Inadequate IT Processes for Managing User
Accounts and Access Continue to Create Major Security and Compliance Risks for
companies in Singapore, One Identity Survey Reveals
Accounts and Access Continue to Create Major Security and Compliance Risks for
companies in Singapore, One Identity Survey Reveals
- Global study indicates
disgruntled former employees or other threat actors still have widespread
opportunity to cause harm because their IT accounts remain active - 81 percent of respondents in
Singapore lack confidence that accounts of former employees are fully
deactivated in a timely manner (Global: 70%) - 93 percent of respondents in
Singapore say it takes a month or longer to discover forgotten dormant
accounts (Global: 84%) - Results show that common IT
security best practices continue to be a challenge for organizations
worldwide
SINGAPORE – September
29, 2017 – One Identity, a proven leader in helping organizations get
identity and access management (IAM) right, today released study results
showing significant gaps in how organizations manage accounts used to access IT
infrastructure, systems, and data — gaps that could result in major security
and compliance deficiencies. The results of the study of more than 900 IT
security professionals, conducted by Dimensional Research, spotlight how common
security best practices — such as timely removal of access to corporate data
and applications, dormant account identification, and role administration
—continue to be a challenge and concern for organizations worldwide.
29, 2017 – One Identity, a proven leader in helping organizations get
identity and access management (IAM) right, today released study results
showing significant gaps in how organizations manage accounts used to access IT
infrastructure, systems, and data — gaps that could result in major security
and compliance deficiencies. The results of the study of more than 900 IT
security professionals, conducted by Dimensional Research, spotlight how common
security best practices — such as timely removal of access to corporate data
and applications, dormant account identification, and role administration
—continue to be a challenge and concern for organizations worldwide.
Most
alarmingly, 81 percent of surveyed organizations in Singapore express a lack of
confidence that all former employees and employees changing roles are fully
deprovisioned — or have their accounts changed or removed—in a timely enough
manner. Therefore, their accounts remain open and available with active
authorization even after an employee changes roles or leaves the organization.
alarmingly, 81 percent of surveyed organizations in Singapore express a lack of
confidence that all former employees and employees changing roles are fully
deprovisioned — or have their accounts changed or removed—in a timely enough
manner. Therefore, their accounts remain open and available with active
authorization even after an employee changes roles or leaves the organization.
Only
7 percent of respondents in Singapore say they remove access for users
immediately upon a change in HR status. Related findings point to concerning
practices regarding management of dormant accounts. Only 4 percent are
confident that they have no dormant accounts, only 39 percent are “very
confident” they know which dormant user accounts exist, and a remarkable 93
percent confessed that it takes a month or longer to discover these dangerous open doors into the
enterprise.
7 percent of respondents in Singapore say they remove access for users
immediately upon a change in HR status. Related findings point to concerning
practices regarding management of dormant accounts. Only 4 percent are
confident that they have no dormant accounts, only 39 percent are “very
confident” they know which dormant user accounts exist, and a remarkable 93
percent confessed that it takes a month or longer to discover these dangerous open doors into the
enterprise.
Best practices demand
that access be removed for employee accounts that are no longer active. In the
case where an employee changes roles, access needs to be altered to provide the
new access and authorization required for the new role and remove access that
is no longer needed. Oftentimes, the removal of no-longer-needed access is
overlooked. When user accounts are not deprovisioned (often called dormant
accounts), they are open invitations for disgruntled employees, hackers or
other threat actors, who can exploit the accounts and gain access to sensitive
systems and information, resulting in data breaches or compliance violations.
that access be removed for employee accounts that are no longer active. In the
case where an employee changes roles, access needs to be altered to provide the
new access and authorization required for the new role and remove access that
is no longer needed. Oftentimes, the removal of no-longer-needed access is
overlooked. When user accounts are not deprovisioned (often called dormant
accounts), they are open invitations for disgruntled employees, hackers or
other threat actors, who can exploit the accounts and gain access to sensitive
systems and information, resulting in data breaches or compliance violations.
The user account
access and management challenges are not limited to legacy systems and data, as
they also are relevant for newer technologies such as file-sync-and-share
services like Box and Dropbox. Only 18 percent of respondents in Singapore
report deprovisioning access to these accounts in a centralized/automated
manner. Other findings from One Identity’s Global State of IAM Study provide
further evidence of the challenges organizations face with regard to managing
employee access to IT resources:
access and management challenges are not limited to legacy systems and data, as
they also are relevant for newer technologies such as file-sync-and-share
services like Box and Dropbox. Only 18 percent of respondents in Singapore
report deprovisioning access to these accounts in a centralized/automated
manner. Other findings from One Identity’s Global State of IAM Study provide
further evidence of the challenges organizations face with regard to managing
employee access to IT resources:
- Less
than one in four respondents in Singapore are “very confident” that user
rights and permissions in their organizations are correct for the
individuals’ roles. - 88
percent of organizations in Singapore are concerned about the risk
represented by dormant accounts. - 99
percent have a process for identifying dormant users, but only 22 percent
have tools to aid in finding them. - Only
5 percent of respondents in Singapore audit enterprise roles more
frequently than monthly.
