<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=523033&amp;fmt=gif">

Using Zero-Trust And Least Privilege Access To Overcome Threats

By Frank Vukovits

11/09/2022

4min read

Using Zero-Trust And Least Privilege Access To Overcome Threats

Technology Record covers news and articles about Microsoft technology for enterprise businesses. In the Summer 2022 edition, the cover story is about Overcoming Threats, discussing how companies can protect their data and networks. And it comes down to people and zero-trust strategies.

The article references the findings of the 2021 Microsoft Digital Defense Report, which brings together data across Microsoft’s security teams to help companies, governments, and consumers understand the current threats and secure their environments against them.

“Anything short of end-to-end security is no security at all”

...according to Vasu Jakkal, corporate vice president of security, compliance, identity and management at Microsoft.

“It is the combination of leading technologies, comprehensive threat intelligence, and highly skilled people that make for a truly effective security posture.”

As companies move to multiple applications run in various cloud environments, the number of platforms, devices, users, and services multiplies exponentially, making it harder to manage security through user identities and permissions.

Zero-Trust and Least Privilege Access

According to Rob Lefferts, corporate vice president of Microsoft 365 Security,

“We believe that the best way for organizations to protect themselves is not to detect an intrusion after it happened, but to hunt for threats proactively within existing and new data, correlate signal intelligence to see complete incidents, not just alerts, and to build a modern, zero-trust security posture.”

For a long time, the prevailing attitude was that the corporate firewall would keep out the bad actors and that, once inside, everyone behind the corporate firewall is safe. But with the rise in stolen usernames and password combinations, those bad actors who gain access within the company’s firewall, whether by hacking in from the outside or by working as an employee or contractor within, the risk of fraud and malicious activity increases dramatically. The zero-trust model assumes that every access poses a threat and therefore each request for access is verified before access is granted (“never trust, always verify”).

In addition to zero-trust, companies are also encouraged to apply the principle of least privilege access, which gives users just enough access to perform their job functions but prevents them from reading or editing sensitive data outside of their responsibilities.

Using the zero-trust model along with least privilege access principles goes a long way to securing business data assets from bad actors, both internal and external.

Five steps to 98% protection

The 2021 Microsoft Digital Defense Report concludes that basic security hygiene still protects against 98% of attacks:

  • Enable multifactor authentication to make it harder for bad actors to use stolen credentials
  • Apply least privilege access with just-enough-access to help secure data and applications
  • Keep up to date with software, firmware, infrastructure, and configurations
  • Utilize anti-malware to prevent malware attacks
  • Protect sensitive data and know when it is accessed

How Fastpath can help

Fastpath products help companies in their fraud, compliance, and identity management efforts.

As a member of the Microsoft Intelligent Security Association (MISA), Fastpath integrates seamlessly with Microsoft Azure Portal and Azure Active Directory to help analyze current user access and maintain compliant user provisioning by detecting and preventing improper access that would introduce risk into your organization.

Fastpath also extends Microsoft’s Azure Identity Governance solution by allowing customers to include our world-class segregation of duties analysis engine in their assignment workflow. By using these Fastpath solutions, our customers can ensure they are following security best practices and helping stop internal and external threats.

Here is a short list of Fastpath products and how they can help protect you from unauthorized access threats inside and outside your organization:

Fingerprint_scan

Identity: Identify and mitigate user access risk across your business applications. ARM comes with built-in rulesets that can be used to identify and mitigate segregation of duties (SoD) and sensitive access (SA) risks across multiple applications.

main-access-control

Access Control: Identify and mitigate user access risk across your business applications. ARM comes with built-in rulesets that can be used to identify and mitigate segregation of duties (SoD) and sensitive access (SA) risks across multiple applications.

main-certifications

Automated Certifications: Identify and mitigate user access risk across your business applications. ARM comes with built-in rulesets that can be used to identify and mitigate segregation of duties (SoD) and sensitive access (SA) risks across multiple applications.

main-change-tracking

Change Tracking: Identify and mitigate user access risk across your business applications. ARM comes with built-in rulesets that can be used to identify and mitigate segregation of duties (SoD) and sensitive access (SA) risks across multiple applications.