The Consequences of Convenience

Chad Erbe, Professional Services Architect, BeyondTrust
June 27th, 2018

Most security compromises are caused by a desire for convenience without a greater understanding of the risks. Why? Users are often tasked with projects that have short deadlines, and in order to meet them, they often demand broad access to systems. End-users often desire convenience in their daily activities and often don’t understand the reasons for restrictions they perceive as something that hinders their daily job.

Corporations, on the other hand, are required to maintain certain security controls, whether it is required by regulations, or policies within the organization. Striking a sane balance between the two is usually the most difficult part of implementing a solid cybersecurity program within any organization.

Deadlines and DevOps

Rapid development and deployment of new applications and software, also known as DevOps, is the cornerstone of most IT organizations today. The DevOps model is expanding, and the ability to implement a new tool before a competitor does often result in significant revenue when it is done properly.

Weighing the risk of rapid time to market vs. security and regulatory requirements is a difficult task for any organization. Fast release cycles sometimes shorten test and quality assurance time, so software can sometimes be released without thorough testing. In order to meet deadlines, sometimes change control processes are set aside. Most often, users are granted much more access than they require to deliver on time.

A Matter of Convenience

Aside from DevOps, other user communities within an organization often request broad access as a matter of convenience. Some of the more common reasons users request full administrative access for their endpoint (Mac, PC, Linux) are:

  • Collaboration tools do not meet the needs of users or are not available
  • Email restrictions prevent moving large files from place to place within a network
  • Installation of approved software or updates require administrative access
  • It takes too long to get the support needed to do things they consider basic
  • The software they want to use is not on the approved list, so they need rights to install it themselves

Every organization has their use cases and dealing with these situations can often be very challenging.

“I Want It All” – Queen, 1989

Faced with a desire for convenience, short deadlines, and sometimes unknown variables, the typical user community will request “full administrative access” to servers and endpoint computers. In many cases, they ‘don’t know what they don’t know’, so the simplest solution is to ask for everything so they are prepared for anything. With full administrative access, it is possible that the end-user may not confine their activity to the specific reason for which it was granted, and this presents a greater risk to the corporation. Compliance teams should be concerned about the possible installation of unapproved, unsigned, or unlicensed software that may expose the environment to much greater risk, or the corporation to liability with regard to licensing. Granting users broad access brings this risk to the forefront, among many other concerns.

It’s a Question of Risk

Every group of users is driven by a different agenda or set of requirements, and weighing the risks of their requests against the risk to the organization can be the difference between success and failure for any company.  In a typical end-user environment, users are not expected to have a broad understanding of the risks associated with granting broad administrative privileges to their laptop, or PC.  Development teams are usually driven by other priorities and sometimes they neglect to consider the security or policy implications of delivering their project on time.

The risk to the corporation is very real, however. Simple changes to configurations like taking down a firewall, or sharing a folder can permit access other than what was intended (“It’s too time-consuming to pick specific users to share with, I’ll share with everyone.”, “I’ll open that port, only ‘Bob’ will know it’s available.”).  Once the endpoint is accessed, data is exposed, and sometimes other aspects of the system are compromised.  Imagine a simple change that a user with ‘root’ privileges made that exposes the intellectual property, potentially patentable information, financial records, or any of a number of other things found in a corporate environment.  The outcome could completely compromise the integrity of the company, impact shareholders, leak confidential research or expose confidential information.

Other things that are done for convenience can have an even greater impact. Savvy users may use privileges to access an endpoint, circumvent security controls, and access corporate information that they should not access, so it is important to control access to everything from the endpoint to the servers. The responsible thing to do is to put controls in place that weigh convenience vs risk, and permit only the access that is required to protect the company as a whole.

Quantifying the Potential Risk – Taking a “What If?” Approach

Every corporation or entity has varied requirements for compliance. These range from policies established by the Board of Directors and Shareholders, to regulatory requirements such as GDPR, HIPAA, SOX, or others, and sometimes just common sense. Some of the considerations when evaluating risk in any environment are the potential for:

  • Brand damage resulting from a compromise or negative press. This can be very difficult to quantify, and it is often best to consider things in the worst case since stock prices may be impacted and overall company value could fall.
  • Regulatory fines. Many regulations apply to how data is handled, and who should have access to this information. Failure to comply with these regulations can result in significant fines or penalties and are often accompanied by brand damage.
  • Audit failure. Most regulatory standards (and common sense) require that all privileged access to systems be monitored and strictly controlled. Failure to comply with this standard may result in both regulatory fines and brand damage.

Taking a common sense, “What if?” approach to risk evaluation will better help companies to weigh the pros and cons of whether privileged access is granted to individuals or teams.   Using tools to enforce these decisions will smooth audits and ensure that compliance goals are met.

Education is Key

Educating users on the potential risk to the company is critical to reaching a compromise between security and convenience. No responsible employee would be willing to risk something that may compromise the entire company once they fully understand the potential consequences of convenience.  As they are educated, and their requests are rationalized from a risk standpoint, it is important to develop policies that govern under a principle of least privilege, and to put tools and processes in place to enforce them.

Controlling Privileged Access

Establishing policies that define who may, or may not, have privileged access, and under what circumstances is crucial to protecting any corporation.  Confining privileged activity to only authorized work-hours, tying privileged access to change management events, and only authorizing specific privileged commands are solid solutions to avoid the consequences inherent inconvenient access to systems and data.  Defining those criteria should be a priority for any corporation.

Weighing the risk of an activity against the convenience to any user population is always a difficult task. Users generally do not consider the broader implications of what they believe to be simple, small changes to endpoints or servers. Educating users about the potential risk of an activity, developing policies to guide them through the process, and deploying tools to control the risk and enforce those policies is imperative for any company.

For more on how the PowerBroker Privileged Access Management platform can help businesses reduce the risk of overprivileged users, contact us today for a strategy session.

Chad Erbe, Professional Services Architect, BeyondTrust

Chad Erbe is a Certified Information Systems Security professional (CISSP), with nearly 30 years’ experience in a Unix/Linux administration role. Chad has worked in DoD high-security environments, manufacturing, and with large financial services companies throughout his career. This broad experience has lead him to an architectural role with BeyondTrust where he focuses on Privileged Access Management, particularly in the Unix suite of products. Chad also maintains his PCI ASV certification from the PCI council.