

Thank you for Subscribing to Gov Business Review Weekly Brief
The COVID pandemic has changed many things in business today, including employees working remotely.
This new normal increases the need for improved identity and access management (IAM) in the enterprise. The ability for users to remain efficient and gain access to systems remotely while validating their identity is imperative. Flexibility in the system to accommodate employee access as well as contractors, auditors, and other needs is a challenge. All the while providing security teams with the proper monitoring and governance to keep the bad actors out and look for internal threats. Placing identity at the core of your security strategy is a principle of the zero-trust model of security. Many IAM providers are providing the foundation to zero trusts with integrations with other products to help the enterprise validate the user and device access to resources. The concept of “least privileged” access to authentication to the applications should be engrained in the culture of the organization. User requests for access along with management approval of that access must not be more than the user needs. An employee’s job title can be used to set the baseline access for the application. The manager is the first line in validating access requests and current permissions. Assurance that any access exceptions with associated approvals are clearly documented in the IAM or ticketing system. Configuring your IAM and assigning the least privileged access is only part of the equation. Regular reviews of assigned credentials and permissions of a user lead to proper governance. Validating that a user is limited to their assigned duties prevents accidental, unauthorized access to data. This can occur due to a departmental or job change of an employee. Access permissions may be required during a set transition period but removed after a set period. Annual user access reviews of employee access validate that the employee has the proper security clearance. During the review, there should be careful attention to nested group memberships and administrator groups. Limiting membership to the built-in administrator groups to separate privileged accounts and require multi-factor authentication. Review of those privileged accounts should be performed more frequently. Likewise, regular reviews of critical applications must also be performed on a regular basis.The concept of “least privileged” access to authentication to the applications should be engrained in the culture of the organization
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info