Today I’m suffering from what is known in the UK, as a stinking cold. I feel like death warmed up, so this week I’ve decided to rehash a piece I did last year, on identity and access management. Those of you who have managed to plough your way through some of my earlier stuff, will know that I am very big on user awareness training for staff at all levels, believing as I do, that it is arguably one of the biggest wins that an SME can gain, to protect themselves against cybercrime. There is however a very close second, and that is identity and access management.
There is mounting evidence that the message is getting through that, although passwords are very important, they most certainly aren’t the panacea that many think they are. We can see many organisations moving to 2 factor authentication as a norm now. A charity I volunteer for has recently done just that and not before time, considering the amount of personal data they are holding. But is that enough?
Compromised credentials are very high on the list of cybercrime related incidents that we see and have to deal with. Protecting these identities can be a very technical issue and advice and guidance will be needed to ensure that you are adequately covered. However it needn’t be overly expensive, neither need it be overly complicated. In fact, I’m a great believer in that the simplest solution is often the best solution. I’m an adherent of the KISS principle – Keep It Simple Stupid.
Questions to ask yourself include:
Another issue that you may need to consider is any accounts that exist on your network that may be used by third party suppliers. Many companies use ‘just in time’ supply management which can require third parties to have access to their network. Another example is people like me who, when carrying out things like vulnerability assessments, may be given privileges to scan the network. Is that revoked at the end of the scan? And of course, there is the IT company you may have under contract who actively have access to your network to carry out maintenance and might actually also have a contract for controlling user privilege. Or perhaps the company you have under contract maintaining your alarms and security cameras which you didn’t know were actually using your network to connect to each other and their control room.
What about logging? What is logging? Every system has a set of logs which can be switched on or off. I often come across networks where logging has been switched off or never activated because its consider to be an overhead you can live without. Well, I disagree with that, quite vehemently. Logging helps you to determine what normal looks like. For example user profiles carry out certain functions within their role. If a user is stepping outside of that profile, you need to find out why. Is it a user who is doing something they simply didn’t realise they shouldn’t, or is it something more serious? Is it an identity that has been created or hi-jacked by a cybercriminal who has managed to gain access? Examination of these logs will help you understand that. There is of course software on the market that will be of great help with this.
And of course, what do you do if you are suspicious of an activity or action by a user?
Recent Comments