November 16, 2015 By Nick Oropall 2 min read

Companies worldwide are trying to figure out new ways — and optimize already proven methods — of retaining employees. But did you know that employee retention can lead to security vulnerabilities? Fortunately, identity governance can help.

Employee Retention Can Make a Mess

When employees stay with a company for a long time, they change job roles, work on special projects and get promotions. This is great for the employees and their experience, but it can lead to problems with their user access. User access is added for new jobs, new roles, special projects and promotions, but in many cases, it is not taken away. When a user continues to aggregate this access, he or she can become a super-user of sorts and may end up with segregation of duties violations, otherwise known as a toxic combination of access.

A segregation of duties (SoD) violation is when a user has access to two entitlements that can create a conflict of interest. For example, a user may be able to create vendors and also pay vendors. This constitutes a violation because, theoretically, malicious users could create a vendor with their own bank account information and then subsequently pay that vendor.

This SoD violation would be a compliance issue as well as a serious security threat. There needs to be a set of checks and balances in place, along with a security solution that can monitor those checks and balances for accuracy.

Additionally, if an overentitled user’s account is compromised by an attacker, that account could become the keys to the kingdom. Not only would the attacker have access to real credentials, but credentials that have more access than they should. If those accounts aren’t being properly managed and governed, they could present a considerable threat to data security.

Finding an Identity Governance Solution

The right identity governance solution can help to solve this retention problem and prevent entitlements creep. It is critical to use a tool that can not only identify current segregation of duties violations, but also put processes in place to prevent them from arising in the future. When a user gets a new job role or promotion, their old entitlements should be re-evaluated and recertified.

Additionally, when users gain new entitlements for their new job role, they should be analyzed and compared with their past entitlements. If this new entitlement comprises an SoD violation with any of their old entitlements, the user should not be given access to it. It is critical to prioritize risks associated with user access in order to remain compliant and secure the organization. The right identity governance solution can make that easy.

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today