Story image

Widespread mismanagement of privileged accounts and access revealed in global survey

17 Nov 17

Identity and access management (IAM) company One Identity has released new global research that exposes widespread poor practices when it comes to managing privileged accounts.

Dimensional Research recently surveyed 913 IT security professionals on challenges, habits and trends related to managing access to corporate data.

Among the most eye-opening research findings are that eight in 10 (80%) of Australian respondents admit to facing challenges when it comes to managing privileged passwords, and nearly one in five (17%) still use a paper-based logbook to manage privileged accounts in Australia.

These findings are significant considering that privileged accounts grant virtually unlimited access to nearly every component of a company’s IT infrastructure, essentially handing over the keys to a company’s most critical and sensitive systems and data.

The survey also exposed three key areas where distressingly inferior practices for privileged account management occur, including:

●        Management platforms and tools: In addition to 17% of Australian respondents admitting to using paper-based logs, a surprising 34 percent are using equally inadequate spreadsheets for tracking privileged accounts. The survey also found that two-thirds (67%) of companies are relying on two or more tools to manage these accounts -- indicating widespread inconsistency in privileged access management (PAM).

●        Monitoring and visibility: The majority of Australian IT security professionals (71%) admit to only monitoring some privileged accounts, or not monitoring privileged access at all. Even worse, 22% of Australian respondents confessed they are unable to monitor or record activity performed with admin credentials, while 34% said they cannot consistently identify individuals who perform admin activities.

●        Password management and change: Globally, an overwhelming 86% of organizations are not consistently changing the password on their admin accounts after each use. Further, 40% of IT security professionals don’t take the basic best practice of changing a default admin password. By not adhering to these best practices, privileged accounts are vulnerable to open the door to data exfiltration or worse, if compromised.

“Without taking the very basic but essential steps in employing security and management in regard to privileged accounts, organizations are putting themselves at risk to exposing valuable information. By not implementing vital security methods companies continue to put themselves at risk to breaches that will not only have financial implications, but legal implications once the mandatory breach notification legislation comes into play next year,” says Richard Cookes, One Identity ANZ country manager.

“On top of this, companies can also face data theft and irreversible damage to organizational reputations.”

“This survey indicates quite an alarmingly high percentage of IT professionals don’t have proper security practices in place. These findings show how crucial it is for organizations to reassess and implement strong security procedures regarding privileged access management.”

The One Identity Global State of IAM Study consisted of an online survey conducted by Dimensional Research of IT professionals with responsibility for IT security as a major part of their job and were very knowledgeable about IAM.

A wide variety of questions were asked about experiences and challenges with IAM. A total of 913 individuals from the US, Canada, UK, Germany, France, Australia, Singapore and Hong Kong completed the survey.

This report is based on the global study, and One Identity offers a free online executive summary of the data in a Key Findings Report, as well as an illustrated look at the data in an infographic. 

Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.