<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Want to meet StrongDM in person at the Gartner IAM Summit in London? 🎡 Book your meeting today!

Close icon
Search bar icon

Is the Infrastructure Access Security Gap Putting You at Risk?

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

Some might say humans are the weak link in information security, but prominent data breaches show otherwise. Early in 2021, retail chain Hobby Lobby identified a security breach that impacted over 300,000 users and exposed 138GB of data – everything from names and phone numbers to the last four digits of customers’ payment cards. In 2019, a security incident resulted in 10.7 million MGM guests’ data being leaked, including names, addresses, and phone numbers. And back in 2018, 150 million MyFitnessPal users had their accounts compromised.

The common element in all these data breaches is access control. As one security expert noted from the MyFitnessPal breach, “trust but verify” isn’t enough when data is stored in the cloud and accessed from locations outside a company’s secured internal network. The infrastructure access security gap has only expanded with the rise of remote work and increased numbers of connected systems.

Organizations are turning toward Zero Trust principles to secure their infrastructure. With access and identity being two critical points to adopt Zero Trust, it’s not a surprise that 80 percent of companies have an Access Management initiative planned for the next year, according to our recent survey 2022: The Year of Access.

Legacy Access Practices Increase Risks

Unfortunately, many organizations are still using legacy access practices for their infrastructure. An overwhelming number of respondents to the study – 93 percent – have granted technical staff access to sensitive infrastructure, indicating how infrastructure has been democratized. But at what cost?

How do you currently manage infrastructure access?

Nearly two-thirds (65 percent) use shared logins, and 42 percent rely on shared SSH keys. These practices make it hard to track who is accessing your systems. It could be a developer with a legitimate reason – or it could be a disgruntled former employee or malicious actor with plans to sell sensitive customer data on the dark web to the highest bidder.

Many companies use shared logins and shared SSH keys because they’re easy. Otherwise, they’d have to manually approve access for each person and each system. That’s not a big deal for a small company with just a few databases. But the average organization is provisioning dozens of databases and systems to many more users, everyone from in-house application developers to third-party partners. Half of the survey respondents noted that it can take hours, days, or even weeks to approve user access since these requests go through several layers of approvals.

Building a Modern Bridge for Infrastructure Access

Organizations aren’t using legacy technology anymore, and they need to let go of their legacy infrastructure access approval systems. As your company grows, you’ll add more systems, more databases, and more users. A modern approach that leverages automation and role-based access can help bridge the infrastructure access security gap, keeping sensitive data where it belongs.

For example, think of the one-off permissions you might grant a third-party partner to develop an application to monitor a segment of your supply chain. The app stalls in development, and eventually, you terminate the relationship. You’ll also want to terminate access or risk leaving a gaping hole for hackers to probe and exploit. An automated system could shut off access as soon as the project is finished.

And that’s just one of many ways that you can use automation to bridge the infrastructure access security gap and lessen the risk of a headline-making data breach – while still making sure your employees and partners have everything they need.

If you’re ready to ditch the legacy approvals for an approach that keeps your data secure, schedule your free demo of StrongDM today.


About the Author

, Technical Marketing Expert, has held marketing leadership roles for Silicon Valley technology companies specializing in database, data management, and data analytics solutions. As head of content marketing at Splunk, Dominic contributed to boosting the company’s market visibility and its growth from a $100M to a $1.3B company. He brings relentless creativity to the task of connecting people with technical products to improve their lives. Dominic holds a B.S. degree in Public Relations from the University of Texas at Austin. To contact Dominic, visit him on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

Vendor Access Management (VAM) Explained
Vendor Access Management (VAM) Explained
Vendor Access Management (VAM) is the systematic control and oversight of vendor access to an organization's systems, applications, and data. It involves processes such as onboarding and offboarding vendors, utilizing solutions for Just-in-Time access, ensuring security, and streamlining workflows to minimize operational inefficiencies.
What Is Fine-Grained Access Control? Challenges, Benefits & More
What Is Fine-Grained Access Control? Challenges, Benefits & More
Fine-grained access control systems determine a user’s access rights—to infrastructure, data, or resources, for example—once past initial authentication. Unlike coarse-grained access control (CGAC), which relies on a single factor, such as role, to grant access, FGAC relies on multiple factors. For example, it may consider policies (policy-based access control, or PBAC), attributes (attribute-based access control, or RBAC), or a user’s behavior in a certain context (behavior-based access control, or BBAC).
Implicit Trust vs. Explicit Trust in Access Management
Implicit Trust vs. Explicit Trust in Access Management
Trust is an essential cornerstone in access management. However, not all trust is created equal. When it comes to how you approach access, two types of trust stand out: implicit trust and explicit trust.
Joiners, Movers, and Leavers (JML) Process (How to Secure It)
Joiners, Movers, and Leavers (JML) Process (How to Secure It)
People come, and people go, and while digital identities should cease to exist after a departure, many times, this doesn’t happen. At any given time, organizations can have thousands of user identities to manage and track, so when processes aren’t automated, it’s easy for many identities to fall through the cracks. This phenomenon is called Identity Lifecycle Management, and when it comes to access and security, it’s worth the time to get it right.
Reduce Security Risk with StrongDM Device Trust
Reduce Security Risk with StrongDM Device Trust
We are thrilled to announce a new feature to our StrongDM® Dynamic Access Management (DAM) platform: Device Trust. This feature amplifies your organization's security posture by employing device posture data from endpoint security leaders CrowdStrike or SentinelOne.