User Monitoring Not Keeping Up With Risk Managers' Needs

Biggest concern is negligence, but monitoring capabilities can't detect this type of activity within most applications.

User negligence in handling sensitive data within applications may be a top security concern for IT executives today, but most organizations either don't have or are unsure if they truly have the capability to detect negligent activity within their application portfolio. So says the Ponemon Institute in a new study out today on the risks from application access and usage.

"Companies and their employees are becoming increasingly dependent upon applications to achieve business goals and increase productivity," the report says. "However, the proliferation of applications is creating a serious security risk because identifying users' risky behavior and non-compliance with policies can be nearly impossible."

Conducted among over 600 IT and IT security practitioners, the survey found that 71 percent of respondents have deficiencies in monitoring application access and usage. About a third of respondents said that monitoring is done by ad hoc or manual systems, and 20 percent reported that they use  homegrown systems that focus primarily on privileged users. Just one in eight use some sort of commercial auditing or monitoring product to keep tabs on application access and usage of typical users.  

As a result, over half of respondents said they have difficulty identifying application user activities that are illegal or inappropriate in real-time, and the same amount say they can't separate application user abuse from outside attacker activity. Nearly 80 percent of respondents admitted they either were unable, or didn't know if they were able, to capture the actions taken by any given application user from login to logout.

According to survey statistics, user negligence leads the IT security concerns posed by user activity, with 44 percent of respondents naming that as their top concern. Respondents reported that 71 percent of user-related breaches caused by negligence came at the hands of application users, compared with 18 percent by privileged users. And yet most investments today in user monitoring revolve around privileged users. The survey showed that 48 percent of organizations have systems to measure and monitor privileged users, but only 8 percent have similar systems for regular application users.  

"Historically, companies have identified these types of risks through audits and assessments of application access and usage logs. This manual process is resource intensive," the report said. "In addition, each application logs user actions differently and at varying levels of granularity with many applications not producing logs at all. These logs typically contain hundreds or thousands of discrete events in obscure technical language. As a consequence, organizations that rely upon logs from applications and devices find it nearly impossible to determine what a user actually did."

About the Author(s)

Ericka Chickowski, Contributing Writer

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights