logo
5 Common Mistakes In Identity Security, And How To Fix Them

5 Common Mistakes In Identity Security, And How To Fix Them

TECHx6 hours ago
Home » Expert opinion » 5 Common Mistakes In Identity Security, And How To Fix Them
Identity security is more vital than ever. Morey J. Haber reveals key oversights companies make and offers solutions to reduce risks and prevent breaches.
A modern organization carries with it so much IT complexity that cyber-threat actors no longer favor traditional hacking; they prefer to log in. This makes identities the primary attack vector for our digital adversaries, which means we must give the protection of credentials and secrets equal priority to that of vulnerabilities and patch management.
A report from June 2024 claimed 99% of UAE-based organizations experienced 'two or more identity-related breaches' in the preceding year. Organizations can no longer ignore the need for identity security in the face of an increasingly sophisticated threat landscape. A risk-management approach to identity and access-management solutions will be critical if enterprises are to take control of the entire life-cycle of identity tools and their cross-vendor integration. This methodology can uncover flaws buried within workflows and solutions that have been in production for years. If these legacy problems persist in the current threat climate, it may only be a matter of time before a breach occurs. We now have to consider identity security as a part of our everyday operations.
In establishing stronger identity security and management, it is advisable to account for the most common errors first. Consider the top five of them:
1. Ownership
Identity in the digital realm can apply to either a human or a machine, each of which has an account through which they own that identity. Humans may have multiple accounts, but when dealing with machine identities, a human should always be assigned as the owner. Machine identities include all associated accounts that are used for integrations, service accounts, and other machine to machine communication. Any operation or session that requires authentication should be covered by identity management.
A common mistake is the failure to include the ownership of machine accounts as something to be monitored and managed. In many cases the owners of service accounts, cloud-based secrets, or integration credentials are not documented, and therefore the business is simply not aware of them. Unmanaged and unmonitored, these accounts can be associated with delays in response when events occur. This is a risk that can be mitigated by recording an owner for every machine identity, and by regularly reviewing these records for accuracy. This is especially true for dynamic environments that may have regular changes in personnel and technology.
2. Privilege
Every account associated with an identity is granted entitlements that can range from email, to storage, and Internet access all the way up to administrators, which are the custodians of the organization's most sensitive information. It is not uncommon to find the highest level privileges assigned, for convenience only, to those who do not need them, which expands the risk surface substantially. Many breaches start with the targeting of junior employees. For threat actors, lateral movement is easier if they find the privileges they need without the need to find a vehicle for privileged escalation.
The principle of least privilege calls for IT administrators to assign only the required privileges necessary for an account's owner to perform assigned functions. This eliminates overprivileged accounts and shrinks the risk surface by ensuring threat actors are less likely to be assigned high-level credentials on the first account they hijack.
3. Secrets
Any information not widely disclosed that provides authentication is known as a secret. These can be everything from a password to an API key. Their storage, reference, and retrieval must be highly secure to prevent threat actors from compromising them. Common errors in secret storage include using unencrypted spreadsheets or text files, or even browser-based password managers. All these methods have their weaknesses and should be avoided. It is recommended to use a secure password or secrets-storage solution, and strictly manage access to it. Additionally, it is recommended that the storage solution itself be periodically tested for vulnerabilities.
4. MFA
To complement secrets, extra confidence in the identity-account relationship can be provided through multifactor authentication. While it is important for organizations to remember that many MFA solutions are flawed (SMS attacks, MFA fatigue, etc.). it is also true that any multifactor authentication is better than none. All human identities should have multifactor authentication implemented for each account they own, and it should also be in place for all access requests including any escalation of privilege requests.
5. Remoting
Many UAE organizations have established flexible working practices that allow employees to access corporate systems remotely. This access commonly extends to contractors, vendors and other user types, regardless of geolocation. The range of cloud services available through remote access is expanding every day, which presents a challenge to those tasked with providing enterprise-wide identity security. This is because each of these services requires some level of access to sensitive data, which means an associated identity must be managed.
Organizations must make sure they secure all remote access channels using industry best practices. They must also avoid using remote access technologies like RDP, SSH and FTP. RDP (Remote Desktop Protocol) and SSH (Secure Shell) do not adequately guard against simple brute-force attacks or credential stuffing and FTP (File Transfer Protocol) lacks encryption, leaving it open to eavesdropping and man-in-the-middle attacks. While these solutions can be used more securely with careful configuration, a more secure approach is to implement dedicated technology that is designed around the prevention of identity-based attacks.
The right controls
Perimeter security has become almost obsolete. Firewalls and other intrusion prevention systems are being replaced by solutions that mitigate modern attack vectors – identities. We live much of our lives in and around our digital identity and each of us has several accounts tied to it. Meanwhile, machine identities need ownership to allow their usage and maintenance to be appropriately monitored. But both human and machine identities, while indispensable, represent points of weakness if the right identity security controls are not in place.
Part of the maturity of any security model should be the mitigation of the common errors discussed here. The world has become irreversibly connected and our digital identities are part of that fabric. To protect them is to protect ourselves, our businesses, and our economies.
By Morey J. Haber, Chief Security Advisor, BeyondTrust
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft to cut about 4% of jobs amid hefty investments in AI
Microsoft to cut about 4% of jobs amid hefty investments in AI

