{"id":39,"date":"2020-09-07T11:04:09","date_gmt":"2020-09-07T10:04:09","guid":{"rendered":"http:\/\/brainbizz.webgeniuslab.net\/?p=39"},"modified":"2020-09-25T19:00:39","modified_gmt":"2020-09-25T18:00:39","slug":"why-identity-and-access-management-is-essential-for-organizations","status":"publish","type":"post","link":"https:\/\/www.argentxcyber.com\/blog\/index.php\/2020\/09\/07\/why-identity-and-access-management-is-essential-for-organizations\/","title":{"rendered":"Why Identity and Access Management Is Essential for Organizations"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<span style=\"color: #243746;\" class=\"dropcap\">P<\/span>roviding access for the right people, to the right resources, at the right time starts with a well-structured identity and access management or IAM strategy; block everything else.<\/p>\n<p>Identity access management or IAM defined relies on a three-step process whereby access to any resource, physical or logical, is granted only to the subject (user, program, or process) that successfully traverses each security level.[\/vc_column_text][wgl_spacing spacer_size=&#8221;17&#8243;][vc_single_image image=&#8221;1345&#8243; img_size=&#8221;large&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][wgl_custom_text font_size=&#8221;16&#8243;]As your business grows, your environment faces an increasing number of subjects who\/which need to identify themselves to various systems. Identification seeks to establish whether the subject is indeed the individual it claims to be (something you are). An example of this is a username digital key or certificate. Individuals, applications, databases, entities, etc. are considered subjects.<\/p>\n<p>Authentication is the second step in verifying the identification. The increase in cyber-attacks resulting in data theft, reputational damage, etc. drives the need to improve authentication. While in the past, authentication was a password (something you know) and kept your data safe, a modern multi-layered approach is required to reduce your risk. The implementation and use of two and three-factor authentication, also known as multi-factor authentication (something you have), is rising and is used by entities of all sizes as a step to level the playing field against cyber threats.<\/p>\n<p>Authorization is the final step and grants the subject access, controls, and privileges based on the configured identity. Authorization is where things go wrong, such as a misconfiguration or poor execution, leading to many vulnerabilities. To mitigate these risks, always plan and define systems with the least privilege principle, avoiding vulnerabilities resulting from authorization creep and credential sharing.[\/wgl_custom_text][wgl_spacing spacer_size=&#8221;30px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<blockquote>\n<p><span style=\"color: #243746;\">Like the firm foundation of a house, a sound, well planned and implemented IAM strategy will ensure that everything you build on and around your business is with security in mind from the beginning. A sound IAM strategy enables organizations to keep their DAAS secure. DAAS or Data, Applications, Assets, and Services represent the organization&#8217;s key areas that you are trying to protect.<\/span><\/p>\n<\/blockquote>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;34&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #243746;\">Where is IAM?<\/span><\/h4>\n<p>[\/vc_column_text][wgl_spacing spacer_size=&#8221;12&#8243;][wgl_custom_text font_size=&#8221;16&#8243;]Identity and access management deployments encompass many technologies implemented in on-prem, cloud, or hybrid environments. Quite often, IAM is deployed in the cloud to leverage the ease of deployment, cost-saving, and constant updates. Some standard components are API security, identity as a service, conditional access, risk-based authentication, password management, reporting, auditing, etc.[\/wgl_custom_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;34&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #243746;\">Importance of IAM?<\/span><\/h4>\n<p>[\/vc_column_text][wgl_spacing spacer_size=&#8221;12&#8243;][wgl_custom_text font_size=&#8221;16&#8243;]Identity and access management carries a considerable significance irrespective of your organization size. IAM should give the administrator a record of all user login information captured and managed during identification, authentication, and authorization journey. IAM should provide a history of all transactions for compliance and the drive toward continuous improvement and reinforcement of access policies.<\/p>\n<p>The use of a good IAM will help with the many compliance requirements that your organization faces, giving you the tools to help secure your organization&#8217;s data. From the beginning of bring your own device or BYOD and before, compliance now more than ever is a crucial piece of the puzzle. Aside from the ever-increasing cyber threat landscape, BYOD and big data, the regulation factor on user account management and storage is under the microscope.<\/p>\n<p>The General Data Protection Regulation (GDPR) \u2013 online account privacy and rules of management storage and data breach notification, Sarbanes-Oxley Act (SOX) \u2013 financial regulations on corporate disclosure including an IT component dictating how financial data shall be stored, Health Insurance Portability and Accountability Act (HIPPA) \u2013 legislation around patient records are stored, managed and transferred, and finally International Standards Organization or ISO 27001 on information security management systems, setting a framework on information security with the support of controls, are just a few of the regulations that your organization is facing or will face going forward.