Wednesday, May 27, 2020

SecurEnds: Are you ready for Access Review Audit?

One of the biggest issues that auditors discover is that application users are granted inappropriate access. This is due to multiple reasons. Most employees ask for more access than they need to do their job thus leading to excessive privileges. A typical product or service company is in a mad rush to innovate and deliver newer products and services. Unfortunately, often times in hate to meet project timelines, managers lax the access governance rules. Most often than not these mistakes are attributed to manager’s lack of understanding of organization policies and procedures rather than willful omission.
Cloning new employee’s user access after another employee is another anti pattern. Say Jenna, a new hire, has her access modeled after Jody, who has been in the company for ten years. Unless Jody’s privileges have been right aligned to her current role, Jenna will have excess privileges into systems, file shares etc.
Poorly designed roles can also lead to access issues such as too much or too little access being granted. Roles should be aligned with business processes rather than specific users or jobs. Auditors have found situations where contractor is assigned a role which should be only ready only. However, as a part of the annual SOX audit, this role was found to have write capabilities as well.
Below are few leading practices from Auditor’s point to view to help organizations implement better security, efficiency and compliance.
Formalize Process For User Access Review: Audit findings can lead to monetary loss and tarnish reputation. Organizations must have a formal process — collect data across all applications periodically, application owners review user entitlements and formal documentation of any remediation. Manual access review, though not ideal, is better than not having one.
Enforce Segregation of Duties (SOD) & Least Privileges: Every role and entitlement should be created with least privileges and evaluated for SOD violation. Giving people minimum level of access that they need to do their job ensures there is no policy violation down the road. Auditors are looking for evidence that SOD controls are in place to prevent fraud.
Special Treatment for Privileged Accounts: Once a cyber criminal gets past the endpoint it is only a matter of time before they gain access to privileged accounts. Every organization must adopt a zero-trust mindset for these accounts. Privileged account creation, modification and deletion should be codified as an automated process. Many auditors recommend creating privileged account with a predefined expiry date. Above all access to these accounts should be evaluated periodically to know who has access to what.
Manage Adhoc Privileges: Users working on special projects may need evaluated privileges. Auditors recommend that such requests be throughly vetted in scope (read, write etc) and duration for which the access is needed.
Maintain Proof Of Compliance: Auditors require proof of compliance to finalize the audit. Organization need to ensure documentation exist for audit trails etc. If there were any audit findings in the previous year and have not been remediated, auditors recommend organizations maintain this documentation.
SecurEnds is leading the market with its lightweight, highly configurable and industry first flex-connector product that keeps companies secure while meeting audit and compliance requirements. Our software allows you to load user data from multiple system of record, connect dynamically to applications, match identities with user credentials, manage heartbeat identities across connected and disconnected, schedule one-time or periodic access recertification and create proof of compliance for external auditors. In only 30 minutes we can demo why our SAAS software is now a leading choice for identity governnce
Read More:

What is Access Review? How to do Access Review?


Many organizations are bound by regulatory requirements such as SOX, FFIEC, ISO 27001, PCI- DSS, and HIPAA etc to undertake user access reviews. When auditors review IT systems for compliance, they typically look for the proof of controls for following items:
  1. Access is created using principle of least privilege.
  2. Evidence for ongoing or periodic review of user entitlements (credentials and permissions)
  3. Ability to undertake remediation workflow and timely notification to application owners if access needs to be removed
  4. Generate proof of compliance reports for external auditors.

How to do Access Recertification?
No matter the compliance standard, the process remains the same. Access reviews are an important part of a company’s security architecture when it comes to user account access to sensitive data.
First step is to obtain the employees, vendor and contractor information from the system of record so it can serve as the single source of truth for identities.
Second step is to extract different types of user accounts, service accounts and their entitlements across the systems, databases and folders in scope for the review. Privileged accounts need a special type of review treatment as their abuse can lead to significant damage. Thereafter, matched identities of users are sending to their managers to review and attest. Any access remediation needs to happened post review.
What tools to use for Access Recertification?
Manual review is one way to do access reviews. However, enterprise application sprawl has expanded greatly. As per McAfee average enterprise has 464 custom applications deployed today. Okta’s research reveals an average of 129 SSO applications per company. Netskope has founds close to 1000 cloud services used per company. It takes weeks of data collection and then manual transformation followed by back and forth emails communications asking managers to approve or reject access for their employees. Many companies use complex spreadsheets, SQL reporting and laborious manual cross-checking procedures but this is very time-consuming and often unreliable. Alternatively, companies can automate the entire process using either homegrown system or buying off the self governance software. Homegrown systems don’t scale well, get outdated pretty quickly and come at the expense of taking away development resources from revenue generating activities. The biggest advantages of going with off the shelf solution are it keeps up with standards and changes. Off the shelf software is a great way to go if organizations can plan around the total cost of ownership.

Tuesday, May 19, 2020

What is Access Recertification 101?

Access Review. Entitlement Review. Access Recertification. User Attestation.  – 


Different terms but each provides IT and internal audit teams an ability to see what employee or contractor has access to what resource across the company assets. User Access reviews is way for organizations to maintain, uphold IT controls and comply with regulations. Not all companies have an internal audit team, but every company, no matter how small does some risk assessment. Many organizations are bound by regulatory requirements such as SOX, FFIEC, ISO 27001, PCI- DSS, and HIPAA etc to undertake access reviews.


When auditors review IT Security Access Control Compliance, they typically look for the proof of controls for following items:


  1. Access is created using principle of least privilege.
  2. Evidence for ongoing or periodic review of user entitlements (credentials and permissions)
  3. Ability to undertake remediation workflow and timely notification to application owners if access needs to be removed
  4. Generate proof of compliance reports for external auditors.


