Whenever an organization hires a new employee, engages a new contractor, or hires a third party, they need access to essential information, apps and processes that enable them to perform assigned tasks. However, identities are not limited to just human users. Non-Human identities also exist associated with services, systems, SSH keys, API keys, IoT devices, and much more.
As networks and infrastructures grow more complex and cloud access by remote workers more commonplace, it is critical that organizations consider complete Identity Lifecycle Management (ILM) for all these accounts, along with the privileges associated with them.
Provisioning – Setting up new employees, contractors and third parties, as well as machine identities should be governed these days by the principle of least privilege. That means once an identity is verified—Single Sign-On (SSO) and Multi-Factor Authentication (MFA) are typical methods of verification for human users—the user or machine is only given access at the level required to do their job or specific tasks.
Updating/changes – for human user privileges to change, their levels of access to sensitive data should be adjusted accordingly. Role-Based Access Controls (RBAC) dictated by stated policies help to maintain proper user access throughout the identity lifecycle. Revoking access when it’s no longer needed should also be an integral part of the lifecycle process.
Controlling privilege scope creep – Over time, it’s not uncommon for access privileges to accumulate. In some cases that means giving human users far more access than necessary to complete a given job or task. Overprivileged accounts such as local admin accounts are prime targets for attackers who look to compromise them and escalate privileges to traverse the network undetected.
Deprovisioning – Research shows that nearly half of all former employees log into their accounts after leaving their job or being terminated. Deprovisioning accounts on a timely basis is necessary to minimize risks from unauthorized access or malicious intent if the employee has been terminated for cause. The same applies to machine identities associated with service accounts, for example.
It's important that any organization utilizes Privileged Access Management (PAM) solutions to implement controls that govern both user and service account identities. This is especially true as more organizations than ever move to the cloud. SSO and MFA are typically associated with human identities, but they do not assure effective privilege management after authentication and authorization.
Role-based access controls help to govern what the user can do once an identity is verified and access is granted. PAM solutions are designed to secure access to sensitive data by ensuring the enforcement of least privilege.
But machine identities on endpoints, servers, and applications that use services to access other systems and use different types of identities to authenticate must also be properly controlled. That means incorporating machine identities—see Machine Identity Management (MIM)—as part of your PAM solution to enforce least privilege and comply with policies governing access. Within the broader context of the identity lifecycle, there are certain considerations you should incorporate that relate specifically to service accounts.
More Identity Management resources:
Blogs
What does world-class Identity Governance look like?
Solutions
Tools