Security Manager's Journal: Getting up to date on expired access rights
Employees come and employees go, but access rights tend to live on long after their departures
Computerworld - I've been reviewing user accounts and access rights, and what I'm finding is that while our new-hire process does a good job of providing the right levels of access to our employees, our termination process isn't as good at removing access privileges.
That's no surprise to me, because people who are in need of access are good at motivating action. When someone leaves, there's no one clamoring to have his access taken away. But as the security manager, it's the taking-away part I'm most interested in. I want to know if we are removing access in a timely manner when employees leave the company.
I started my review by getting a list of active employees from the HR department. That wasn't as easy as you might think. I don't know how much work is involved in producing a report of current employees, but I expected that HR would be able to get a list from our benefits system or our payroll provider -- after all, we send all of our employees paychecks every two weeks, so we must be able to keep track of them. But it took a few weeks for HR to get me the list.
Once I had the list of active employees, the rest was easy. I started with Active Directory, our main source of user accounts and permissions. I pulled a list of all active user accounts and compared it with the employee list. I had to ignore a lot of accounts that are specific to various other purposes, such as software service accounts, training accounts and test accounts, but what was left matched with the employee list. So far, so good. My team does an account review of departed employees every quarter, because it's a SOX requirement, by comparing the user accounts to the termination list to ensure that everyone who was supposed to be removed no longer has access. If you think of this as a type of negative verification (what access has been removed), the other type of verification is positive (what access is active). We haven't done the positive verification of comparing user accounts to active employees in a while, because there's no external motivation to do so. In this case, my motivation was self-initiated.
But Active Directory isn't the only place we manage user accounts. Even though my company has single sign-on (SSO), we use many third-party SaaS services like Salesforce and our corporate expense management service that aren't integrated with our SSO. Employees have separate user accounts and passwords for those services. And because those SaaS services aren't included in the scope of our SOX testing, they've flown under the radar until now. I got a list of active user accounts from each of the SaaS services I was able to identify (which was surprisingly easier than getting the list of employees from my own HR department) and compared them to my active employee list.
More by J.F. Rice
- Security Manager's Journal: Security flaw shakes faith in Apple mobile devices
- Security Manager's Journal: Cyberattacks just got personal
- Security Manager's Journal: Target breach unleashes fresh scams
- Security Manager's Journal: Giving thanks for SIEM
- Security Manager's Journal: Hashing out secure applications
- Security Manager's Journal: Why the shutdown is like the cloud
- Security Manager's Journal: Thinking about passwords
- Security Manager's Journal: Android panic
- Security Manager's Journal: Auto-forwarded emails could be a huge problem
- Security Manager's Journal: Our network infrastructure has fallen far out of date
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts