Managing Endpoint Access Risk
According to Verizon Research, 30% of breaches stem from internal actors. Managing their access is about more than assigning permissions. It requires accounting for risk and determining what is necessary to grant access. Part of this calculation should account for the endpoint risk from which they request access – and what happens “if” access is granted. This anticipatory response considers the what-if scenario and then makes recommendations based on that information.
Endpoint asset risk is crucial because it sets the foundation for all actions taken moving forward. Consider when you need privileged access or are an administrator for a server. In this case, the level of risk depends on multiple factors. If you log in from a personal device, and that device is behind on patches or using an untrusted network, it creates a high-risk situation. This context is evaluated along with the risk associated with the asset and the risk from the user. User risk takes into account their existing access, account existing policies, and organizational controls in place. Without this information, data could be compromised in transit and at the endpoint, even if the access would typically be appropriate.
Auto Approvals Reduce Rubber Stamping
Within Identity Governance and Administration (IGA) and Privileged Access Management (PAM), the approvals process can be streamlined with anticipatory design to reduce rubber stamping. By evaluating the context of the identity, a solution can make intelligent risk-based decisions. This information pulls together user risk, endpoint risk and asset risk. Doing so helps to set a threshold for auto-approval. Artificial intelligence (AI) and machine learning (ML) ingest and process all of this information accordingly.
Consider a vendor needing access to do routine system maintenance. They require limited administrative access, scoped explicitly for this task. Using AI/ML, the solution learns this vendor was granted scoped privileged access multiple times; therefore, the request is auto-approved. This streamlines the requestor’s access and saves the approver from having to review this low-risk request.
Verification & Certification Cross Checks
Anticipation can also come into play determining access retention. In the certification process, decision-makers verify existing access to assess appropriateness. The traditional spreadsheets and managerial reviews make this time-consuming and complicated — making the risk of rubber-stamping increases for repetitive tasks. Removing access is avoided on the assumption it will be requested again. This leaves the organization with excessive access issues or halts productivity.
An anticipatory system reviews usage and leverages peer analytics to offer contextual information and risk level. The approver sees this cross-checked against policies and regulations to ensure the roles and permissions are appropriate. Placing this information at the approver’s fingertips provides clear guidance on what is needed vs. what is excessive. This way, they can quickly and efficiently make reasonable choices without over or under-permission a user – reducing wasted time and frustration for both approvers and users.