Identity Threat Detection and Response (ITDR) is a security discipline focused on detecting attacks that target digital identities and responding to them before they cause significant damage.
‍
Identity Threat Detection and Response (ITDR) is a security capability focused on identifying and responding to attacks that target digital identities—account takeover, credential theft, privilege escalation, insider threats, and the exploitation of legitimate access pathways.
‍
The category emerged as the security industry recognized that traditional detection tooling had an identity blindspot. Security Information and Event Management (SIEM) systems and endpoint detection tools were built around network traffic and system events. Identity-based attacks, by contrast, often look like legitimate user behavior to those systems: an attacker using valid credentials authenticates normally, accesses applications through established pathways, and generates logs that appear routine.
‍
ITDR addresses this by focusing specifically on identity signals: authentication patterns, access behavior, permission changes, token usage, and other identity-layer events that can indicate malicious activity when analyzed in context.
‍
ITDR tools look for behavioral and contextual signals that indicate an identity-based threat, including:
‍
Impossible travel—Authentication events from geographically separated locations within a timeframe that indicates simultaneous access from two different places.
‍
Unusual access patterns—A user accessing applications, files, or systems they've never used before, particularly at unusual hours or from unfamiliar devices.
‍
Credential stuffing patterns—High volumes of failed authentication attempts across multiple accounts, indicating automated credential testing.
‍
Token and session anomalies—Use of authentication tokens or session cookies in unexpected ways: replayed tokens, tokens used from different IPs than they were issued to, sessions that persist well beyond normal timeframes.
‍
Privilege escalation—Accounts that suddenly gain elevated permissions, or that take administrative actions outside their normal scope.
‍
Lateral movement indicators—Activity suggesting an attacker is moving from an initial foothold to other systems, applications, or accounts.
‍
OAuth abuse—Applications or integrations authorized with unusually broad scopes, or new OAuth grants created during a session with anomalous characteristics.
‍
Deploying effective ITDR in a SaaS-heavy environment is more complex than monitoring a centralized infrastructure. Identity events are distributed across dozens of applications, each generating its own logs in its own format. The IdP captures authentication to SSO-connected apps—but many applications exist outside SSO, and OAuth integrations create access pathways that don't generate IdP-level events at all.
‍
Effective SaaS ITDR requires:
ITDR and identity inventory are tightly coupled. Detection depends on baselines; baselines require a complete, current picture of each identity's normal behavior across its full access scope.
‍
An organization that only has visibility into IdP-connected applications will have incomplete baselines and incomplete detection coverage. Threats that materialize in shadow SaaS applications, through OAuth pathways, or against non-human identities will generate no signals in a monitoring system that can't see them.
‍
Comprehensive ITDR starts with comprehensive identity discovery.
‍