New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Unused identities: A growing security threat

New York Tech Editorial Team by New York Tech Editorial Team
December 13, 2021
in Cybersecurity
0
Fragmented approach to identity security management creates risk
Share on FacebookShare on Twitter

In early May 2021, Colonial Pipeline, the operator of the pipeline that pumps 45% of the East Coast’s fuel, announced that they had been hacked.

unused identities

In his testimony before the Senate Committee on Homeland Security and Governmental Affairs, the company’s president and CEO Joe Blount told lawmakers that the hackers had breached their network via a compromised legacy VPN account.

This incident has nearly all the elements of security gone wrong:

  • Compromised credentials were found in a list of stolen data
  • The account wasn’t protected by multi-factor authentication
  • The attackers used a (most probably unmonitored) legacy service to break in

The compromised account was quite likely a holdover profile that was spun up by the IT team at an earlier date and they simply lost track of it, forgetting to block off its access to their network when they switched to a different system.

Their mistake highlights a common problem: access is granted to identities, but then managers lose visibility over these authorizations and they remain exposed. The risks from this mismanagement is only increasing as these user-less accounts grow in numbers, but there is hope if your organization is capable of some basic security hygiene.

Out of sight, out of mind – but still a risk

According to our internal research, 6% of user accounts within an organization are inactive. But just because they are not being used does not mean that they cannot be compromised. If an attacker gains access to one of these accounts, especially if they are unmonitored, they can use those permissions to reach the organization’s assets.

In some cases, these accounts might have belonged to former employees who have since left the organization. Others might have belonged to people who have changed roles and are no longer using those specific identities.

While these are issues that must be contended with, Identity Governance and Administration (IGA) tools do a pretty good job of addressing them under the Joiner, Mover, Leaver Lifecycle Management framework.

These tools, however, have blind spots in areas such as mismanaged empty groups and robotic identities. Both categories have permissions that can be used and abused.

Even when empty groups aren’t numerous in an organization, they often have access to thousands of files, providing a large enough window for hackers to steal data or cause disruption without detection.

The situation does not improve when it comes to the robotic identities. These are the service accounts that are used for performing all sorts of tasks, and as such, have a range of permissions –– including admin privileges in some cases. Forrester has estimated that the number of non-human identities has doubled over the last year.

How to identify, monitor, and remediate

The first step towards taking control over your identities and assets’ authorizations is to know what you have. This starts with scanning across all your XaaS environments – that’s SaaS, IaaS, and PaaS – and taking an inventory of which identities have authorization to which assets.

This involves ingesting the data from these different environments, normalizing the data into a workable model, and then correlating it with your identities from your identity provider (IDP) like Okta, Ping, Azure AD, or Google.

The goal here is to understand the relationship between the identities and assets, assessing a wide range of factors including their usage and if they are right sized to meet the policies/needs of the organization.

Are there identities with permissions to assets that have not been used in at least 60 days? This might be a good time to revoke those authorizations. But that’s just a surface-level case. Once you start analyzing your entitlements on a deeper level, you’ll begin to find that there are more permissions granted to your identities than you’re likely to want to admit. This is especially true for permissions that shouldn’t have been granted in the first place.

Once we understand what we have, we need to figure out how we are going to: a) fix all the misaligned entitlements that have accumulated over the years and b) create a plan for doing it correctly from now on.

As you monitor, remediate risky authorizations as they pop up. If you come across an empty group, then close it. Same for robotic identities that are not in regular use.

If you are automating your entitlement provisioning process, then it will be easier to revoke permissions and spin them up again in the future than deal with a crisis.

To be effective at eliminating the risks that come with unused identities, we need to transition to a state where we are ingesting data, monitoring for violations, and remediating constantly.

The current standard of periodic checks might satisfy auditors, but it’s not enough if we want to enforce sufficient security standards moving forward.

Credit: Source link

Previous Post

TechStars backed Saas Startup UnRemot Raises $700K in a Seed Round Led by Inflection Point Ventures

Next Post

How C-suite executives perceive their organizations’ readiness for ransomware attacks

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
How C-suite executives perceive their organizations’ readiness for ransomware attacks

How C-suite executives perceive their organizations' readiness for ransomware attacks

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025
The Future of Software Development: Why Low-Code Is Here to Stay

Building Brand Loyalty Starts With Your Team

May 23, 2025
Tork Media Expands Digital Reach with Acquisition of NewsBlaze and Buzzworthy

Creative Swag Ideas for Hackathons & Launch Parties

May 23, 2025

Recommended

New York City

Why Bite-Sized Learning is Booming in NYC’s Hustle Culture

June 4, 2025
Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

Driving Innovation in Academic Technologies: Spotlight from ICTIS 2025

June 4, 2025
Coffee Nova’s $COFFEE Token

Coffee Nova’s $COFFEE Token

May 29, 2025
Money TLV website

BridgerPay to Spotlight Cross-Border Payments Innovation at Money TLV 2025

May 27, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech crypto cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media