<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The Future of Cyber Security Operations]]></title><description><![CDATA[The Future of Cyber Security Operations]]></description><link>https://corefiesta.com</link><generator>RSS for Node</generator><lastBuildDate>Tue, 14 Apr 2026 01:51:51 GMT</lastBuildDate><atom:link href="https://corefiesta.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Bridging the Data Gap : Enhancing Entra ID Tokens with Custom Claims Providers]]></title><description><![CDATA[Introduction : The "Data Silo" Challenge
Imagine an organization managing a complex B2B collaboration. You are integrating multiple external applications using modern standards like SAML and OIDC.
However, a common challenge arises: Data Disconnect. ...]]></description><link>https://corefiesta.com/bridging-the-data-gap-enhancing-entra-id-tokens-with-custom-claims-providers</link><guid isPermaLink="true">https://corefiesta.com/bridging-the-data-gap-enhancing-entra-id-tokens-with-custom-claims-providers</guid><category><![CDATA[Entra ID]]></category><category><![CDATA[SAML]]></category><category><![CDATA[OIDC]]></category><category><![CDATA[SSO]]></category><dc:creator><![CDATA[Debashish Gouda]]></dc:creator><pubDate>Fri, 16 Jan 2026 21:00:34 GMT</pubDate><content:encoded><![CDATA[<h3 id="heading-introduction-the-data-silo-challenge">Introduction : The "Data Silo" Challenge</h3>
<p>Imagine an organization managing a complex B2B collaboration. You are integrating multiple external applications using modern standards like SAML and OIDC.</p>
<p>However, a common challenge arises: Data Disconnect. While Microsoft Entra ID (formerly Azure AD) handles the authentication, it doesn't always hold <em>every</em> piece of information about a user. Critical attributes such as a user’s specific clearance level, a legacy account ID, or a dynamic spending limit often reside in external systems, on-premises SQL databases, or separate HR repositories.</p>
<p>If these attributes aren't in the Entra ID directory, Entra cannot, by default, inject them into the token. This leaves organizations stuck: do they force a risky migration of sensitive data to the cloud, or do they build complex, brittle workarounds?</p>
<h3 id="heading-the-solution-entra-as-an-intelligent-identity-orchestrator">The Solution : Entra as an Intelligent Identity Orchestrator</h3>
<p>Microsoft Entra ID addresses this with a feature known as a Custom Claims Provider.</p>
<p>Think of this as a "live hook" during the authentication process. When a user logs in, Entra ID pauses the process momentarily to call a custom API (hosted on an Azure Function App). This function contains the logic to query your external repositories whether it’s an on-premise database or a third-party API to fetch the missing data.</p>
<p>Once the data is retrieved, the function sends it back to Entra ID. A Claims Mapping Policy then takes this data and seamlessly injects it into the SAML or OIDC token. The application receives a complete token with all necessary claims, unaware that the data came from disparate sources.</p>
<h3 id="heading-why-this-is-a-game-changer-for-organizations">Why This is a Game Changer for Organizations</h3>
<p>The primary value of this approach isn't just "connectivity", it is Security Strategy and Data Sovereignty.</p>
<ul>
<li><p><strong>Data Sovereignty &amp; Privacy:</strong> Organizations often hold highly sensitive attributes (e.g., government clearance levels, patient data, or proprietary financial tiers) that policy dictates must remain on-premises or in a specific sovereign store. With Custom Claims Providers, you do not need to sync this sensitive data to the cloud. It stays in your secure local repository and is only fetched <em>just-in-time</em> for the token.</p>
</li>
<li><p><strong>Support for Machine Identities:</strong> It’s not just for humans. Machine identities and service accounts often require dynamic attributes for authorization. This feature allows those attributes to be injected without permanently storing them in the directory.</p>
</li>
<li><p><strong>Legacy Integration without Migration:</strong> You can modernize your authentication (using Entra ID) without modernizing your database immediately. It extends the life of legacy systems by making them compatible with modern SSO.</p>
</li>
</ul>
<h3 id="heading-the-security-architecture">The Security Architecture</h3>
<p>A common concern is the security of the API call itself: “How do we ensure the connection between Entra ID and our external data is safe?”</p>
<p>This is where the Microsoft ecosystem provides robust protection. The communication relies on Azure Managed Identities. When Entra ID calls your Azure Function, it presents a verified token. This means your function app does not need to be exposed to the public internet anonymously, it is configured to trust only your specific Entra ID instance. You get the full benefit of Microsoft’s enterprise-grade authentication backbone to secure the "bridge" between the cloud and your private data.</p>
<h3 id="heading-conclusion-secure-identity-without-compromise">Conclusion : Secure Identity Without Compromise</h3>
<p>The Entra Custom Claims Provider proves that you don't have to choose between cloud convenience and data sovereignty. By fetching sensitive attributes just-in-time, organizations can maintain a "Zero Trust" posture while keeping critical data in their own secure repositories. This isn't just a technical workaround, it’s a strategic way to modernize your identity stack while keeping your most sensitive information exactly where you trust it most.</p>
<hr />
<h3 id="heading-implementation">Implementation</h3>
<p>For those looking to deploy this architecture, Microsoft provides detailed documentation on configuring custom claims providers:</p>
<ul>
<li><a target="_blank" href="https://learn.microsoft.com/en-us/entra/identity-platform/custom-claims-provider-reference">https://learn.microsoft.com/en-us/entra/identity-platform/custom-claims-provider-reference</a></li>
</ul>
