In the first of a two-part blog series, The Seven Deadly Sins of User Access Controls, my colleague Jean Gordon Kocienda provided fresh insights into overly-permissive user access controls as a common underlying cause of data breaches. In this blog, I address the solutions to those "Seven Deadly Sins" with a modern twist on the antiquity typically known as the "Seven Wonders."
Information Security professionals need to address user access control in the context of today's complex threats, coupled with a fast changing IT landscape. Long gone are the days of only a few with a need to know and key corporate assets being housed behind the enterprise perimeter. We have shifted to an agile, data-centric environment with increasing user populations who may also be third-party suppliers or contractors needing fast access to assets that were previously off limits. And, it's not just massive volumes of data that need protecting; it's access to critical work streams and transactions too.
Great advancements in security technologies over the last decade make it easier to manage user access controls and also quickly pinpoint areas of risk. I am listing what I call the Seven Wonders of User Access Control to repel each of the "sins" that Jean set out in her blog:
The Seven Wonders of User Access Controls is by no means a complete list, and every organization will approach user access controls differently. See something missing? Do write and tell us how you are implementing user access controls in your environment.