Founders of the Non-Human Identity Management Group on LinkedIn - https://www.linkedin.com/groups/13038250/

Application Technical Account risks (also known as Non-Human Identities or Service Accounts) pose one the biggest Cyber and Insider threat risks to any organisation. If you look at most of the biggest cyber incidents, they all have one thing in common i.e. the discovery and use of highly privileged Technical Account Credentials to access and compromise systems/data.

Regulators and Auditors around the world are now very focussed on this significant exposure that exists in most organisations. A number of years ago their primary focus was on Privileged Access Management, Segregation of Duties and Access to Production Controls, but are now raising significant audit points against numerous financial institutions.

Organisations cannot ignore or underestimate this risk and sheer scale and effort required to get these risks under control, to avoid being the next company facing a major cyber or internal threat incident.

This white paper will focus on core foundational principles organisations will need to establish to understand the risks around Technical Account Credentials and the key things they will need to consider from a core capability standpoint to manage the risks in an effective and sustainable way.

Application Technical Accounts

Is this one of the biggest Cyber threat risks in the Industry?

The Holy Grail of Application Technical Accounts

Databases

Databases, being critical assets, require protection from both external and internal threats. They are prime targets for acquiring sensitive data, causing operational impact and performing fraudulent activities. From an insider threat perspective, many incidents, including accidents typically involve databases and technical accounts.

However, Databases are one of the most challenging areas to securely manage. Here's why :

  • Local DB Accounts

  • Password Authentication

  • Inventory & Ownership

  • Secrets Sprawl / Account Sharing

  • Password Cycling

  • Account Permissions

  • Interactive Logins

  • Monitoring of DB Activity

This white paper will deep dive into the key challenges around DB Technical Accounts and how to tackle some of those challenges.