'Immature' firms struggling to manage credential compromise
FYI, this story is more than a year old
It’s highly likely that a data breach will involve some kind of privileged credential abuse but it’s still one security issue that is being overlooked by many organizations.
That’s according to research from Centrify, which polled 1000 IT decision makers across the United States and United Kingdom. Those decision makers admitted that 74% of breaches involved compromised access to privileged credentials – yet most of them are still extremely immature in their privileged access management (PAM) journey.
That immaturity results in granting employees and other stakeholders too much access and too much privilege to potentially sensitive data and critical infrastructure.
According to the research, 65% of respondents somewhat often share root or privileged access to data and systems; 63% take more than one day to close privileged access to employees who have left their organization; 52% do not use a password vault; and 21% have not implemented multi-factor authentication for privileged administrative access.
Commenting on the findings, Centrify CEO Tim Steinkopf says that Forrester estimated 80% of breaches involve privileged credentials, but now Centrify’s evidence backs that estimate up.
“What’s alarming is that most organizations aren’t taking the most basic steps to reduce their risk of being breached. It’s not surprising that Forrester has found 66% of companies have been breached five or more times."
"It’s well past time to secure privileged access with a Zero Trust approach, and many organizations can significantly harden their security posture with low-hanging fruit like a password vault and multi-factor authentication.”
Despite many modern use cases for privileged credentials, they are still not managed properly.
The research found that 72% of respondents don’t secure containers with privileged access controls; 68% don’t secure network devices (hubs, switches, routers) with privileged access controls;
58% don’t secure big data projects with privileged access controls; and 45% don’t secure cloud workloads with privileged access controls.
“Today’s environment is much different than when all privileged access was constrained to systems and resources inside the network. Privileged access now not only covers infrastructure, databases and network devices, but is extended to cloud environments, Big Data, DevOps, containers and more,” says Steinkopf.
Centrify says IT practitioners should consider that security controls like privileged access management are fundamental enablers of digital transformation.
Gartner predicted Privileged Access Management to be the second-fastest growing segment for information security and risk management spending worldwide in 2019. Gartner also named privileged access management a top 10 security project for 2019.