Responsible digital glossary
Lire l'article[NEW] MYDATAMANAGEMENT TO CLEAN UP YOUR OBSOLETE, UNUSED AND VOLUMINOUS DATA
Solutions
Effective response to six major challenges in data security
#1 user-interacting platform for detection
Discover the platformBest practices to improve Microsoft Teams security
Download the infographicOur resources
Check out our useful resources for improving data protection
Microsoft 365
03 September 2019
With the ongoing data proliferation throughout your organisation, how can you gain visibility and ensure that the CIO has control of the situation? Or give your users visibility to their data security: delegations, access to sensitive documents, anonymous sharing,…
The workspace is no longer limited to specific endpoints or networks. Users share folders, give access, access files, and communicate externally, all from any location with any device. Today’s digital environment brings a multitude of possibilities.
The CISO, CIO, head of HR, CFO, DPO and others are increasingly worried about the security of these tools and data. The perimeter is constantly extending as a result of migration to the cloud, digital transformation and expanding collaboration. In a recent study, the Ponemon Institute revealed that 52% of surveyed companies’ keep their sensitive and confidential data in SharePoint [1].
To ensure that everyone’s data is protected, it’s crucial that only the correct rights and permissions are granted for all resources: users, applications and documents. It can be challenging to ensure that each user – whether an administrator, a member of the exec committee or an employee – has appropriate and up-to-date permissions. In some cases, access rights and permissions can be the unintentional result of a chain reaction: a domino effect of access and sharing following exchanges and conversations.
With more users, more data is created. Monitoring the activity of a multitude of data stores or libraries and understanding what is happening seems almost impossible.
How can the CISO or CIO gain visibility and ensure that the situation is not out of control? How can the users understand their data security?
There is a huge number of possibilities for users to manage and share their data, and the tools are constantly being enriched with additional services and features. It’s therefore critical to put in place a governance strategy so that the CISO and the user can ensure the security and integrity of the data.
The starting point is to determine where the risks are:
Are email accounts compromised right now? Who is viewing sensitive SharePoint files? Is there any external or anonymous sharing? What permissions and rights exist, who can access which account, what accesses and access modes are observed, what devices are synchronized, which rules are configured?
Identifying and correcting excessive rights and unauthorised configuration adds great value. Thereafter, it is vital to maintain the health of the environment. Companies have to constantly monitor changes and regularly verify the configuration, rights and permissions. Real time alerting when highly sensitive operations occur ensures that issues are dealt with promptly and breaches are avoided.
By monitoring logs and other data in Office 365 or on-premise SharePoint, it is now possible to identify suspicious access, sharing, location, and change of rights or configuration – on a per user or per resource basis.
Personalised user-based protection is about understanding what’s legitimate and what’s not. Beyond statistics, or conventional behavioural analysis, a phase of automatic learning allows the creation of a profile of the user or library. Each action that occurs can be analysed in its exact context (geolocation, schedule, connection protocol, application, …) to determine whether it is legitimate or not.
When an alert is issued, it can be sent to CISO team, a SIEM and/or a SOC. It can also be delivered directly to users, for immediate validation by the user who understands how their data should be accessed. The user can see the rights, the devices, the delegates and the accesses to their resources, and confirms or queries the status of their account via a dedicated page: MyDataSecurity.
For each potentially dangerous action, the user immediately reports it to the SOC: a new download or synchronization, access to a sensitive document or library, a full access delegation,… The alert can be immediately addressed by the user, and the user has, for the first time, global visibility to their data security.
Large organisations benefit through this automation. Validation of account security is via such automated engagement with users. The support team focuses only on the alerts where users have confirmed real issues. The security team can quickly investigate through a dashboard that centralizes the users’ notifications and allows forensic analysis of the underlying activity.
Users become the first line of defense for the company.
End-user validation adds unprecedented value to the operation of a traditional SOC, with a double advantage: on the one hand, preventive – each user is aware of their own security; on the other hand, curative – any abnormal or malicious behaviour can be detected and remediated quickly, with clarity as to the underlying cause.
This approach is essential for any organization that wants to increase the security of its information system and the governance of who accesses what? Who can do what? Who shares what? It provides full visibility to the most sensitive Office 365 operations.
With a dynamic and collaborative approach, the review of rights and current access is highly efficient and avoids resource limitations. It offers a company wide service at a lower cost. Security breaches are reduced.
[1] Ponemon institute research report, May 2017
Recent articles
Subscribe to our newsletter and receive new contents every month
Our articles
These articles may
interest you