Privileged Account Holders
It's important for security pros to keep track of employees' data access across the organization, Carson sats. Looking at access controls and privilege controls can determine who has access to critical information. This may include internal employees, contractors, and members of the supply chain.
Some key questions to ask: Are new users being created? How many administrative accounts exist across the corporate environment? Who has access to those accounts?
A record of who has privileged accounts, and when those accounts are used, is a strong indicator of security posture, says Carson. If a security manager knows when high-risk accounts are in use, they have a better idea of when their information is more exposed, whether it's at the end of the quarter or end of the fiscal year.
This information is key for safeguarding corporate information and conveying security activity to business executives. "When the board asks about access level, [security pros] will be able to say how many people have access to sensitive data," Carson explains. The CISO and CIO need to translate to the business side when they meet with execs, and keeping track of this data will help them which employees have accessed various data sources, he notes.
Those with privileged accounts are at the center of risk to the business, he says. This data will inform security leaders of who should be in cyber-hygiene training programs.
Image Source: YanLev via Shutterstock