SGNL’s Post

View organization page for SGNL, graphic

1,817 followers

"All it takes is one targeted identity compromise to inflict a devastating attack." writes Erik Gustavson, Co-founder and CPO of SGNL in this latest blog post. Read how organizations can minimize their blast radius, i.e. "the impact an organization could suffer from a security breach": https://lnkd.in/dqyYc7rQ

Minimizing the blast radius when authentication is compromised

Minimizing the blast radius when authentication is compromised

sgnl.ai

Katherine Greathouse, CISSP

IT Professional | IAM AI Enthusiast | Entrepreneurship Advisor | Vocal Artist | Excited for What's Next!

1mo

This article is speaking my mind. 😊 Regarding the access review process, I've also experienced situations where managers and system owners approve access based on the user having access in the prior quarter or review periods, leading to 'continuous approval.' Additionally, some reviews lack information on when the user last accessed the application, further complicating the process. The more managers who rubber-stamp access reviews, the more standing access remains intact. I've been wishing to replace standing access with contextual access to prevent 'rubber-stamping,' which will certainly ease the burden on the entire review process. It is much more efficient for each department or role owner to periodically review the policies and permissions each role is assigned. This approach should be something internal and external auditors are open to adopting, especially since every organization is seeking new efficiencies these days. It's a win-win!

To view or add a comment, sign in

Explore topics