With the world economy in a state of turmoil, markets correcting themselves and employers reducing staff, the pull of illicit insider activity is stronger than ever. It may begin with the “dead wood,” but inevitably some companies are going to have to lay off talented IT and information security professionals. Illegal activities that once seemed unpalatable to out-of-work technologists may seem better than starving: Just as liquor store break-ins and gas n’ go crimes will increase, so will more sophisticated crimes, such as data theft and social engineering. While it may seem hard to imagine, criminal actions are often committed by former employees who rationalize the activity because they’re upset about losing their jobs.
The challenge for identity and access management professionals will be securing data from former employees who know the system from the inside out.
Defense strategies: Proactive IAM processes Locks keep honest people honest, or, in the case of identity and access management, account terminations keep honest people honest. Identity management and information security professionals will need to scrutinize their account-termination processes like never before, because leaving an unauthorized or former employee’s account active and enabling access to sensitive or valuable data could be catastrophic.
IAM and budget cuts: Using frameworks and documentation Another challenge in 2009 will be funding. Budget promises made in 2008 are sure to be forgotten as many companies adjust to the new economic reality. This will initiate an ongoing process that can be refined in the future, perhaps with more sophisticated technology, when finances are better. Personnel reductions may still be mandated, but data can help you make those hard decisions in an unbiased way and set management expectations from the start about the consequences of staff reduction.
Important statistics to keep may include how many accounts are under management, turnaround time for account creation and removal, reporting demands from various departments, and objects under management such as mainframe profiles and Active Directory groups.
Conclusion: In such a troubled economy, external threats will increase as well. It’s still essential to be on guard by making sure the controls for external risk mitigation are assessed as well. It’s clear that 2009 will be drastically different from 2008.
http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1344839_mem1,00.html?mo=1&Offer=SEsswn09IAM119