As you may have read from previous blogs, RSA® is writing the story of resiliency in partnership with both new and existing customers to solve their security challenges. While many customers expand their authentication footprint or implement work from home policies and practices with RSA SecurID® Access trials, there are additional considerations to think about as enterprises move up the Identity and Access Assurance maturity curve.
Let’s review a typical scenario.
Great news, you’ve adopted RSA SecurID Access, the industry-leading multi-factor authentication solution! You and your team now have the identity assurance that your remote workers are who they say they are and can securely access the applications they need – including SaaS, cloud and other IT resources – to be productive.
Of course, as you open your network to more remote access, it becomes more critical to constrain users to least privileged access and ensure visibility and control. The next layer of assurance is Identity Access Assurance – knowing who has access to what, how they were granted that access and if it is suitable for their role. A layered approach to security moves along a maturity path, shifting logically into the governance of access. Now, the question is how can you gain in-depth access visibility for every application, every user and every entitlement, and comply with mandates and compliance issues without getting overwhelmed?
Given the new, more dynamic workforce, there may be situations you haven’t considered lately. Below are some recommendations to think over:
- Running regular and automated certifications to ensure the right people have the right access to IT resources, enforce policies such as segregation of duties, and provide reports and dashboards to prove compliance
- Automate processes, like RSA SecurID token provisioning, to help scale across the organization to meet rising demands
- Minimize helpdesk costs through task automation like password resets
- Implement user self-service to keep pace with requests from the new mobile workforce needing remote access to resources
- Manage changes in the mobile workforce and enforce a sound Joiner/Mover/Leaver policy to remediate orphaned or over-privileged users and automate the provisioning and de-provisioning of remote access quickly.
These are just a few things to consider as you expand your remote workforce outside the controlled environment of office-based IT. Proper Identity Governance can mitigate digital identity risk, maintain a continuous state of compliance and enforce user access policies now and in the future.