The evolution of privilege: How to secure your organization in an era of escalating workforce privileges
SC Magazine
|
Contributed by: Drex DeFord
Summary
Today's workplace complexities have blurred the lines between standard and privileged user accounts, with many non-administrative roles requiring access to sensitive data and applications. CyberArk's CEO, Matt Cohen, emphasizes that any identity can become privileged under certain circumstances, highlighting the shifting nature of cyber security threats. Hackers exploit outdated authentication methods, with over half of workforce identities having access to critical systems, according to CyberArk's Amita Potnis. This situation necessitates a move beyond traditional security measures to modern Identity and Access Management (IAM) solutions that enforce least privilege access and manage all user accounts, mitigating risks associated with elevated privileges. The article discusses various scenarios where regular users gain unintended privileges, and how attackers exploit these "privilege creeps." To combat these vulnerabilities, organizations are encouraged to implement stronger authentication protocols, such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO), and adopt a zero-trust network model and AI-assisted IAM platforms to ensure secure and appropriate access.