August 29, 2016 By Andy Taylor 4 min read

“This is Bob from finance. My new employee started today and needs access right away. I can’t believe this hasn’t been done already, but you guys need to get on top of it. Just give him the same access as Alice, and do it now!”

Now, all of us identity and access management (IAM) professionals remember those days when exchanges like the one above were the norm, but frighteningly, this scenario still occurs in many organizations. The “I need it now; don’t you know who this user is?!” attitude of many managers doesn’t help the situation.

Spotting Identity Governance Trouble

Aside from the obvious problem of user frustration with painfully slow and complicated processes, this scenario hides many more consequences that can put organizations at risk. Users may be granted inappropriate access that’s been approved by the wrong people. To top it all off, this access may never be reviewed.

It’s a dangerous combination that has contributed to many high-profile breaches and data loss incidents. Perhaps the most telling sign of this issue is that insiders were responsible for 60 percent of attacks in 2015, according to IBM X-Force data. At the heart of most of these insider attacks are absent, ill-conceived or overly complex access governance processes that give too much access to the wrong people with too little oversight.

Read the white paper: Key steps to securing data and maintaining proper access

So, what are the leading signs of identity governance trouble that can put an organization at risk? Here are our top five in no particular order:

1. Orphaned Accounts

These accounts are typically active long after a user leaves the organization. Accounts can become orphaned if the IAM solution lacks historical details of the user or if the provisioning process is overly complex. In this case, administrators don’t know what accounts to look for and delete.

Organizations don’t know who uses or owns some user accounts. Neither the account naming convention nor the metadata gives any indication of these account owners, yet the accounts can still be used to access sensitive resources. What’s more, even if administrators know what accounts to look for, they may be reluctant to disable or delete them for fear of creating a service incident.

Unless these accounts are identified and managed, unauthorized, fraudulent activities may occur.

2. Poorly Defined Certification Processes

For many organizations, time required to certify instills a sense of dread. The IAM certification process appears too frequently with little warning or notification. Notice is often sent to the incorrect reviewer and contains confusing entitlements only the IT guru understands. The process as a whole may be overly time consuming on management. It generally includes too much to review and may still contain account removals not removed in the previous cycle.

All of these factors combine to make certification a herculean task. Unfortunately, a poorly designed review can have dire consequences. If it leads to a failed audit, it can result in heavy pressure from the auditors and more regular audits. Even worse, poorly defined review processes means user identities and access to valuable resources aren’t secured, leading to risks.

3. Inadequate Access Request Approvals

The access approval process may include inappropriate approvers for requests — for example, persons who have no organizational relationship with the users in the first place. This is followed by individuals who know little about the business function or access acting in the capacity of the approver.

Self-selection of approvers is also a common problem that can lead to requests always being approved by a friendly approver rather than predefined, knowledgeable approvers. There are also instances whereby IT users are requesting business access yet only being approved by IT approvers, or privileged access only being approved by line managers who may not understand security requirements or policies. These scenarios can lead to issues with excessive entitlements being granted, resulting in potential segregation-of-duty (SOD) breaches.

4. Lack of Segregation-of-Duty Controls

Some functions must be segregated to limit the risk of fraudulent behaviors. One common example is financial processing activities, which should be separated to ensure simple activities such as raising and releasing payment on an invoice cannot be done by the same person.

Companies can have difficulty articulating SOD controls, mainly due to a lack of knowledge about their applications and their usage across business functions. There’s also a lack of the right tools needed to analyze their impact or, importantly, to identify and manage them across large datasets.

These process checks are often run manually and are ad hoc in timing — in most cases a long time after the access has been granted and occasionally in reaction to an incident or breach. Successful segregation of duties requires a combination of methods by which these checks can be incorporated into electronic access request processes and breach detection alerts.

5. Independent Processes Across the Organization

Different processes can exist across the business for similar activities, leading to inefficiencies. This is certainly true for global organizations that have multiple access request tools, each with their own localized control requirements.

Some organizations are still raising and duplicating requests manually in cross-business systems that have not been integrated. Others have numerous user administration teams performing similar functions; there may be a team to create the account, a team to add the entitlements, a service desk to issue the password, teams for software drops, etc. These costly and inefficient provisioning processes result in poor user experiences.

Differing risk appetites across the organization can also lead to long delays in access request flows, with additional approvers mandated but often adding little value other than providing a tick in the box for audit purposes. This can delay the request for days or even weeks.

You’re Not Alone

If any of these signs of identity governance trouble ring true, you’re not the only one. Fortunately, the right identity governance and intelligence solution can solve these issues to minimize your security risks and help you systematically achieve and manage your regulatory compliance.

Read the white paper: Key steps to securing data and maintaining proper access

More from Identity & Access

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today