top of page
MGraph Auth Migration

In the threat intelligence landscape, security and agility are foundational. Mandiant previously relied on a combination of PingFederate and Azure AD for authentication and authorization. While functional, this legacy setup presented several challenges as Mgraph(Mandaint Threat-Intel Graph System) became central to internal analytics:

  • Operational Friction: Routine workflows often required complex Mesa SSH proxies for human access.

  • Integration Gaps: Coupling with non-Google systems hindered the use of native Google services.

  • Scaling Constraints: Supporting modern access patterns, such as service-to-service calls or notebook exploration, was increasingly cumbersome.

In 2024, at Google I led the migration of Mgraph (Mandaint Threat-Intel Graph System) to start using Google Native Authentication and Authorization system.

Introducing ControlTower

 

ControlTower is a custom authorization service purpose-built for Mandiant’s first-party applications on Google Cloud Platform (GCP). It replaces scattered authorization logic with a single, well-defined control plane. This service is hosted on Google Prod systems.

 

Key Architectural Pillars
  • Identity Source of Truth: The system standardizes on Ganpati Groups to validate both users and services.

     

  • Token-Based Access: ControlTower issues JSON Web Tokens (JWTs) containing narrowly scoped, application-specific claims to enable precise authorization.

     

  • Secure Connectivity: Bifrost is utilized to securely connect Google Cloud workloads with internal production systems without exposing services directly.

Dual Authentication Flows

 

ControlTower is designed to optimize both security and usability by supporting two distinct access patterns.

 

1. Human User Access (User Token Flow)

To ensure strong security with minimal complexity, human users authenticate via corporate identity systems handled by UberProxy.

 

  • Exchange: UberProxy (Google proxy connectivity service) provides an X-Uptick-Signed-Token.

     

  • Validation: ControlTower exchanges this for a signed JWT based on Ganpati group (Google internal AD equivalent)membership

     

  • Outcome: Users authenticate seamlessly via Google LDAP, eliminating the need for SSH proxies.

     

2. Machine-to-Machine Access (Service Token Flow)

For services, the architecture moves away from static secrets in favor of Workload Identity (WKID).

 

  • Identity: Services run in GKE pods or VMs bound to a WKID service account.

     

  • Validation: Requests traverse Bifrost ( a connectivity mechanism for connecting from Cloud to Prod) to ControlTower, which verifies the service account and group membership.

     

  • Outcome: This eliminates long-lived secrets and aligns with zero-trust principles.

     

 
Access Flows at a Glance

Auth-Migration-table
Strategic Outcomes
 

The migration to a Google-native framework has resulted in three concrete improvements:

  1. Stronger Security: Alignment with Google standards, including GIN logging and Access-on-Demand, provides default defense-in-depth.

  2. Enhanced Productivity: Users now experience a frictionless login process.

  3. Expanded Capabilities: The new model unlocks secure access from Colab notebooks and direct data consumption by Nirvana services.

The deprecation of legacy IDAM and PingFederate represents more than a technical cleanup—it is a strategic upgrade that allows Mandiant to move faster and scale with the complexity of modern threat intelligence.

  • LinkedIn Clean Grey

© 2026 by Ramesh Krishnamurthy

bottom of page