Sure, everyone is scrambling to deploy a next-generation firewall or taking steps to protect those privileged accounts – and these are mandatory steps every organizations should be taking in my opinion. But, if you want to advance a unique, actionable perspective that will get you noticed by the security team or even your leadership, help them understand the gap that exists (and can be closed) surrounding your user account database.
Let’s face it, employees come and go. In organizations with mature provisioning and deprovisioning systems with access control methodologies, these accounts are generally well-cared for. As users are hired, they are given the correct access rights. When they change roles, their entitlements are updated and when they leave the company, they are deprovisioning quickly.
On the other hand, if your organization does not have tight controls, then your access database is probably awash with unused accounts or users whose accounts have “entitlement bloat.”
However, most companies, regardless as to their IAM maturity also tend to hire contractors or seasonal workers and these types of users and accounts tend to mess up even the most well-managed databases and this is an obvious security gap.
- Are you sure that account you created for that contractor you brought in to help test the new production systems has been removed? Or could she still log in and gather sensitive data?
- Can that seasonal worker who was upset they were not brought on permanently still access the shipping application?
These are all examples of security gaps that can easily be remediated. But how? Well, it’s a 4 step process that involves:
- Initial load from target systems
- Transfer of clean data
- Remediation of dirty data
- Data cleansing during day to day business
So be a hero…advance this security gap at the next security or staff meeting. But also be prepared with the solution to closing this gap by downloading and reading this paper today. It will give you the 4-step process for discovering, cleaning up and maintaining a user account database so you’ll be the expert in the room helping your organization to be more secure.
Be the hero in the room! Read: Reduce risk by cleaning up and maintaining your user accounts tech brief.
For additional information check out the One Identity Manager Scalability and Performance Tech Brief.