Key findings of the Ponemon Institute study revealed that:
- Fifty-two percent of respondents indicated that they are at least likely to be provided with access to restricted, confidential information beyond the requirements of their position.
- More than 60 percent reported that privileged users access sensitive or confidential data out of curiosity, not job function.
- Customer information and general business data are at the highest risk, and the most threatened applications included mobile, social media and business unit specific applications.
Organizations attempt to maintain control over the issue in different ways. Twenty-seven percent say their organizations use technology-based identity and access controls to detect the sharing of system administration access rights or root-level access rights by privileged users, and 24 percent say they combine technology with process. However, 15 percent admit access is not really controlled and 11 percent say they are unable to detect sharing of access rights.
“This study spotlights risks that organizations don’t view with the same tenacity as critical patches, perimeter defense and other security issues, yet it represents a major access point to sensitive information,” said Tom Reilly, vice president and general manager, Enterprise Security Products, HP. “The results clearly emphasize the need for better access policy management, as well as advanced security intelligence solutions, such as identity and privileged user context, to improve core security monitoring.”
The global survey focused on more than 5,000 IT operations and security managers across the Australia, Brazil, France, Germany, Hong Kong, India, Italy, Japan, Korea, Singapore, Spain, United Kingdom and United States. Other key findings include:
- Top barriers to enforcing privileged user access rights are the inability to keep pace with change requests, inconsistent approval processes, high costs of monitoring and difficulty in validating access changes.
- Areas for improvement include monitoring privileged users’ access when entering root-level administrative activity, identifying policy violations and enforcing policies across an entire organization.
- The potential for privileged access abuse varies from country to country based on responses, with France, Hong Kong and Italy having the greatest potential, and Germany, Japan and Singapore having the least.
- Nearly 80 percent of respondents reported that deploying a security information and event management (SIEM) solution was critical to governing, managing and controlling privileged user access rights.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.