The rediscovery of information security

This blog has been due for quite some time. Since new privacy regulations have come into play, data breaches in (online) information systems have been prominently in the news. As far as I am concerned, the problem is not so much that those systems are no good but rather that the decision-making authority for granting access is very often wrongly allocated. This has its roots in earlier times when ICT departments developed the organization’s systems. But that doesn’t mean it should still be that way in the present. On the contrary, we’re up for a rediscovery of information security in which business operations (the “business”) must regain control. And it may be necessary to take alternative paths. The world has changed, business processes change continuously, and the way we share information changed as well.

In the past, a system was built to manage data, where someone is given an account for using that system, and where an administrator assigned the rights to that user. That led to enormous fragmentation of accounts in different systems to run processes. Today, we do this differently. We buy new cloud-based services and provide people with a single Azure account with single sign-on access to all those services and data.

But then things still go wrong …

We may have gotten rid of that account and password management, but access is still unresolved.

That is because we still think in terms of people, systems, and services. We buy a system or a service to help our employees with our processes. But that is no longer scalable. Just try to grant access to business partners, customers, and suppliers. There is a great temptation to do this in traditional ways to protect our information in traditional ways. Access management from the perspective of accounts and systems is not scalable.

That has to change: “who” is not scalable!

We must no longer just use the traditional frameworks, but we have to start with the processes and the data that are processed. No longer thinking about who may have access to processes and data (“who” is not scalable), but why, under what conditions, someone should have access to use the secured information. Truly embark on that rediscovery of information security. And then we arrive at the core of information security: we need to secure the information, not the users. On what grounds can someone use a process or an information element? And that can be anything. These can be:

  • competencies of the users (junior versus senior),
  • the confidence level of the person (e.g. from a reliable partner, with multi-factor authentication),
  • business rules regarding conflicts of interest (someone is not allowed to handle their own object data, e.g. their own expenses)
  • a key control like segregation of duties (if someone has performed task 3, that person may not also handle task 4)

So this is not about ‘Who are you’, ‘what is your role’, ‘what is your profile’, ‘what are you allowed to do’. It’s about: why should you be allowed to do this. It is a reverse question. Of course, we still need to know who did what, but that’s just standard logging and monitoring, we already know how to perform logging.

So back to basics, securing information.

Most traditional systems are not really made for securing information. There are more bottlenecks than data breaches resulting from clumsy access facilities. In the long term, we have to return to securing information because we may not even know our users any more. And this will be sooner rather than later: just have a look at opening up API’s and machine2machine communication.

The solution might emerge from using a Zero Trust Architecture. Accounts no longer exist in those environments, there is only access.

Also interesting: Zero Trust – a utopia right?

As a result we must separate identity and access. And that means that we grant access based on access policies. Using all kinds of attributes other than just usernames and roles. Attribute-Based Access Control, Policy-Based Access Control instead of Role-Based Access Control.

Also interesting: Attribute Quality Management for Dynamic IAM

For more background I would like to refer to this nice article by Mary McKee.

IDPro is the professional association of Identity & Access professionals. SonicBee is a partner of IDPro and actively contributes to the development- and sharing- of knowledge within the field. Mary’s article is a valuable contribution to the field!

About the author

André Koot
CCSO

andre.koot@sonicbee.nl

André Koot is principal IAM consultant and co-founder of SonicBee. He has 20 years of experience in the Cyber Security domain, of which the last 10 years he has been specifically focused on Identity and Access Management. He is an absolute top expert in this field, internationally recognized. André makes an active contribution to the IAM domain, among other things in his roles as: Board member Cloud security alliantie NL chapter, Member IDPro commission and member of the advisory board of Identity.Next. 

About SonicBee

SonicBee is the Identity and Access management (IAM) company providing innovative and intelligent managed services and business consultancy to make businesses faster, smarter and more secure. We ensure that everything and everyone within your environment can access information in a safe, compliant and smart way.

We challenge the existing market by looking at identities and data in a new way. SonicBee provides intelligent access solutions, advise and implementations, focused on increasing our society’s cyber security and creating business value.