Cybersecurity Reference > Glossary
What is Identity Correlation?
Security teams analyze attributes like usernames, email addresses, device fingerprints, login patterns, and behavioral characteristics to spot these connections. The goal isn't just matching obvious identifiers—advanced correlation picks up on subtler signals like typing rhythms, session timings, or network behaviors that reveal hidden relationships between accounts.
Organizations use this technique for several purposes. It helps catch attackers who create multiple accounts to slip past detection systems or distribute malicious activity across what appear to be unrelated profiles. It also cleans up user inventories by identifying legitimate users who've accumulated duplicate accounts over time, which matters for access management and compliance reporting. When an insider threat investigation turns up suspicious activity from one account, correlation can reveal other accounts that same person controls, painting a fuller picture of their actions.
The technique walks a line between security value and privacy concerns. Machine learning algorithms can find patterns humans would miss, but aggressive correlation raises questions about surveillance and data protection regulations. Different jurisdictions have different rules about what identity data can be collected and linked, so security teams need to calibrate their correlation practices to stay compliant while still catching threats.
Origin
The concept gained security relevance in the early 2000s as online fraud accelerated and attackers routinely created throwaway accounts. E-commerce platforms and banks needed ways to spot customers who'd been banned for fraud but came back with new credentials. Initial correlation techniques looked at shipping addresses, payment methods, and IP addresses, which worked until fraudsters learned to vary these signals.
Around 2010, behavioral biometrics started influencing how security teams thought about identity correlation. Researchers demonstrated that patterns in how people type, move their mouse, or navigate interfaces could serve as identifying characteristics even when traditional identifiers changed. This coincided with the rise of machine learning in security tools, which made it practical to analyze these subtle behaviors at scale.
The explosion of cloud services and federated identity systems in the 2015-2020 period created both new challenges and new opportunities for correlation. Users now maintain identities across dozens or hundreds of services, creating a fragmented landscape that's harder to correlate but also generates more data points for analysis. Privacy regulations like GDPR forced the field to mature beyond pure technical capability toward frameworks that balance detection with legitimate privacy interests.
Why It Matters
The shift to remote work and cloud infrastructure multiplied the challenge. Users authenticate to dozens of services, often with different credential sets, and security teams struggle to maintain visibility across this sprawled identity landscape. When a compromised credential shows up on the dark web, correlation helps identify all the accounts where that person might have reused similar passwords or security questions, letting you lock down exposure before attackers exploit it.
Insider threat detection particularly depends on effective correlation. A disgruntled employee planning data theft might create an unauthorized account with elevated privileges or use a contractor's credentials alongside their own to muddy the audit trail. Without correlation, these activities look unrelated. With it, the pattern becomes visible.
Compliance frameworks increasingly expect organizations to demonstrate they know who has access to what data. Identity correlation supports this by revealing where the same individual operates under multiple accounts, whether those are legitimate role-based accounts or problematic shadow IT situations that create security and compliance gaps.
The Plurilock Advantage
We've deployed correlation systems for organizations with complex identity landscapes—multiple clouds, federated authentication, legacy systems—where off-the-shelf tools struggle.
Our identity and access management services include behavioral analytics integration and correlation frameworks that adapt to your specific environment and threat profile, delivering actionable intelligence rather than raw data dumps.
.
Need Help with Identity Correlation?
Plurilock's advanced identity solutions can streamline your correlation processes effectively.
Get Identity Solutions → Learn more →