[\/wgl_custom_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;34&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #243746;\">Risks of IAM<\/span><\/h4>\n<p>[\/vc_column_text][wgl_spacing spacer_size=&#8221;12&#8243;][wgl_custom_text font_size=&#8221;16&#8243;]Several risks face your organization as you traverse the route to a sound identity and access management strategy. A few critical risks for your consideration highlighted below:<\/p>\n<ul>\n<li>Planning activities that do not consider all departments, 3rd party and other organizational dependencies resulting in gaps during implementation<\/li>\n<li>Poor or uncoordinated implementation of IAM could weaken the overall security posture adding additional vulnerabilities<\/li>\n<li>Lack of automation results in many manual processes that -if left unchecked- can open the organization to other vulnerabilities<\/li>\n<li>Lack of human resources with the necessary skill set to envision and implement a sound IAM strategy resulting in potential vulnerabilities in the organization<\/li>\n<\/ul>\n<p>[\/wgl_custom_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;34&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #243746;\">Some instances where IAM went wrong<\/span><\/h4>\n<p>[\/vc_column_text][wgl_spacing spacer_size=&#8221;12&#8243;][wgl_custom_text font_size=&#8221;16&#8243;]As with all technology, there are times when organizations have suffered significant reputational and financial losses. Generally, there is always a human component that is responsible.<\/p>\n<p>The<em>\u00a0<\/em><span><a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\"><em>2019 Verizon Data Breach Investigation Report<\/em><\/a><\/span>, maintains that 80% of the time compromised breaches involve weak credentials. Overall, 29% of all breaches (regardless of the type of attack) involve using stolen credentials.<\/p>\n<p>The<span><a href=\"https:\/\/pages.riskbasedsecurity.com\/2019-midyear-data-breach-quickview-report\" target=\"_blank\" rel=\"noopener\">\u00a0<em>2019 MidYear QuickView Data Breach Report from Risk Based Security<\/em><\/a><\/span>\u00a0maintains that over 4.1 bn records were exposed within the first two quarters of 2019. This is estimated to be a 54% increase year on year.<\/p>\n<p>Recently in the 2020 Twitter incident,<\/p>\n<p><em>ARS Technica\u00a0<\/em><span><a href=\"https:\/\/arstechnica.com\/tech-policy\/2020\/07\/florida-teen-arrested-charged-with-being-mastermind-of-twitter-hack\/\" target=\"_blank\" rel=\"noopener\">reported<\/a><\/span>\u2026[\/wgl_custom_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;12px&#8221;][vc_column_text]<\/p>\n<blockquote>\n<h4><span style=\"color: #243746;\">\u201cWith the confidence of the targeted employees,\u00a0<strong>the attackers directed them to a phishing page<\/strong>\u00a0that mimicked an internal Twitter VPN. The attackers then\u00a0<strong>obtained credentials<\/strong>\u00a0as the targeted employees entered them.\u00a0<strong>To bypass two-factor authentication<\/strong>\u00a0protections Twitter has in place, the attackers entered the credentials into the real Twitter VPN portal within seconds of the employees entering their info into the fake one. Once the employee entered the\u00a0<strong>one-time password<\/strong>, the attackers were in.\u201d<\/span><\/h4>\n<\/blockquote>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;34&#8243;][wgl_custom_text font_size=&#8221;16&#8243;]On this occasion, over $100,000 was stolen.<\/p>\n<p>It is crucial to understand that cyber threats of all shapes and sizes affect all companies and individuals. You are a target. Ensuring that you have adequate security layers in your organization and a sound identity and access management strategy can mitigate many of your organization&#8217;s risks.[\/wgl_custom_text][\/vc_column][\/vc_row][vc_row][vc_column][wgl_spacing spacer_size=&#8221;34&#8243;][vc_column_text]<\/p>\n<h4><span style=\"color: #243746;\">Moving Forward<\/span><\/h4>\n<p>[\/vc_column_text][wgl_spacing spacer_size=&#8221;12&#8243;][wgl_custom_text font_size=&#8221;16&#8243;]When deciding how to improve your IT security, consider investing in a quality Identity and Access Management strategy. The right one can protect your company, make it easy for employees to fulfill their responsibilities, and increase efficiency for your employees and clients.<\/p>\n<p>Looking for guidance on the right IAM solution for your organization? Contact us, and we can get you started right away. You\u2019ll work with leaders in the industry, focused on solving your unique issues. With the right partner, you can rest assured knowing your company has the right foundation for security and is geared for growth.[\/wgl_custom_text][wgl_spacing spacer_size=&#8221;34px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_btn title=&#8221;Schedule an Assessment&#8221; color=&#8221;black&#8221; link=&#8221;url:https%3A%2F%2Fargentxcyber.com%2Fcontact|||&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leading companies are adding new talent to support a digital operating model. To develop sharp insights using digital tools, procurement teams will need data science and analytics expertise. <\/p>\n","protected":false},"author":3,"featured_media":1356,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-39","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/39","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=39"}],"version-history":[{"count":13,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/39\/revisions"}],"predecessor-version":[{"id":1370,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/39\/revisions\/1370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/1356"}],"wp:attachment":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=39"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=39"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=39"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}