Security Program Spring Cleaning - Part 2 of 3

Security Program Spring Cleaning - Part 2 of 3

Last week I kicked off a series of “Spring Cleaning” security tips to freshen up those dusty networks; we moved the furniture and vacuumed behind the couch. Now break out the steam cleaner! The boundaries between access to public/private cloud resources and internally hosted data are now blurred beyond recognition. Identity and Access management did not grow into a multi-billion dollar industry by accident. 

Deep Clean - System Access Review
When it comes to your organization’s highly-integrated and complex federated identity systems — with as many horizontal and diagonal domain linkages as spider webs in your rafters — access review requires breaking out the industrial grade cleaner. Managing identity has become the front lines in a cloud-first environment. How many systems of record do you have? Do you have a comprehensive streamlined on-boarding and off-boarding process? Which clouds hold data that you are responsible for?

Take the time to audit your current access polices and determine if they make sense. All organizations start of with very liberal access policies because they frankly do not know what each person needs to accomplish their job. Rather than be the blocker, IAM starts with allow all employees. But many times, access can be scaled back in various job functions. In the public/private cloud space this effort is comprised of evaluating both internal systems and cloud vendors alike. Without getting into an overly burdensome IAM discussion let’s take a look at your role and identity management system with a critical eye.

To-do To-day List:

  • Review your organization’s API Key management strategy. What happens if one of your developers is out at the bar after work and has her laptop stolen out from under the table? Aside from the drive encryption questions, how do you revoke her API keys?  
  • Assess your cloud vendor (AWS, Azure, ServiceNow, etc.) IAM groups and roles. If you’re not using defined roles with your PaaS/IaaS stop now. Do not pass ‘GO’. Do not collect $200.
  • Audit your source code access. Can you confidently state who does and who does not have access?
  • Review legacy internal systems’ role-based access control.  If your legacy system has inadequate RBAC, engineer a solution to instrument the limited logging and controls available so you know when there’s something out of the ordinary.
  • Evaluate third-party access (vendor, partner etc.) for last login date. If you don’t have sensors that can give you this basic data, it’s time to start installing some.

Next week we’ll polish the balustrade and conclude our fun little program review with a look at our governance, documentation, and controls mapping. All you policy wonks and GRC folks get ready with those white gloves - we’re going to do the needful with a little fussy risk talk! 

To view or add a comment, sign in

More articles by Josh Lemos

  • Given Enough AIs, All Bugs Are Shallow

    We're in the best era ever for finding security vulnerabilities quickly and at scale. Linus' Law, Eric Raymond's famous…

    9 Comments
  • Agents of Order - Agentic Defense

    The AI landscape continues to transform at a blistering pace. Over the past year, I often hypothesized the asymmetric…

    14 Comments
  • AuthZ Agent of Chaos: MCP

    There’s a lot of excitement around agentic AI open protocols such as Model Context Protocol (MCP) and Agent2Agent…

    5 Comments
  • AuthZ Agents of Chaos

    The emergence of agentic AI represents a significant inflection point in computing that requires strategic…

    8 Comments
  • Authorization - The Forgotten Second A

    It seems that everyone in InfoSec is focused on solving three problems: identity, identity, and identity. Its the Who…

    3 Comments
  • Death of Traditional Penetration Testing

    Yes, another $something is dead article. What I mean is the traditional one-size-fits-all cookie-cutter engagement of…

    20 Comments
  • Honeypots - Bringing Stealthy Back

    Deception and passive monitoring have a long history What is new is old: Cuckoo's Egg 2.0 (if you don't know what I'm…

    3 Comments
  • Security Experts Versus the Layperson

    If you are like most technology professionals family and friends come to you for advice on anything tangentially…

    2 Comments
  • Security Program Spring Cleaning - Part 3 of 3

    Now we’ve dusted the bunnies under the furniture, steam cleaned the carpets, and nearly fell asleep reviewing…

    1 Comment
  • Security Program Spring Cleaning - Part 1 of 3

    The weather is warming and as we reach mid-Spring in North America, it is time when one must ask - is my security…

    3 Comments

Others also viewed

Explore content categories