Point Break ft. Bryon Singh, RailWorks Corporation

Point Break ft. Bryon Singh, RailWorks Corporation

By Steve Gold
Posted in Security
On October 10, 2023

One of my favorite scenes in Thor: Ragnarok was when Thor attempted to escape the junk planet. He made it to the Quinjet and tried many different activation codes (access) such as: "Thor", "Son of Odin," and "Strongest Avenger" (twice). None worked. It was only when he said “Point Break” did the Quinjet start. Point Break was the activation code that Tony Stark had assigned him back from the 2012 Avengers movie.

Unauthorized access to sensitive information is one of the most significant threats that enterprises face. Whether it's an external attacker exploiting vulnerabilities, or an internal employee with malicious intent, the potential for data breaches is a constant concern.

Automated access management involves the use of technology to streamline and enhance the process of granting and revoking access to various enterprise assets, including databases, applications, networks, and sensitive information. This process is especially critical during key events like onboarding new employees, granting elevated rights, or modifying existing roles within the organization.

Implementation Group 1 (IG1), aims to shield enterprise assets by methodically ensuring users are granted suitable access. It's essential for every organization to adopt this protective measure.

Why is an Access Granting Process Crucial?

Organizations, irrespective of their domain or size, rely heavily on data. Mismanagement of access to this data can not only derail operations, but also inflict grave financial and reputational damages. A meticulous access granting process acts as the gatekeeper, ensuring data is accessible only to those with a genuine need.

Steps to Implementing an Effective Access Granting Process
  1. Adopt Role-Based Access Control (RBAC): Categorize clear roles and designate access permissions aligned with these roles. For instance, while a finance executive may have the ability to budget data, a marketing executive might not.
  2. Formalize Access Requests: Every access request should be logged, specifying the rationale, the systems or data in focus, and the access duration.
  3. Structured Approval Channels: Design a layered approval system, particularly for high-stakes data. Access requisitions should be scrutinized and greenlit by pertinent authorities, like department heads or IT personnel.
  4. Grant Temporary Access Judiciously: For transient needs, allocate access for a fixed span. After this period, permissions should automatically lapse.
  5. Routine Access Scrutiny: Undertake regular assessments of individual access permissions, ensuring they mirror their evolving roles and tasks.
  6. Promote Awareness & Capacity Building: Cultivate a well-informed workforce, conscious of data security essentials. Periodic orientations can underline the perils of unwarranted access and the ethos of the access granting protocol.

Here’s a link to the Account and Credential Management Policy Template for CIS Controls 5 and 6 provided free of charge from the fine folks at the Center for Internet Security: https://www.cisecurity.org/insights/white-papers/account-and-credential-management-policy-template-for-cis-controls-5-and-6

Here’s some details on this specific Control/Safeguard. If you want more detail, DM me.

CIS Control 6 – Access Control Management

Use processes and tools to create, assign, manage, and revoke access credentials and privileges for users, administrators, and service accounts for enterprise assets and software.

Implementation Group 1

CIS Safeguard 6.1 - Establish an Access Granting Process

Establish and follow a process, preferably automated, for granting access to enterprise assets upon new hire, rights grant, or role change of a user.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.