]]></content:encoded></item><item><title><![CDATA[How AI is Shaping the Future of Security Operations]]></title><description><![CDATA[The emergence of artificial intelligence (AI) is compelling organisations to rethink their security strategies, as 66% of organisations now expect AI to significantly impact cybersecurity. While much of the industry conversation focuses on the risks ...]]></description><link>https://corefiesta.com/how-ai-is-shaping-the-future-of-security-operations</link><guid isPermaLink="true">https://corefiesta.com/how-ai-is-shaping-the-future-of-security-operations</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[Debashish Gouda]]></dc:creator><pubDate>Thu, 15 Jan 2026 23:32:57 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1768520343277/72d27933-bcd1-4d55-9356-df89968af444.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The emergence of artificial intelligence (AI) is compelling organisations to rethink their security strategies, as 66% of organisations now expect AI to significantly impact cybersecurity. While much of the industry conversation focuses on the risks associated with these technologies, there is a powerful opportunity to use AI for security - leveraging generative AI and machine learning to bolster the efficiency of security operations (SecOps), accelerate threat detection, and automate complex vulnerability management</p>
<h3 id="heading-transforming-security-operations-from-information-to-action"><strong>Transforming Security Operations: From Information to Action</strong></h3>
<p>One of the most significant shifts in modern security is the transition from AI that merely provides answers to agentic AI systems that act. Traditional security processes have historically been human-driven, leading to scaling issues and "alert fatigue" as businesses grow</p>
<p>Generative AI-powered agents are now addressing these challenges by:</p>
<ul>
<li><p><strong>Automating Alert Triage:</strong> AI can handle repetitive tasks within Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) systems.</p>
</li>
<li><p><strong>Creating Contextual Narratives:</strong> Rather than presenting isolated data points, AI can synthesise group summaries and offer context-rich overviews of incidents across multiple sources.</p>
</li>
<li><p><strong>Mapping to Industry Frameworks:</strong> By using the Open Cybersecurity Schema Framework (OCSF)-a vendor-agnostic standard for security logs—generative AI can automatically map suspicious activities to MITRE ATT&amp;CK TTPs.</p>
</li>
</ul>
<h3 id="heading-scaling-application-security-and-vulnerability-management"><strong>Scaling Application Security and Vulnerability Management</strong></h3>
<p>AI is revolutionising the "Shift Left" movement by integrating security directly into the development lifecycle. AI-powered security agents provide developers with real-time security feedback and can generate code for security fixes, significantly reducing development costs. Furthermore, through the Model Context Protocol (MCP), these agents can interact with traditional tools like Static Application Security Testing (SAST) to automate routine reviews.</p>
<p>Vulnerability management is another area seeing dramatic efficiency gains. A trained security engineer typically spends over an hour analysing a single Common Vulnerabilities and Exposures (CVE) entry. By using contextually grounded AI applications, this analysis time can be reduced from hours to seconds while maintaining consistent output</p>
<h3 id="heading-the-power-of-automated-reasoning"><strong>The Power of Automated Reasoning</strong></h3>
<p>To ensure that AI-generated security outputs are reliable, organisations are increasingly turning to automated reasoning (or formal verification). Unlike machine learning, which makes probabilistic predictions based on patterns, automated reasoning uses mathematical logic to construct proofs.</p>
<p>This technology serves as a critical guardrail for security use cases, such as:</p>
<ul>
<li><p><strong>Verifying Code Generation:</strong> Mathematically proving the absence of buffer overflows or ensuring memory safety in AI-generated code.</p>
</li>
<li><p><strong>Infrastructure Configuration:</strong> Certifying that AI-generated cloud configurations or network topologies do not inadvertently expose private databases to the public internet.</p>
</li>
<li><p><strong>Policy Validation:</strong> Ensuring that AI-generated identity and access management (IAM) policies are consistent and compliant with security principles</p>
</li>
</ul>
<h3 id="heading-the-human-ai-partnership"><strong>The Human-AI Partnership</strong></h3>
<p>Despite these advancements, the most effective security posture is built on a dynamic human-AI partnership. While AI excels at pattern recognition and processing vast amounts of data, humans provide essential contextual understanding and creative problem-solving.</p>
<p>A fundamental principle for modern SecOps is that the higher the potential impact of a decision, the more human oversight is required. At the enterprise level, AI should not be permitted to autonomously shut down critical services or make major production configuration changes without human verification. Instead, AI should present evidence and recommendations, leaving the final decision to act with human experts.</p>
<h3 id="heading-conclusion"><strong>Conclusion</strong></h3>
<p>Integrating AI into security operations is an iterative process that requires a flexible approach and a focus on defence-in-depth. By combining the speed and scalability of AI with human judgment, organisations can move beyond traditional manual processes to create more robust, adaptable, and proactive security programmes.</p>
<p>--------------------------------------------------------------------------------</p>
<p><strong>Source Citation</strong></p>
<p><strong>Amazon Web Services. (2025).</strong> <a target="_blank" href="https://d1.awsstatic.com/onedam/marketing-channels/website/aws/en_US/whitepapers/compliance/AI-for-Security-and-Security-for-AI_Navigating-Opportunities-and-Challenges.pdf">AI for Security and Security for AI: Navigating Opportunities and Challenges</a></p>
]]></content:encoded></item></channel></rss>