Cybersecurity In-Depth: Getting answers to questions about IT security threats and best practices from trusted cybersecurity professionals and industry experts.
How Do I Reduce the Risk of an Insider Threat?
The principle of least level of access gives employees just the privileges they need to do their jobs. Limiting what an employee can do is a core tenet of zero trust.
Question: How can I reduce the risk of an insider threat for my organization?
Ash Devata, general manager, Cisco Zero Trust and Duo Security: Having a framework to provide the least level of access (a core tenet of the best zero-trust models) is a good start to reducing the risk of an insider threat. A lot of organizations give excessive access to employees because it’s the easier thing to do. For example, they may copy access controls from employee to employee. So, when Kelly got hired into the marketing department, he was given a set level of access controls. Then Sam got hired into a similar role and the access controls were copied — but a short time later, Sam moved into a new department, then into a more senior role. Charlie was hired to backfill Sam’s role and was given the same permissions as Sam, because copying the access controls is easier, but certainly not less risky.
Active monitoring is also helpful, but companies need to be cautious in thinking about how they manage false positives and what you're actually monitoring for. If you are actively monitoring, you need to take privacy implications into consideration and the process you'll go through if you do find something wrong. What's more, if you’re blocking things, will it inhibit a business process? For example, if you block SMS via email and don’t realize that a portion of your sales team communicates directly with customers in that manner, you could be inadvertently inhibiting a business process.
About the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024