The strength of regular access reviews

Netwrix, a cybersecurity vendor that makes data security easy, asked 590 IT pros whether and how they review user access permissions. The survey found that 90 per cent of organisations either already periodically review access entitlements or plan to start doing so within three years.

However, most respondents (81 per cent) admit that they perform access reviews manually.

“Manual review is the most unreliable and time-consuming way of keeping permissions up to date,” says Joe Dibley, security researcher at Netwrix. “An email or instant message from some department head confirming access rights usually satisfies neither internal nor external auditors. Moreover, this approach increases the chance of human error — it’s too easy to forget about someone’s answer or miss the email altogether.”

Moreover, in 41 per cent of organisations, IT teams review user access rights not only manually but on their own, without involving business users at all.

“IT teams generally are not in a position to know exactly who needs what access to which IT resources. As a result, the organisation not only does fail to properly enforce least privilege, but the helpdesk is overwhelmed by requests from business users and data owners to update access rights,” comments Dibley.

The respondents who already have a dedicated tool for reviewing user access rights were then asked what they consider to be the biggest benefit of that solution. 49 per cent of them named risk reduction and 28 per cent chose time-savings.

“Automating access reviews reduces cybersecurity risks directly, by ensuring regular update of users’ rights — and indirectly as well: eliminating manual tasks frees up IT teams to focus on other critical activities, like investigating security incidents before they turn into breaches,” adds Dibley.

SailPoint introduces a novel AI governance solution to monitor and control unauthorised AI tool...
StorMagic partners with HiveRadar to deliver an edge computing solution for secure,...
Rapid7's latest report highlights the shrinking timelines in cyber threat landscapes and...
Flare introduces Foretrace, providing employees with tools to help monitor and address personal...
Keysight's SBOM Manager seeks to aid organisations in meeting global cybersecurity and software...
Ping Identity introduces “Identity for AI,” extending identity and access control to autonomous...
Huntress expands its Managed ITDR coverage to Google Workspace, providing organisations with...
DigiCert updates its Document Trust Manager to support document security and global compliance as...