The security landscape has evolved and new threats have emerged for organizations. Security teams need to do more with their systems to keep their employees, assets and building secure. To provide a more secure environment, security directors must transition from controlling access to doors and buildings to managing the identities that walk through those doors. Using a policy-based identity management platform, organizations can manage access via the different categories of identities (people) that enter a building. Identity access management ties systems together to manage the different identities (employees, contractors, vendors, visitors), rather than manage systems.
A large employee population generates a complex identity environment to manage. Employees change jobs, move from part to full time, contractor to employee or from one department to another, creating a complicated and ever changing environment for managing access.
Physical security is difficult to manage. Most companies use cumbersome manual processes that involve numerous emails and phone calls to onboard a new employee. Approvals are needed from multiple departments before granting the appropriate access, which can add days to the process. The process is inefficient, wastes money and increases risk.
New employees, contractors and vendors need access to buildings, floors or doors, and for access to be removed when they no longer need it. Access is often not removed for terminated employees until manually caught or even worse, when there is a security breach. Large organizations often cannot keep up with manual access requests and audits due to lack of resources and poor processes. If a company cannot keep up, they fall out of compliance and risk heavy fines or sanctions against their business.
What is the best way for organizations to manage identities?
Limited Access Approach
The limited access approach grants front door and office floor access. A new employee must request access to all other areas needed, even the access required to perform their new job. A secure option, but it requires approvals and processes immediately after the employee is hired. This option may hinder the employee because they do not have access to all areas required to do their job.
Full Access Approach
The full access approach requires that every person hired receives access to many areas throughout a company, either during normal working hours or around the clock. This approach may be effective for small businesses where few rooms need additional security, but this is the least secure option for most companies. Large organizations with facilities around the world do not need to grant a new warehouse employee in Florida access to the company's headquarter operations in Seattle.
Least Privileged Access
The least privileged access (LPA) approach uses role-based permissions to allow new employees access to the front door and all areas needed to perform their job. Once the employee starts, they must request access to additional areas needed to perform their job. Access is then granted for a predetermined amount of time and automatically deactivated when the time limit expires. LPA provides an electronic log of all requests and an audit trail to prove compliance. LPA is the most secure and easily managed onboarding process.
LPA is ideal in heavily regulated industries, and is sometimes required. Organizations can match up timeframes with regulations to meet compliance. For example, background checks may last one year. Organizations can time access card expirations to match background check expiration to help a company remain in compliance. NERC CIP regulated industries require special training to obtain access. If an employee doesn’t have the training, they fall out of compliance. By syncing up LPA with NERC training, compliance is maintained and the company will not have to pay expensive fines.
Organizations can assign access levels per role within the company. A vice president of IT will have different access levels than a customer service representative. Establishing roles in advance will create a more efficient and safe environment. Companies will save time and money, and eliminate loopholes in access.
Once set up, managing LPA is effortless. The data parameters determine who should have access and for how long. Organizations audit the parameters set up in the system to make sure they continue to meet company requirements, but that is determined by each organization. Once it is set up, it runs itself.
LPA provides the most secure onboarding process. It reduces risk, helps companies maintain compliance and saves money.
Kim Rahfaldt is the director of media relations for AMAG Technology. Kim has worked as a public relations professional in the security industry for 20 years.