Topics In Demand
Notification
New

No notification found.

Blog
Strengthen Security by Addressing Insider Risk

March 30, 2019

456

0

The number of catastrophic cyber-attacks is surging and is likely to get worse. The malicious and deliberate cyber-attacks can be from individuals or organizations trying to benefit from vulnerable business systems. Organizations can construct walls, set up perimeter protection, and spend enormous resources maintaining it all. However, if the enemy is within the organization, that wall is not good enough. According to the Ponemon Institute, 48% of cloud data breaches are the outcome of insiders deliberately or accidentally exposing data from a cloud service. The Information Security Forum puts that number at 54%. Whatever the statistics, it is a reality that attacks from insiders are a real threat.

Malicious data breaches (61%) are among the critical insider threats organizations are most perturbed about (in addition to negligent data breaches and inadvertent data breaches). As malicious threats are planned, it becomes extremely important to foresee and anticipate these threats where possible.

Combating Insider Threats – A Different Battle

As cloud services are built to be accessed anytime, anywhere and from any device for easy collaboration and data sharing, the risk of accidental or intentional exposure of sensitive data is real. Organizations often struggle to detect anomalous or careless employee behavior in cloud-based IT environments.

Take the recent case of an organization’s vengeful sacked employee who rampaged through his former colleague’s AWS accounts and shut down 23 servers and triggering a wave of redundancies.

Protecting your organization from insider threats is a different battle as it is hard to identify and stop them. So, it should be fought with an organized approach. The right approach is to put controls in place to minimize the risky activities of users and also spot suspicious behavior that indicates malicious insiders.

Changing the Data Protection Approach for Insider Threats

Addressing the insider threat starts with gaining visibility into the activities of the users in the cloud. After understanding the cloud services in use and how they are being used, the next crucial step is to set the controls in place to minimize the risky cloud activities and detect suspicious behavior that could indicate a malicious insider.

Right solution needs to provide visibility and enforcement change control instead of the conventional change management process. The solution like CloudOptics should:

  • Enable defining permissions according to business needs and be flexible
  • Automated controls to offer role-based access to sensitive information, and also apply specific controls based on the user action.
  • Provide a nodal point for making the cloud changes.
  • Monitors and controls privileged asset action

Consequently, IT managers can enforce control and prevent changes to sensitive cloud infrastructure elements. Nowhere the need is more pronounced than in public cloud.

Get in touch with us to know more.


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


© Copyright nasscom. All Rights Reserved.