Rise of human and machine identities boost security policies in organizations [Report]

Rise of human and machine identities boost security policies in organizations [Report]
Mon, 27/06/2022 – 17:31

‘Explosion’ of machine identities

Identity-related breaches continue to be a “massive threat” to organizations as they try to manage the growing number of identities, the IDSA said.

The overwhelming majority (98%) of identity and security professionals say that the number of The number of identities in their organization is growing due to the rise of machine identities, cloud adoption, and third-party relationships (see infographic below).

“Identity management is becoming more and more complicated for organizations…with the continuation of remote work, the increase in relationships with contractors and third parties, and the explosion of machine identities,” said Julie Smith, Executive Director of IDSA in a statement.

Key points to remember

Identity growth continues, making identity a top security priority

  • 98% said the number of identities was increasing, primarily due to cloud adoption, third-party relationships, and machine identities
  • 94% said identity investments are part of strategic initiatives, including cloud adoption (62%), zero trust implementation (51%) and digital transformation initiatives (42%)
  • 64% of respondents say managing and securing identity is one of the top three priorities of their security program

Identity-related attacks are growing and impacting, but can be prevented

  • 84% of respondents said they had experienced an identity breach in the past year
  • 78% cited direct business impacts resulting from the breach, including recovery costs and reputational damage
  • 96% said they could have prevented or minimized the breach by implementing identity-driven security outcomes

Investments in safety outcomes are still ongoing, focus on the basics is lacking

  • 97% said they plan to invest in identity-centric security solutions
  • 51% usually remove a former employee’s access within a day, but only 26% always do so
  • 43% believe implementing multi-factor authentication (MFA) would have made a difference in preventing breaches
Identity and Investment in Zero Trust

Because the traditional network perimeter has been eroded, identity has become a central part of the security strategy for many enterprises, as evidenced by the fact that 64% of respondents said managing and securing the identity are among the top three priorities.

This, in turn, stimulates investment. A total of 94% of identity and security professionals said their identity program had been included as an area of ​​investment in strategic initiatives over the past year related to cloud, Zero Trust, supplier management, digital transformation and cyber insurance.

“Whether it’s better controlling who accesses cloud resources or implementing Zero Trust to enforce the principle of least privilege for a growing army of vendors, many organizations view identity as too important a piece of the puzzle. to be ignored,” the report said.

Source: Identity Defined Security Alliance

Multi-factor authentication moves to the top of the list

Multi-factor authentication (MFA), in the context of a “mitigation strategy”, has moved to the top of the list to prevent breaches. Forty-three percent thought implementing MFA for all users would have made a difference. The other most common responses were more timely reviews of privileged access (41%) and continuous discovery of all user access rights (34%).

Lax deprovisioning

Accounts that no longer have valid owners provide attackers with the opportunity to abuse the trust and privileges granted to previously legitimate users, the IDSA said.

“For this reason, they leave organizations particularly vulnerable to disgruntled former employees who might want to steal data or take other malicious actions,” the report said.

“Other threat actors may also take advantage, as these accounts may not be compliant with security policies and may not have an owner who may notice that their account is being misused.”

Only 51% of organizations surveyed said they typically remove a user’s access company systems the day (35%) or the day after (16%) the employee leaves.

Related Items:

Comments are closed.