November 16, 2015 By Nick Oropall 2 min read

Companies worldwide are trying to figure out new ways — and optimize already proven methods — of retaining employees. But did you know that employee retention can lead to security vulnerabilities? Fortunately, identity governance can help.

Employee Retention Can Make a Mess

When employees stay with a company for a long time, they change job roles, work on special projects and get promotions. This is great for the employees and their experience, but it can lead to problems with their user access. User access is added for new jobs, new roles, special projects and promotions, but in many cases, it is not taken away. When a user continues to aggregate this access, he or she can become a super-user of sorts and may end up with segregation of duties violations, otherwise known as a toxic combination of access.

A segregation of duties (SoD) violation is when a user has access to two entitlements that can create a conflict of interest. For example, a user may be able to create vendors and also pay vendors. This constitutes a violation because, theoretically, malicious users could create a vendor with their own bank account information and then subsequently pay that vendor.

This SoD violation would be a compliance issue as well as a serious security threat. There needs to be a set of checks and balances in place, along with a security solution that can monitor those checks and balances for accuracy.

Additionally, if an overentitled user’s account is compromised by an attacker, that account could become the keys to the kingdom. Not only would the attacker have access to real credentials, but credentials that have more access than they should. If those accounts aren’t being properly managed and governed, they could present a considerable threat to data security.

Finding an Identity Governance Solution

The right identity governance solution can help to solve this retention problem and prevent entitlements creep. It is critical to use a tool that can not only identify current segregation of duties violations, but also put processes in place to prevent them from arising in the future. When a user gets a new job role or promotion, their old entitlements should be re-evaluated and recertified.

Additionally, when users gain new entitlements for their new job role, they should be analyzed and compared with their past entitlements. If this new entitlement comprises an SoD violation with any of their old entitlements, the user should not be given access to it. It is critical to prioritize risks associated with user access in order to remain compliant and secure the organization. The right identity governance solution can make that easy.

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today