One identity Survey shows hackers getting months to exploit old IT users’ accounts

One Identity, a in helping organisations get identity and access management (IAM) right, released study results showing significant gaps in how organisations manage accounts used to access IT infrastructure, systems, and data—gaps that could result in major security and compliance deficiencies.

The results of the study of more than 900 IT security professionals, conducted by Dimensional Research, spotlights how common security best practices—such as timely removal of access to corporate data and applications, dormant account identification, and role administration—continue to be a challenge and concern for organisations worldwide.

Most alarmingly, 70% of respondents express a lack of confidence that all former employees and employees changing roles are fully deprovisioned—or have their accounts changed or removed—in a timely enough manner. Therefore, their accounts remain open and available with active authorisation even after an employee changes roles or leaves the organisation.

Only 14% say they remove access for users immediately upon a change in HR status. Related findings point to concerning practices regarding management of dormant accounts. Only 9% are confident that they have no dormant accounts, only 36% are “very confident” they know which dormant user accounts exist, and a remarkable 84% confessed that it takes a month or longer to discover these dangerous open doors into the enterprise.

Best practices demand that access be removed for employee accounts that are no longer active. In the case where an employee changes roles, access needs to be altered to provide the new access and authorisation required for the new role and remove access that is no longer needed.

John Milburn

Oftentimes, the removal of no-longer-needed access is overlooked. When user accounts are not deprovisioned (often called dormant accounts), they are open invitations for disgruntled employees, hackers or other threat actors, who can exploit the accounts and gain access to sensitive systems and information, resulting in data breaches or compliance violations.

The user account access and management challenges are not limited to legacy systems and data, as they also are relevant for newer technologies such as file-sync-and-share services like Box and Dropbox. Only 14% of respondents report deprovisioning access to these accounts in a centralised/automated manner.

Other findings from One Identity’s Global State of IAM Study provide further evidence of the challenges organisations face with regard to managing employee access to IT resources:

    • Only one in four are “very confident” that user rights and permissions in their organisations are correct for the individuals’ roles.
    • 71% are concerned about the risk represented by dormant accounts.
    • 97% have a process for identifying dormant users, but only 19% have tools to aid in finding them.
    • Only 11% audit enterprise roles more frequently than monthly.

“Today, when employees leave an organisation or change roles within the same organisation, it’s more critical than ever that any access rights to the corporate network, systems, and data are revoked or modified to match their new status,” said John Milburn, president and general manager of One Identity.

“The overwhelming lack of confidence that organisations are doing this in a timely manner means they are still grappling with these same critical issues, offering up a gaping security hole for former employees, or hackers to exploit those identities, and wreak havoc for hours, weeks or even months to come. Those that don’t finally get this under control are more likely than ever to suffer a significant breach, and all of the resulting major impacts on reputation, brand, and stock valuation.”

Credential-Based attack vectors

One of the easiest ways for malicious outsiders, or even insiders, to gain access into an organisation’s IT network is by stealing user credentials such as user names and passwords. Once access is secured, a series of lateral movements and privilege escalation activities can procure access to the type of information and systems that are most coveted by bad actors, such as a CEO’s email, customer or citizen personally identifiable information, or financial records.

The more time inactive accounts are available to bad actors, the more damage can potentially be done, including data loss, theft and leakage, which could end up in irreparable damage to reputations, compliance violations, as well as possibly large fines and a significant drop in stock valuation.

Jackson Shaw

Solutions available today such as One Identity Starling Identity Analytics & Risk Intelligence (IARI), can help organisations reduce identity-related risks associated with improper user entitlements or access rights by providing significant visibility and insight. With proactive analysis and the ability to compare user entitlements, IARI can rapidly pinpoint situations where entitlements are out of norm, and pose an elevated risk.

“Exploitation of excessive or inappropriate entitlements remains a goldmine for threat actors who will then capitalise on access to gain a foothold in an organisation to steal data or inject malware.

This data is a wake-up call to organisations that they need sound solutions in place now, such as One Identity Starling IARI, that accelerate the deprovisioning of access, proactively discover dormant accounts, and help ensure appropriate access rights across the entire organisation and user population,” added Jackson Shaw, senior director of Product Management for One Identity.

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

RECENT ARTICLES

LEXI develops universal IoT platform for easing IoT experience

Posted on: December 5, 2022

Berkeley, United States – LEXI, the company behind the comprehensive IoT technologies that are transforming how both enterprises and consumers manage and automate their smart spaces, announced the LEXI IoT platform – a sizable step forward in easing the IoT experience for everyone connecting products, across apps, and across ecosystems.

Read more

CloudBees joins Amazon EC2 Spot Ready Partner program

Posted on: December 5, 2022

San Jose, United States – CloudBees, a software delivery platform for enterprises, announced that it achieved the Amazon Web Service (AWS) Service Ready program for Amazon Elastic Compute Cloud (Amazon EC2) Spot instances. This designation recognises that CloudBees and its CloudBees CI solution has demonstrated support for Amazon EC2 Spot instances.

Read more
FEATURED IoT STORIES

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more

What is IoT?

Posted on: July 7, 2019

What is IoT Data as a new oil IoT connectivity What is IoT video So what’s IoT? The phrase ‘Internet of Things’ (IoT) is officially everywhere. It constantly shows up in my Google news feed, the weekend tech supplements are waxing lyrical about it and the volume of marketing emails I receive advertising ‘smart, connected

Read more