Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dotan Bar Noy
Dotan Bar Noy
Connect Directly
E-Mail vvv

Permission Management & the Goldilocks Conundrum

In today's COVID-19 era, managing access has become even more difficult, especially for large organizations. Here's how to get it "just right."

Legendary boxer Mike Tyson used to say that "everybody has a plan until they get punched in the mouth." I think that it's also fair to say that everyone in security had plenty of plans for 2020, and most of us have ended up with some pretty sore jaws. For many organizations, one of those disrupted plans was likely a cloud transition road map that abruptly pivoted from a three-year marathon to a three-month sprint.

While many companies have been opening up to remote work in the wake of COVID-19, almost nobody was prepared for a shift of this scale. Commonly referred to as "the new normal," we are rapidly moving away from our old ways toward a much more fluid system of new platforms and modes of working.

Related Content:

A Holistic Approach to Cybersecurity Wellness: 3 Strategies

The Threat from the Internet—and What Your Organization Can Do About It

New on The Edge: Think You're Spending Enough on Security?

With work from the office and its clearly defined on-premises infrastructure no longer a reliable option, IT teams have been diligently getting employees access to the cloud-based resources they need to do their jobs. At the same time, some experts are expressing concerns that security is being left by the wayside and not enough attention is given to the potential negative implications to IT operations.

I get it. Organizations have to prioritize their time and resources, and the primary mission is just to make things work, even if that means everything is held together by popsicle sticks and chewing gum. But by being rushed, organizations open themselves up to poorly configuring access permissions and other mistakes which attackers will capitalize on. You can strike the right balance by addressing these key issues. 

The Goldilocks Problem
Even before COVID-19, adoption of cloud services like software-, platform, and infrastructure-as-a-service (SaaS, PaaS, and IaaS) were already on the rise with 73% of organizations indicating that nearly all their apps will be SaaS by 2021. The pandemic has only kicked this trend into overdrive as the on-premises model loses relevance. With more and more applications, managing access and permissions becomes even more difficult, especially for larger organizations.

IT teams need to coordinate with various departments to understand which people need which access and permissions. They then have to get approvals for the access, adding more time onto the process. The good news is that access management has improved significantly over the past five years or so. The bad news: Permission management has fallen behind, creating plenty of friction for the users and making it incredibly difficult to manage.

The challenge that they face is a bit of a Goldilocks problem. Like in the famous children's story, organizations do not want to provide more permissions than necessary because it increases the risk to security. At the same time, granting too few permissions limits access and harms productivity. The trick is getting it just right, or close enough.

Ideally, security teams would likely follow the principle of least privilege. This is the idea that we want to grant the least amount of access possible for people to do their job. However, we know from experience that need is a constantly moving target. Just because someone had access to one set of tools or data while they were working on a specific project does not mean that they should hold onto it in perpetuity just because it may come in handy down the line. Who needs more keys to an office building, the CEO or the janitor? 

Permission Management
Your goal is to find ways of speeding up the process of granting permissions while also sticking to the principle of least privilege. You should begin by building profiles of your organization members regarding which kinds of roles are likely to require permissions to various applications, platforms, etc. 

Think about what access to which specific applications employees from will need. The sales and marketing departments will likely need access to HubSpot and Salesforce, but not AWS or Azure. Developers need access to computing resources and repositories, but probably not customer data. This can be a very difficult process that will involve many different managers providing feedback along the way. 

Add to this that each department will want their own level of (near absolute) autonomy, which may lead to conflicts with the IT team. In the past, IT and security teams played a much more significant role in managing applications and services. But now in the SaaS age, products have been designed to be far more user-friendly, requiring far less intervention from IT and security. Overall, this "democratization" is a good thing. The challenge is to create a new dynamic that allows each department to be the "master of their domain" without cutting IT and security out of the loop. 

Once you define the profiles based on needs for their role, you can get approval to grant permissions ahead of time. A certain number of tweaks will still be needed, but much of the heavy lifting can be handled without too much fuss or muss. 

It's a Marathon, Not a Sprint
Permission granting and revoking is something that happens not only when someone joins or leaves an organization. Events such as changing departments, working on different projects, or other similar changes in roles and responsibilities can all require a change in what an individual within the organization needs access to. How you set up the process of identity life-cycle management matters. An effective process:

  • Lays out how permission requests are made,
  • Answers which IT service management tools (ITSM) are used, and
  • Defines who makes the changes in the different applications.

There is no "one size fits all" answer here and you should expect to mix and match your solutions. An IaaS ticket might be managed with Jira while ServiceNow is used for Salesforce. It is best if you can move your permission request to one category within a single ITSM platform. That way, you can control it properly, monitor the overhead, and generate appropriate audit reports. 

Your organization is also likely to change apps that you are using from time to time. A report from March of this year showed that the typical midsize company churned more than 30% of their SaaS apps in 2019. Every switch will demand a new round of onboarding.

Recertification of access and privileges is another challenge that demands leadership. Managers are required to approve users' existing access and privileges, and this can easily become a time and energy black hole. Starting with a basic idea of which permissions go with which groups or roles can clear most of the to-do's off the table, allowing you to focus on the cases that really require a manager-level response. Getting this process right is important because you will have to repeat it again later when it comes time to recertify again.


Dotan Bar Noy serves as Authomize's co-founder and CEO. Prior to co-founding Authomize, Dotan was product management leader of the "Infinity Next" platform at Check Point Software, following the successful acquisition of ForceNock Security, where he served as Co-Founder and ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-06
An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and video streams from the doorbell. The binary app offers a web server on port 80 that allows an unauthenticated user to take a snapshot from the doorbell camera via the ...
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a syst...
PUBLISHED: 2021-05-06
A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
PUBLISHED: 2021-05-06
ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.
PUBLISHED: 2021-05-06
Cross Site Request Forgery (CSRF) vulnerability in puppyCMS v5.1 that can change the admin's password via /admin/settings.php.