The strength of regular access reviews

Netwrix, a cybersecurity vendor that makes data security easy, asked 590 IT pros whether and how they review user access permissions. The survey found that 90 per cent of organisations either already periodically review access entitlements or plan to start doing so within three years.

However, most respondents (81 per cent) admit that they perform access reviews manually.

“Manual review is the most unreliable and time-consuming way of keeping permissions up to date,” says Joe Dibley, security researcher at Netwrix. “An email or instant message from some department head confirming access rights usually satisfies neither internal nor external auditors. Moreover, this approach increases the chance of human error — it’s too easy to forget about someone’s answer or miss the email altogether.”

Moreover, in 41 per cent of organisations, IT teams review user access rights not only manually but on their own, without involving business users at all.

“IT teams generally are not in a position to know exactly who needs what access to which IT resources. As a result, the organisation not only does fail to properly enforce least privilege, but the helpdesk is overwhelmed by requests from business users and data owners to update access rights,” comments Dibley.

The respondents who already have a dedicated tool for reviewing user access rights were then asked what they consider to be the biggest benefit of that solution. 49 per cent of them named risk reduction and 28 per cent chose time-savings.

“Automating access reviews reduces cybersecurity risks directly, by ensuring regular update of users’ rights — and indirectly as well: eliminating manual tasks frees up IT teams to focus on other critical activities, like investigating security incidents before they turn into breaches,” adds Dibley.

Cynomi’s groundbreaking module simplifies mapping services and products to client needs,...
BlackFog has unveiled its 2024 State of Ransomware Report, a detailed analysis of ransomware...
New managed service improves network visibility and automated threat response.
New research reveals evolving threat tactics, the rising role of business email compromise, and the...
Cyber Assessment Framework promises transformation, but IT leaders demand more organisational...
I-TRACING and Bridewell, the leaders in their respective markets of France and the UK, are joining...
OpenText has introduced OpenText™ Core Threat Detection and Response, a new AI-powered...
orcepoint has launched its next-generation Data Detection and Response (DDR), bringing AI-powered...