Identity & Access Management

10 Steps to Cyber Security

Identity and Access Management

Most organisations have, by necessity of compliance with regulations such as GDPR or certifications such as Cyber Essentials, adopted some form of identify management – that is, ensuring users only have the permissions they need to do their job, restricting the use of administrative privileges, and ensuring effective management of user accounts.

Account Audits and Security Health Checks

An easy way to get a good overall understanding oof your security status with regards to user and admin accounts is to run an audit of your accounts using a tool or service provided by your trusted cyber security partner or advisor.

These audits will flag the number of administrator accounts you have in use, password ages on the accounts and activity and utilisation of your user accounts to help identify accounts that are no longer required.

These audits can also provide a wealth of other non-security information about your account base and should be undertaken yearly.

 

Password Management

A key component in having a secure and effective user account management strategy, is passwords. Getting your approach to passwords correct is essential both from a security perspective, but also from the perspective of your users.

Studies have shown that the traditional approach of long complex passwords being changed frequently is not actually as secure as it might seem; namely because users find it difficult to remember them – so the ‘secure’ password gets written down on a post-it note or in a notebook. The new approach recommended by NCSC is to use long passphrases that should only be changed if they are believed to have been compromised to remove the password fatigue that undermines security.

Solutions for Identity & Access Management

Monitor user activity & behaviour

As mentioned previous there are solutions available such as Logpoint UEBA or Forcepoint UEBA that will silently monitor and analyse User Entity Behaviour in your environment, once a baseline is established they will alert you should any of users start to exhibit aberrant behaviour – indicating a possible insider threat or potential compromise of your systems.

Audit user accounts & best practises

Keeping on top of the user accounts present in your active directory or other directory systems can quickly become an unmanageable task. Use of the CyberLab Microsoft 365 Health Check service or by use of the Microsoft Identity and Access Management solutions can greatly simplify the task as well as offering valuable insights into user account and license utilisation that could represent subscription savings to your business.

 

Multi-factor Authentication

The use of multi-factor authentication (MFA) is not a new concept, security tokens (SecurEnvoy) on a key ring have been around for a long time, they have mostly been solutions that carried a significant cost and therefore their use was often constrained to very specific use cases where security necessitated heightened authentication scrutiny.

MFA technologies are available on many user administration platforms today for no or little extra charge (e.g. Microsoft Authenticator) and should be embraced and adopted wherever possible since it significantly lowers your risk of account compromises occurring. Modern MFA solutions are also more reliable, different methods of authentication are possible (phone, SMS, mobile app) reducing the risk users will end up without access if they lose their key fob.

As a minimum, MFA should be enabled for any privileged accounts as standard, however enabling for users also has its benefits, and the MFA solutions now are easy to implement and educate users on their use.

Password Management

The re-use of existing passwords across multiple platforms is also a common practise that users adopt – because it’s easier to remember one password than dozens. The best solution to all these password issues is to adopt the use of an enterprise-grade password management solution such as Secure Server by Delinea.

By using such a product you ensure:

  • Passwords are kept secure in an encrypted password vault, so users no longer hide them on post-it notes under the keyboard (yes, it still happens!)
  • Users no longer need to remember them enabling use of complex, difficult to brute-force passwords
  • Within an enterprise, there are often requirements for certain passwords to be shared, enterprise grade password management facilitates this in a secure and controlled manner that can be audited.

Identity and Access Management

James Pascoe, Technical Architect at Chess ICT, joins the Cyber Security Video Series to explore the key role that identity and access management plays in securing data and devices within an organisation.

They cover:

  • What is identity and access management?
  • Managing access to systems and devices securely

Our Vendor Partners

We work alongside the most reputable vendors in cybersecurity to ensure your people can work safely from anywhere.

Sophos logo
Microsoft logo
forescout
Logpoint logo
Cisco logo

Speak With an Expert

Enter your details and one of our specialists will be in touch.

Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.

Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.

We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.