Blog | G5 Cyber Security

Secure System Access

TL;DR

Reduce risks from third parties by limiting their access to only what they absolutely need, regularly reviewing those permissions, and monitoring for unusual activity. Use strong authentication methods.

1. Understand Third-Party Access

First, identify all third parties with any access to your systems. This includes vendors, contractors, cloud service providers, and anyone else who isn’t a direct employee.

2. Principle of Least Privilege

Give each third party the minimum level of access required to perform their job – and nothing more. This is crucial.

  1. Review Existing Permissions: For each third party, carefully examine what they can currently do.
  2. Reduce Access: Remove any unnecessary permissions. If they only need read-only access to a specific database table, don’t give them write access or admin rights.
  3. Dedicated Accounts: Use separate accounts for each third party instead of sharing credentials.

3. Strong Authentication

Protect access with robust authentication methods.

4. Access Control and Monitoring

Control who has access and keep an eye on what they’re doing.

  1. Role-Based Access Control (RBAC): Group permissions into roles, then assign third parties to those roles. This simplifies management.
  2. Logging & Auditing: Enable detailed logging of all third-party access activity. Regularly review these logs for suspicious behaviour. For example, in Linux:
    sudo auditctl -w /path/to/sensitive/file -p rwa -k third_party_access
  3. Alerting: Set up alerts to notify you of unusual activity (e.g., access outside normal business hours, large data downloads).

5. Regular Reviews

Access needs change over time. Don’t set it and forget it.

6. Contractual Requirements

Your contracts with third parties should include security requirements.

7. Cyber security Awareness Training

Ensure third parties understand your cyber security policies.

Exit mobile version