Identity & Access Management
As companies are growing, it is more and more difficult to manage end user life cycles. A lack of control exposes the company to several risks.
« In 2019, the global cost of failure or setup errors linked to access rights management is 8,7 billion dollars.»
SOURCE
There are several factors linked to a lack of control of the user life cycle:
Users with wide access can accidentally delete or share sensitive data.
An employee willing to fraud can do so using SoD failures, corrupting data, steeling data to sell them to competition or expose financial data to harm the company.
Hackers try to target user accounts with privileged access to be able to access wide databases, systems, applications and infrastructure. Indeed, the systems contain the most sensitive data for a company (suppliers, clients, patents, etc.)
It is important to avoid providing too wide access to end users. Generally, the target is to limit access to business needs, implementing a thorough SoD process or enhancing dual control.
To guarantee secured user provisionning, it is highly recommended to enforce the User Access Manangement (UAM) related processes by implementing a tool including automatic provisionning and preventive sanity checks.
The security experts at Artimis support their clients with the implementation of identity and user right related processes including appropriate tooling :
Conception and implémentation :
Of a proper identity management process,
Of a strategy to define a single sign on type of user management to improve end user experience,
Of a mutual access request management tool (cross system),
Of a process to manage end users with wide access (IT, business, internal audit, …),
Of a process to review the access rights that fits external audit requirements – User Access Review (UAR)