve when managing all identities using a common toolset. You can apply the same Conditional Access policies for fine-grained access control to services, resources, and apps. By setting up access review campaigns, or using <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/access-reviews-for-guests-in-all-teams-and-microsoft-365-groups\/ba-p\/1994697\" target=\"_blank\" rel=\"noopener noreferrer\">automated access reviews for all guest users in Microsoft Teams and Microsoft 365 groups<\/a>, you can ensure that external guests don\u2019t overstay their welcome and only access resources they need.<\/p>\n<blockquote>\n<p><strong>Where to start: <\/strong>Learn more about <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/external-identities\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure AD External Identities<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/13\/azure-active-directory-empowers-frontline-workers-with-simplified-and-secure-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">using Azure AD to empower frontline workers<\/a>.<\/p>\n<\/blockquote>\n<h2>Get started on the future now: Explore verifiable credentials<\/h2>\n<p>During the pandemic, you\u2019ve had to support not only remote work but also remote recruiting. People usually show up to an interview with documentation in hand that confirms their identity and qualifications. It\u2019s more complicated to vet candidates remotely, especially when hiring needs to happen quickly\u2014for example, in the case of essential workers.<\/p>\n<p>Microsoft and industry-leading ID verification partners are pushing the frontier of identity by transforming existing ID verification practices with open standards for <a href=\"https:\/\/www.w3.org\/TR\/vc-data-model\/\" target=\"_blank\" rel=\"noopener noreferrer\">verifiable credentials<\/a> and <a href=\"https:\/\/www.w3.org\/TR\/did-core\/\" target=\"_blank\" rel=\"noopener noreferrer\">decentralized identifiers<\/a>. Verifiable credentials are the digital equivalent of documents like driver\u2019s licenses, passports, and diplomas. In this paradigm, individuals can verify a credential with an ID verification partner once, then add it to Microsoft Authenticator (and other compatible wallets) and use it everywhere in a trustworthy manner. For example, a gig worker can verify their driver\u2019s license and picture digitally, and then use it to get hired by a ride-sharing service and a food delivery company.<\/p>\n<p>Such an approach can improve verification while protecting privacy across the identity lifecycle: onboarding, activating credentials, securing access to apps and services, and recovering lost or forgotten credentials. We\u2019re piloting this technology with customers like the National Health Service in the UK and MilGears, a program of the United States Department of Defense that helps service members and veterans enroll in higher education and jumpstart their civilian careers.<\/p>\n<blockquote>\n<p><strong>Where to start: <\/strong>Watch our <a href=\"https:\/\/myignite.microsoft.com\/sessions\/467f3487-f6bb-4a1c-81fc-d9c8015bf522\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Ignite session on Decentralized Identity<\/a> and join the <a href=\"https:\/\/identity.foundation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Decentralized Identity Foundation<\/a>.<\/p>\n<\/blockquote>\n<p>Whether your top priority is modernizing your infrastructure and apps or implementing a Zero Trust security strategy, we are committed to helping you every step of the way. Please send us <a href=\"https:\/\/feedback.azure.com\/forums\/169401-azure-active-directory\" target=\"_blank\" rel=\"noopener noreferrer\">your feedback<\/a>&nbsp;so we know what identity innovations you need to keep moving forward on your digital transformation journey.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/28\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When I outlined the five identity priorities for 2020, the world was a very different place. Since then, the COVID-19 pandemic has forever changed how organizations run their businesses. It\u2019s also changed the way we work, learn, and collaborate.<br \/>\nThe post 5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39346,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[1264,347,6696,3677],"class_list":["post-39345","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-active-directory","tag-cybersecurity","tag-identity-and-access-management","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-28T17:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2250\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond\",\"datePublished\":\"2021-01-28T17:00:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/\"},\"wordCount\":1681,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png\",\"keywords\":[\"Azure Active Directory\",\"Cybersecurity\",\"Identity and access management\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/\",\"name\":\"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png\",\"datePublished\":\"2021-01-28T17:00:33+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png\",\"width\":2250,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Active Directory\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/azure-active-directory\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/","og_locale":"en_US","og_type":"article","og_title":"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-01-28T17:00:33+00:00","og_image":[{"width":2250,"height":675,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond","datePublished":"2021-01-28T17:00:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/"},"wordCount":1681,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png","keywords":["Azure Active Directory","Cybersecurity","Identity and access management","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/","url":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/","name":"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png","datePublished":"2021-01-28T17:00:33+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/01\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond.png","width":2250,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/5-identity-priorities-for-2021-strengthening-security-for-the-hybrid-work-era-and-beyond\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Active Directory","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-active-directory\/"},{"@type":"ListItem","position":3,"name":"5 identity priorities for 2021\u2014strengthening security for the hybrid work era and beyond"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39345"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39345\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39346"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}