“With organizations
across the Asia Pacific region facing increased cyber threats, IT and business
leaders need to evaluate their identity-related security strategies,” said
Lennie Tan, Vice President & General Manager, One Identity, Asia Pacific
& Japan. “The alarming results of our study prove that organizations in
Singapore are exposing unsecured identities and creating security holes for
hackers to exploit. Those that don’t adopt stronger defenses and innovative
solutions to mitigate the growing risk more quickly, might face serious
consequences including reputation and financial loss.”
across the Asia Pacific region facing increased cyber threats, IT and business
leaders need to evaluate their identity-related security strategies,” said
Lennie Tan, Vice President & General Manager, One Identity, Asia Pacific
& Japan. “The alarming results of our study prove that organizations in
Singapore are exposing unsecured identities and creating security holes for
hackers to exploit. Those that don’t adopt stronger defenses and innovative
solutions to mitigate the growing risk more quickly, might face serious
consequences including reputation and financial loss.”
Credential-Based
Attack Vectors
Attack Vectors
One of the easiest
ways for malicious outsiders, or even insiders, to gain access into an
organization’s IT network is by stealing user credentials such as user names
and passwords. Once access is secured, a series of lateral movements and
privilege escalation activities can procure access to the type of information
and systems that are most coveted by bad actors, such as a CEO’s email,
customer or citizen personally identifiable information, or financial records.
The more time inactive accounts are available to bad actors, the more damage
can potentially be done, including data loss, theft and leakage, which could
end up in irreparable damage to reputations, compliance violations, as well as
possibly large fines and a significant drop in stock valuation.
ways for malicious outsiders, or even insiders, to gain access into an
organization’s IT network is by stealing user credentials such as user names
and passwords. Once access is secured, a series of lateral movements and
privilege escalation activities can procure access to the type of information
and systems that are most coveted by bad actors, such as a CEO’s email,
customer or citizen personally identifiable information, or financial records.
The more time inactive accounts are available to bad actors, the more damage
can potentially be done, including data loss, theft and leakage, which could
end up in irreparable damage to reputations, compliance violations, as well as
possibly large fines and a significant drop in stock valuation.
Solutions available
today such as One Identity Starling Identity
Analytics & Risk Intelligence (IARI), can help organizations reduce identity-related
risks associated with improper user entitlements or access rights by providing
significant visibility and insight. With proactive analysis and the ability to
compare user entitlements, IARI can rapidly pinpoint situations where
entitlements are out of norm, and pose an elevated risk.
today such as One Identity Starling Identity
Analytics & Risk Intelligence (IARI), can help organizations reduce identity-related
risks associated with improper user entitlements or access rights by providing
significant visibility and insight. With proactive analysis and the ability to
compare user entitlements, IARI can rapidly pinpoint situations where
entitlements are out of norm, and pose an elevated risk.
“Exploitation of excessive or inappropriate
entitlements remains a goldmine for threat actors who will then capitalize on
access to gain a foothold in an organization to steal data or inject malware.
This data is a wake-up call to organizations that they need sound solutions in
place now, such as One Identity Starling IARI, that accelerate the deprovisioning of access,
proactively discover of dormant accounts, and help ensure appropriate access
rights across the entire organization and user population,” added Jackson Shaw,
senior director of Product Management for One Identity.
entitlements remains a goldmine for threat actors who will then capitalize on
access to gain a foothold in an organization to steal data or inject malware.
This data is a wake-up call to organizations that they need sound solutions in
place now, such as One Identity Starling IARI, that accelerate the deprovisioning of access,
proactively discover of dormant accounts, and help ensure appropriate access
rights across the entire organization and user population,” added Jackson Shaw,
senior director of Product Management for One Identity.
About the One Identity
Global State of IAM Study
Global State of IAM Study
The One Identity Global State of
IAM Study consisted of an online survey conducted by Dimensional Research of IT
professionals with responsibility for IT security as a major part of their job
and were very knowledgeable about IAM. A wide variety of questions were asked
about experiences and challenges with IAM. A total of 913 individuals from the
U.S., Canada, U.K., Germany, France, Australia, Singapore and Hong Kong
completed the survey.
IAM Study consisted of an online survey conducted by Dimensional Research of IT
professionals with responsibility for IT security as a major part of their job
and were very knowledgeable about IAM. A wide variety of questions were asked
about experiences and challenges with IAM. A total of 913 individuals from the
U.S., Canada, U.K., Germany, France, Australia, Singapore and Hong Kong
completed the survey.
One Identity offers a free online
executive summary of the survey findings, as well as a Key Findings Report providing
additional detail in graphical format. For an illustrated look at the data,
take a look at our infographic. All of these materials can be found here.
executive summary of the survey findings, as well as a Key Findings Report providing
additional detail in graphical format. For an illustrated look at the data,
take a look at our infographic. All of these materials can be found here.
About One Identity
One
Identity, a Quest Software
business, helps organizations get identity and access management (IAM) right.
With a unique combination of offerings including a portfolio of identity
governance, access management and privileged management, and identity as a
service that help organizations reach their full potential, unimpeded by
security yet safeguarded against threats. One Identity has proven to be a
company unequalled in its commitment to its customers’ long-term IAM success.
More than 7,500 customers worldwide depend on One Identity solutions to manage
more than 125 million identities, enhancing their agility and efficiency while
securing access to their data — wherever it might reside. For more
information, visit http://www.oneidentity.com.
Identity, a Quest Software
business, helps organizations get identity and access management (IAM) right.
With a unique combination of offerings including a portfolio of identity
governance, access management and privileged management, and identity as a
service that help organizations reach their full potential, unimpeded by
security yet safeguarded against threats. One Identity has proven to be a
company unequalled in its commitment to its customers’ long-term IAM success.
More than 7,500 customers worldwide depend on One Identity solutions to manage
more than 125 million identities, enhancing their agility and efficiency while
securing access to their data — wherever it might reside. For more
information, visit http://www.oneidentity.com.
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!