Gulf Today

time2 hours ago

  • Gulf Today

Microsoft to cut about 4% of jobs amid hefty investments in AI

Microsoft will lay off nearly 4% of its workforce, the company said on Wednesday, in the latest job cuts as the tech giant looks to rein in costs amid hefty investments in artificial intelligence infrastructure. The company, which had about 228,000 employees worldwide as of June 2024, had announced layoffs in May, affecting around 6,000 workers. It was planning to cut thousands of jobs, particularly in sales, Bloomberg News reported last month. The Windows maker had pledged $80 billion in capital spending for its fiscal year 2025. However, the soaring cost of scaling its AI infrastructure has weighed on its margins, with its June quarter cloud margin expected to shrink from last year. Microsoft said on Wednesday it planned to reduce organisational layers with fewer managers and streamline its products, procedures and roles. The Seattle Times first reported on the layoffs earlier on Wednesday. Separately, Bloomberg News reported Microsoft's Barcelona-based King division, which makes the Candy Crush video game, is cutting 10% of its staff, or about 200 jobs. Microsoft confirmed to Reuters that its gaming division was impacted by the layoffs, although not the majority of the unit, but did not provide further details. Big Tech peers, which are investing heavily in artificial intelligence, have also announced job cuts. Facebook parent Meta earlier this year said it would trim about 5% of its "lowest performers", while Alphabet's Google has also laid off hundreds of employees in the past year. Amazon has also cut jobs across its business segments, most recently in its books division. The company had earlier laid off employees in its devices and services unit, and communications staff. Economic uncertainties and rising costs have triggered layoffs across sectors in Corporate America, as companies rush to streamline operations and hedge against further cost pressures. Reuters

flydubai just made travel easier for its pilots,crew: Here's how
flydubai just made travel easier for its pilots,crew: Here's how

Gulf Business

time2 hours ago

  • Gulf Business

flydubai just made travel easier for its pilots,crew: Here's how

Image credit: Dubai Media Office/Website In a move to enhance operational efficiency and embrace cutting-edge technology, Read- The new biometric smart gates have been installed at the airline's Airport Operations Centre and are designed to streamline immigration processes through advanced facial recognition, AI-powered verification, and real-time data integration. This technology provides a faster, more secure, and paperless experience for crew members reporting for duty. Seamless travel experience through smart technology Thani Alzaffin, group CEO of emaratech, said the partnership marks a major milestone in modernizing border control systems. 'We are proud to partner with flydubai in pioneering a next-generation, paperless immigration experience for their crew members,' said Alzaffin. 'Through AI-powered facial recognition, our smart gates integrate seamlessly with both flydubai's and immigration's platforms, enabling real-time validation and a truly frictionless journey.' He added that the initiative reflects emaratech's broader goal to redefine border control using artificial intelligence to deliver smarter, faster, and more secure checkpoints. Supporting operational growth and efficiency flydubai's chief procurement and technology officer, Mohammed Hareb AlMheiri, emphasised the importance of technology in driving operational improvements. 'We are pleased to have partnered with emaratech to implement this innovative solution for our pilots and cabin crew,' said AlMheiri. 'As we continue to grow, we seek technologies that boost efficiency. These biometric smart gates represent another step toward seamless and secure operations as we future-proof our systems.' A total of six smart biometric gates have been installed, providing direct access to immigration clearance for crew members prior to flight departures. A growing network and workforce The initiative is part of flydubai's broader investment in technology to support its frontline staff and operational goals. The airline currently serves more than 135 destinations with a modern fleet of 89 aircraft. Its workforce exceeds 6,400 employees, including over 1,300 pilots and 2,500 cabin crew.

Google launches Veo 3 on Gemini in MENA
Google launches Veo 3 on Gemini in MENA

Tahawul Tech

time2 hours ago

  • Tahawul Tech

Google launches Veo 3 on Gemini in MENA

Google AI Pro subscribers can now create videos using the latest model on Gemini. Dubai — Google announced today the launch of Veo 3, Google's state-of-the-art video generation model that enables people to bring their creative vision to life through a mesmerising combination of visuals and sound. Veo 3 is now accessible to all Google AI Pro subscribers across the region. With Veo 3 now built into the Gemini app, people can write the scene they want to watch. This description is called a 'prompt' and with it, Veo 3 will whip up a custom eight-second video complete with sound, dialogue, and music, at 720p output. Veo 3 was released at Google's annual event for developers, Google I/O, last May. Veo 3 lets users add sound effects, ambient noise, and even dialogue to their creations – generating all audio natively. It also delivers best in class quality, excelling in physics, realism and prompt adherence. The SynthID watermark is embedded in all content generated by Google's generative AI models, including Veo 3. Google recently rolled out SynthID Detector to early testers, and aims to expand access soon. As an additional step to help people identify AI-generated content, a visible watermark will be added to all videos generated by the video model, except for videos generated by Ultra members in Flow, Google's latest tool for AI filmmakers. People can subscribe to Google AI Pro to try out Veo 3, starting today.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store