Story image

'Immature' firms struggling to manage credential compromise

28 Feb 2019

It’s highly likely that a data breach will involve some kind of privileged credential abuse but it’s still one security issue that is being overlooked by many organizations.

That’s according to research from Centrify, which polled 1000 IT decision makers across the United States and United Kingdom. Those decision makers admitted that 74% of breaches involved compromised access to privileged credentials – yet most of them are still extremely immature in their privileged access management (PAM) journey.

That immaturity results in granting employees and other stakeholders too much access and too much privilege to potentially sensitive data and critical infrastructure.

According to the research, 65% of respondents somewhat often share root or privileged access to data and systems; 63% take more than one day to close privileged access to employees who have left their organization; 52% do not use a password vault; and 21% have not implemented multi-factor authentication for privileged administrative access.

Commenting on the findings, Centrify CEO Tim Steinkopf says that Forrester estimated 80% of breaches involve privileged credentials, but now Centrify’s evidence backs that estimate up.

“What’s alarming is that most organizations aren’t taking the most basic steps to reduce their risk of being breached. It’s not surprising that Forrester has found 66% of companies have been breached five or more times."

"It’s well past time to secure privileged access with a Zero Trust approach, and many organizations can significantly harden their security posture with low-hanging fruit like a password vault and multi-factor authentication.”

Despite many modern use cases for privileged credentials, they are still not managed properly.

The research found that 72% of respondents don’t secure containers with privileged access controls; 68% don’t secure network devices (hubs, switches, routers) with privileged access controls;

58% don’t secure big data projects with privileged access controls; and 45% don’t secure cloud workloads with privileged access controls.

“Today’s environment is much different than when all privileged access was constrained to systems and resources inside the network. Privileged access now not only covers infrastructure, databases and network devices, but is extended to cloud environments, Big Data, DevOps, containers and more,” says Steinkopf.

Centrify says IT practitioners should consider that security controls like privileged access management are fundamental enablers of digital transformation.

Gartner predicted Privileged Access Management to be the second-fastest growing segment for information security and risk management spending worldwide in 2019. Gartner also named privileged access management a top 10 security project for 2019.

Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Ensign and IronNet partner to create cyber analytics capabilities
The Singapore-based joint venture will form a Cyber Analytics Center for Excellence focused on securing regional enterprises from sophisticated cyber threats.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.