Step Four in the FINOSEC user access review best practice series is to ensure users who have access to your systems have legitimate duties that justify not only access but their specific permissions for those systems.
Step Three in the FINOSEC user access review best practices series is to rate and prioritize the system risks you identified as the most important systems in Step Two of the UAR Best Practices and align those with the access permissions required.
We learned about the importance of a System Map in Step One: Building the Foundation, last week.
This week, we are discussing Step 2 – Start with the Most Important. In this critical step in the user access review process, you will identify the most important systems by identifying the high-risk activities each system performs.
Let’s acknowledge a few things at the start.
User access reviews (UAR) are important, and increasingly so.
Examiners expect you to complete them regularly.
They’re a crucial element of your overall cybersecurity program.
They’re complicated and they take time.
Do you believe the full title? Or do you believe the parenthetic comments are a better descriptor? Here’s a simple and universal truth of the human condition: we tend to avoid tasks we think will be hard. Or complicated. Or time consuming. Or all three!
Financial institutions have long viewed user access reviews as a double edged sword. On one hand, regulators require them. They’re a crucial component in managing to least privilege. But they’re a challenge to conduct on a regular schedule. And if you have to rely on legacy technology and outdated manual processes, the frustrations can compound logarithmically.
But you don’t need to be stuck in the past. Help is on the way.
User access reviews are important. They also tend to be a complex, time-consuming task. When you add the regulatory and cybersecurity insurance expectations about these reviews and how often they really should be completed, it gets worse. Finally, to complete the picture, you may have to rely on legacy systems or tedious manual processes. It all adds up to one big “ouch.”
Cybersecurity insurance is an increasingly important component of your financial institution’s overall information security program. When a data breach or other hostile technology event occurs, cybersecurity insurance proceeds can provide funds to repair your hardware, recover intellectual property, and even pay for the work you do to reverse adverse reputational impacts.
Alpharetta, GA (November 8, 2022) - Finosec announced that the user access reporting process no longer needs to be labor intensive or complicated, thanks to their User Access Reporting solution. The Finosec solution operates smoothly in tandem with financial institutions and supports more than 100 financial systems and has reviewed more than 11 million user permissions.
Bank examiners and auditors constantly change their expectations. The result is you feel as if your information security practices are trying to hit a moving target while the boundaries shift constantly.