November 16, 2015 By Nick Oropall 2 min read

Companies worldwide are trying to figure out new ways — and optimize already proven methods — of retaining employees. But did you know that employee retention can lead to security vulnerabilities? Fortunately, identity governance can help.

Employee Retention Can Make a Mess

When employees stay with a company for a long time, they change job roles, work on special projects and get promotions. This is great for the employees and their experience, but it can lead to problems with their user access. User access is added for new jobs, new roles, special projects and promotions, but in many cases, it is not taken away. When a user continues to aggregate this access, he or she can become a super-user of sorts and may end up with segregation of duties violations, otherwise known as a toxic combination of access.

A segregation of duties (SoD) violation is when a user has access to two entitlements that can create a conflict of interest. For example, a user may be able to create vendors and also pay vendors. This constitutes a violation because, theoretically, malicious users could create a vendor with their own bank account information and then subsequently pay that vendor.

This SoD violation would be a compliance issue as well as a serious security threat. There needs to be a set of checks and balances in place, along with a security solution that can monitor those checks and balances for accuracy.

Additionally, if an overentitled user’s account is compromised by an attacker, that account could become the keys to the kingdom. Not only would the attacker have access to real credentials, but credentials that have more access than they should. If those accounts aren’t being properly managed and governed, they could present a considerable threat to data security.

Finding an Identity Governance Solution

The right identity governance solution can help to solve this retention problem and prevent entitlements creep. It is critical to use a tool that can not only identify current segregation of duties violations, but also put processes in place to prevent them from arising in the future. When a user gets a new job role or promotion, their old entitlements should be re-evaluated and recertified.

Additionally, when users gain new entitlements for their new job role, they should be analyzed and compared with their past entitlements. If this new entitlement comprises an SoD violation with any of their old entitlements, the user should not be given access to it. It is critical to prioritize risks associated with user access in order to remain compliant and secure the organization. The right identity governance solution can make that easy.

More from Identity & Access

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today