How to do Access Recertification 101?


No matter the compliance standard, the process remains the same. Access reviews are an important part of a company’s security architecture when it comes to user account access to sensitive data. First step is to obtain the employees, vendor and contractor information from the system of record so it can serve as the single source of truth for identities. Second step is to extract different types of user accounts, service accounts and their entitlements across the systems, databases and folders in scope for the review. Privileged accounts need a special type of review treatment as their abuse can lead to significant damage. Thereafter, matched identities of users are sending to their managers to review and attest. Any access remediation needs to post review.


What tools to use for Access Recertification 101?


Manual review is one way to do access reviews. However, enterprise application sprawl has expanded greatly. As per McAfee average enterprise has 464 custom applications deployed today. Okta’s research reveals an average of 129 SSO applications per company. Netskope has founds close to 1000 cloud services used per company. 

Why organizations continue to do manual access reviews?

“Manual access reviews are a pain”. We keep hearing this sentiment from CISO(s) and security heads as they grapple to comply with ever growing regulatory standards -HIPAA, SOX, CCPA, GDPR, ISO 27001, FISMA and PCI. Additionally, emailing spreadsheets of user account data to managers or application owners leads to user frustration, and is often prone to error. 

Every minute spent on manual access review, certification and attestation is time away from creating value for business. Then, why do companies continue to do manual reviews? Well, simply put, organizations are looking for products that are easy to configure and provide accelerated value to the business owner.

Many global organizations are using our product to:

  1. Strengthen security posture by eliminating orphaned accounts
  2. Preserve brand reputation during Mergers & Acquisitions (M&A)
  3. Convert existing identity access management (IAM) such as Okta to complete Identity Governance Administration (IGA) solutions
  4. Provision and de-provision accounts in HR systems such as Workday, Paycom etc.

SecurEnds provides ease of use, efficiency and gives its customers mastery over access reviews, access certifications and attestations. With our industry leading features you can achieve the following:

Access Certification : automate inadequate and/or time-consuming manual access certification, user attestations etc to meet security compliance and internal IT control requirements

Audit Evidence : demonstrate compliance with standards and provide proof-of-compliance using pre-defined audit reports, audit trail mechanisms and certification of access.

Automate Provisioning and De-provisioning : streamline the review and verification (or revocation) of user’s access to different apps and resources.

For More Information, Please go through the following link:


To learn more about disruptive products set up a demo and begin automating your access reviews and certifications.

Wednesday, May 6, 2020

What is identity governance and access life cycle?


Enterprises have sensitive data stored and accessed through applications, databases, network devices, files and cloud apps in multiple business applications around the world. Identity governance is a mechanism to identify who has access to sensitive data and applications to prevent unauthorized users and orphaned users across the enterprise. Identity governance enforces access life cycle management process, right from granting access and periodically reviewing access privileges and revokes access privileges when user terminated. The process enables a centralized system where you have a workflow to manage user access reviews and entitlements at a single place for internal governance and auditing and for an external audit to review the user access controls.

Identity governance requires complete view off when user created, who has given access privileges, who is monitoring user privileges, entitlement and who is revoking access to these users. Identity governance and identity access management are two different product lines identity governance deals with access control compliance and user privileges and entitlement reviews. The identity governance is so important in the corporations to get a complete view of user privileges crossed the enterprise to minimize security breaches with insider threat.

SecurEnds Identity Governance and Access Control

There is a way to implement identity governance for enterprise systems even if they are not integrated with the access management system or single sign-on systems. SecurEnds identity governance and access control compliance product integrates with any system in the enterprise to create access control workflow by integrating with endpoints such as Active Directory, SharePoint, Office 365, Salesforce, SAP, AWS, Azure, Google Drive, Dropbox, GitHub, Jira, ServiceNow, etc.

This product can be configured to extract user credentials and entitlement details from endpoints both manually and automatic and matches with the HR user data to create IAM users at a centralized repository for managers to review. It provides identity governance to the user access reviews and allows updates to the user access privileges to complete the access management workflow.
Key features of the product to show evidence for managing Identity Governance and Access Control for Information Security Compliance
  • Manage and track access provisioning for new users
  • Limit users and access points to confidential data
  • Consolidated view of user access rights
  • Periodic user access and entitlement review
  • Eliminate unauthorized or orphaned users
  • Manage user access de-provisioning
  • User access certification

SecurEnds: How to Automate User Access Reviews

User Access Review:
Compliance management has become an integral part of any organization’s business. Combined with a growing sense of cyber-(in) security, companies need to constantly monitor risks, correct issues and demonstrate control.
User Access Review (UAR) is the only way to ensure traceability and accountability of user entitlement across infrastructure, data and application resources. With Brainwave GRC, define and implement a review strategy that combines efficiency and productivity.
SecurEnds provides cutting-edge solution to automate User Access Reviews with a great UI and quick setup to add value to the information security and compliance teams.
  1. Easy to configure connectors to connect to standard applications and custom connectors to custom applications to extract users and entitlement data.
  2. If connectors are not needed, upload a CSV file with users and entitlement data to perform reviews.
  3. Match all application users to HR/System of Record.
  4. Schedule periodic and onetime access review campaigns for applications.
  5. Managers/Reviewers to perform access reviews at a secured portal.
  6. Complete access certification and generate audit reports for access attestation.
  7. Show that has access to what across your enterprise.
  8. Rapid implementation using SecurEnds SaaS offering.

For More Information, Please go through the website: