shutterstock_1271048479.jpg

CUSTOMER CASE

User access screening

Identify your risk hotspots

in a matter of days

Summary

As so many organizations, our client, active in the manufacturing industry, wanted insights in its current IT risk posture. 

They knew they had too little control over the accounts and their accesses, but had no comprehensive overview of the situation. As a result, they didn’t know exactly what the situation was and where the biggest risks were located. That, in turn, kept them from convincing management to free up resources in order to take action.

To help the client, we performed an in-depth analysis of the key access risks residing in and across their most important applications, and provided them with a report including our findings and recommendations. In just 3 days of work, this enabled them to understand their access risks and gave them objective numbers to support decision-making with regard to next steps. 

 
Get the full customer case: User access screening

By filling out this form you agree with our privacy policy.

Approach

  • Focus on actual risk: As opposed to typical IAM assessments, we don't focus on the presence of governance processes, but on the actual IT risk present in the existing accounts and their accesses. This allows the customer to prioritize clean-up efforts for maximal risk reduction and efficiently introduce governance processes later on.

  • Data-driven: We put identity data to work with our dedicated technology allowing for a more cost-efficient but also more in-depth analysis of the IT risk posture.

  • Non-invasive: We conduct the screening without impacting operational systems. There’s no need to deploy agents or make changes to the infrastructure.

 

4 Step Approach

1. 

Define scope: We started with defining the scope of the screening. As our client was particularly concerned about orphaned accounts and their use for attacks such as ransomware, the assessment at least had to cover those applications so that orphaned accounts could be detected. On top of that, we identified the applications where most of the relevant identity data resides. The scope: Active Directory, SAP HR and SAP ERP. They didn’t have a dedicated IAM system yet, otherwise that would have been part of the scope as well.

2. 

Collect data: We then collected and consolidated the relevant identity data from those applications in our platform. To avoid setting up costly data connections specifically for this screening, we quickly imported the data from the standard export formats of these systems (i.e., Excel sheets and CSV files) using our out-of-the-box and custom connectors.

3. 

Analysis: With powerful identity analytics and a comprehensive set of out-of-the-box controls, our platform instantly measures the results for various key access risks (see figure below). For some controls customization took place in terms of modification of some out-of-the-box controls and creation of several new controls specific for their operations.

Which access risks to measure?

In most cases, the screenings we perform include orphaned accounts, privileged accounts, access accumulation, identity hygiene and role hygiene. However, some of our clients also want to assess how well their SoD policies are being followed in practice. That requires different input from the client than the identity data, namely the SoD policies themselves. As a result, this is often considered as a dedicated project. A similar way of working is often followed in case of assessing heavy, overarching specific policies.

4. 

Interpretation: Our platform allowed us to dig a little deeper into the results to investigate the inherent risk associated with the findings. This allowed our team of experts to understand the nature of the risks and enabled them to interpret the results and provide recommendations in terms of priorities.

 
 

Result

We provided our client with a detailed report of the key access risks in just a couple of days and gave them access to our platform so they could dig a little deeper into the results themselves.

 

Impact

Using technology to perform an in-depth analysis gave our client the insights they needed to understand their access risks and enabled them to let others understand them as well.

They used these insights to support the development of the identity roadmap. First stop: clean-up to improve the IT risk posture.

Other cases

shutterstock_739241962.jpg

EMPOWER

Assisted clean-up of access issues

Improve your IT risk posture

Our client wanted to improve its IT risk posture by cleaning up access issues that had accumulated over the years. Instead of pushing this to the future or randomly cleaning up, we used our platform in order to apply a risk-based, data-driven and iterative approach, enabling our client to see value immediately.

shutterstock_1172652481.jpg

UNDERSTAND

Data-driven and incremental approach to SoD

Cost-effective implementation of SoD policy

Defining separation of duty (SoD) rules is traditionally a cumbersome process. Instead, we applied a fundamentally new approach to SoD and provided our client with a first set of SoD rules in just a few weeks.

shutterstock_525921169.jpg

AUTOMATION

Designing a role model in 2 days instead of 12 months

A cost-effective approach to role model design

To help our client assign access rights in a more structured way, we provided our client with a suitable role model in just 2 days by applying a data-driven and iterative approach.

THE IDENTITY INTELLIGENCE COMPANY

Looking for help? Get in touch with us

MAIL US

info@elimity.com

We are happy to answer!

CALL US

Global offices

EU +32 474 907 266
UK +44 2071 297 069

FIND US

Corporate Headquarters

Motstraat 30

2800 Mechelen

Belgium

© 2021 Elimity NV. All rights reserved. Elimity, the Elimity logo and all techniques are trademarks or registered trademarks of Elimity NV, in the EU and/or other countries.
All other products or services are trademarks of their respective companies.