Over the past few weeks, we’ve shared some tactics you can implement to improve the security posture of your organization, such as conducting a Security Risk Assessment or maintaining the security of your privileged accounts. This post explores the importance of best practices for user account management.
All user accounts in your network should only be assigned to active staff members. Terminated employee accounts should be disabled immediately. Most organizations think they have good user account management in place, but it’s common for us to find at least one terminated employee account still active in the network when we conduct assessments. Set up a periodic review of accounts to ensure that the accounts are always being disabled at the time of termination and document the process in a policy. Documentation is key to every business practice.
As industries move towards more cloud-based systems and applications, it’s vital to the security of your organization that these accounts are removed at the time of termination and that future access to the network or system is prevented. You don’t want a disgruntled employee inside your network or on your applications once you’ve terminated their employment. Safeguarding the system also protects you from possible data breaches from the user or a hacking attempts.
By putting these policies into practice, you can implement better controls for user accounts in your environment. In our final post next week, we’ll discuss the benefits of implementing Security Information and Event Management (SIEM) solutions and Security Operation Center (SOC) services.
For more information about account management, contact us today.