{"id":29417,"date":"2019-11-13T09:51:36","date_gmt":"2019-11-13T16:51:36","guid":{"rendered":"https://www.webroot.com/blog/?p=29417"},"modified":"2020-03-24T18:21:38","modified_gmt":"2020-03-25T00:21:38","slug":"shoring-up-your-network-and-security-policies-least-privilege-models","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/11\/13\/shoring-up-your-network-and-security-policies-least-privilege-models\/","title":{"rendered":"Shoring Up Your Network and Security Policies: Least Privilege Models"},"content":{"rendered":"\n<p>Why do so many businesses allow unfettered access to their networks? You\u2019d be shocked by how often it happens. The truth is: your employees don\u2019t need unrestricted access to all parts of our business. This is why the Principle of Least Privilege (POLP) is one of the most important, if overlooked, aspects of a data security plan.&nbsp;<\/p>\n\n\n\n<h2>Appropriate privilege<\/h2>\n\n\n\n<p>When we say \u201cleast privilege\u201d, what we actually mean is \u201cappropriate privilege\u201d, or need-to-know. Basically, this kind of approach assigns zero access by default, and then allows entry as needed. (This is pretty much the opposite of what many of us are taught about network access.) But by embracing this principle, you ensure that network access remains strictly controlled, even&nbsp;as people join the company, move into new roles, leave, etc.&nbsp;Obviously, you want employees to be able to do their jobs; but, by limiting initial access, you can minimize the risk of an internal breach.<\/p>\n\n\n\n<p>If you haven\u2019t already, now is the perfect time&nbsp;to take a look at your network access policies. After all, it\u2019s about protecting your business and customers\u2014not to mention your reputation.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/soundcloud.com\/webroot\/episode-6-shoring-up-your-network-security-with-strong-policies\">Listen to\u00a0the podcast: Episode 6 | Shoring Up Your Network Security with Strong Policies\u00a0to learn more about implementing the Principle of Least Privilege and other network security best practices.<\/a><\/strong><\/p>\n\n\n\n<h2>Navigating the difficult conversations around access control<\/h2>\n\n\n\n<p>It\u2019s no surprise that employees enjoy taking liberties at the workplace. In fact,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/2012\/08\/02\/byod-organizations-question-risk-vs-benefit\/\">Microsoft reports<\/a>&nbsp;that 67% of users utilize their own devices at work. Consequently, they may push back on POLP policies because it means giving up some freedom, like installing personal software on work computers, using their BYOD in an unauthorized fashion, or having unlimited usage of non-essential applications.<\/p>\n\n\n\n<p>Ultimately, you need to prepare for hard conversations. For example, you\u2019ll have to explain that the goal of Principle of Least Privilege is to provide a more secure workplace for everyone. It\u2019s not a reflection on who your employees are or even their seniority; it\u2019s about&nbsp;<em>security<\/em>. So, it\u2019s essential for you, the MSP or IT leader, to initiate the dialogue around access control\u2013\u2013often and early. And, at the end of the day, it\u2019s your responsibility to implement POLP policies that protect your network.<\/p>\n\n\n\n<h2>Firewalls and antivirus aren\u2019t enough&nbsp;<\/h2>\n\n\n\n<p>There\u2019s a common misconception in cybersecurity that the firewall and\/or antivirus is all you need to stop all network threats. But they&nbsp;don\u2019t protect against internal threats, such as&nbsp;phishing or data theft. This is where access policies are necessary to fill in the gaps.<\/p>\n\n\n\n<p>Here\u2019s a prime example: let\u2019s say you have an employee whose job is data entry and they only need access to a few specific databases. If malware infects that employee\u2019s computer or they click a phishing link, the attack is limited to those database entries. However, if that employee has root access privileges, the infection can quickly spread across all your systems.<\/p>\n\n\n\n<p>Cyberattacks like&nbsp;<a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-phishing\">phishing<\/a>,&nbsp;<a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/glossary\/what-is-ransomware\">ransomware<\/a>, and&nbsp;<a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-are-bots-botnets-and-zombies\">botnets<\/a>&nbsp;are all designed to circumvent firewalls. By following an appropriate privilege model, you can limit the number of people who can bypass your firewall and exploit security gaps in your network.<\/p>\n\n\n\n<h2>Tips to achieve least privilege<\/h2>\n\n\n\n<p>When it comes to implementing POLP in your business, here are some tips for getting started:<\/p>\n\n\n\n<ul><li>Conduct a privilege audit.&nbsp;Check all existing accounts, processes, and programs to ensure that they have only enough permissions to do the job.<\/li><li>Remove open access and start all accounts with low access.&nbsp;Only add specific higher-level access as needed.<\/li><li>Create separate admin accounts that limit access.&nbsp;<ul><li>Superuser accounts should be used for administration or specialized IT employees who need unlimited system access.&nbsp;<\/li><\/ul><ul><li>Standard user accounts, sometimes called least privilege user accounts (LUA) or non-privileged accounts, should have a limited set of privileges and should be assigned to everyone else.<\/li><\/ul><\/li><li>Implement expiring privileges and one-time-use credentials.<\/li><li>Create a guest network leveraging a VPN for employees and guests.<\/li><li>Develop and enforce access policies for BYOD or provide your own network-protected devices whenever possible.<\/li><li>Regularly review updated employee access controls, permissions, and privileges.<\/li><li>Upgrade your firewalls and ensure they are configured correctly.<\/li><li>Add other forms of network monitoring, like&nbsp;<a href=\"https:\/\/www.webroot.com\/blog\/2019\/10\/23\/securing-your-business-first-learn-how-adr-can-help\/\">automated detection and response<\/a>.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Why do so many businesses allow unfettered access to their networks? You\u2019d be shocked by how often it happens. The truth is: your employees don\u2019t need unrestricted access to all parts of our business. This is why the Principle of Least Privilege (POLP) is one of the most important, if overlooked, aspects of a data [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":29419,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29417"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29417"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29417\/revisions"}],"predecessor-version":[{"id":29421,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29417\/revisions\/29421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29419"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29417"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29417"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}