How Australian Organisations Can Achieve the Perfect Equilibrium Between Accessibility and Security


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Finding the Right Equilibrium Between Access and Security for Australian Organisations

Quick Read

  • Forrester Research indicates that 80% of security incidents involve compromised or mishandled privileged accounts.
  • Ransomware continues to pose a major threat to organisations in Australia, with inadequate access controls identified as a key vulnerability.
  • The Australian Cyber Security Centre’s (ACSC) Essential Eight framework plays a crucial role in assisting organisations with access control and privileged access management.
  • Achieving a balance between security measures and user experience is vital to prevent employees from circumventing strict security protocols, which may result in data leaks.
  • Organisations ought to implement a policy-driven strategy for managing access exemptions, encompassing time-limited permissions and multi-factor authentication (MFA).
  • Comprehensive identity security strategies should incorporate various defensive layers, such as application control, user hardening, and privilege management.
How Australian Organisations Can Achieve the Perfect Equilibrium Between Accessibility and Security


The Changing Cybersecurity Landscape in Australia

The cybersecurity environment in Australia is becoming increasingly intricate as time goes on. Ransomware stands out as a persistent and detrimental threat to both organisations and vital infrastructure. As noted by the Australian Cyber Security Centre (ACSC), ransomware incidents frequently exploit weaknesses in access management frameworks, underscoring the need for organisations to enhance oversight of privileged access.

Even a minor security lapse, such as an inappropriate granting of permissions to a foreign contractor or a poorly configured user account, can put an entire network at risk. This threat is intensified by the growing array of regulatory frameworks in Australia, including the Essential Eight developed by the ACSC to address cybersecurity vulnerabilities.

The Importance of the Essential Eight in Access Management

At the heart of the Essential Eight is the focus on overseeing access controls and administrative privileges. The Australian government has initiated the Protective Security Policy Framework, mandating organisations to “limit and monitor privileged system accesses.” These initiatives are designed to drastically lower the risk of cybercrime, particularly ransomware, by guaranteeing that only authorised personnel can access critical systems and sensitive data.

Nonetheless, implementing stringent access control policies can be a two-edged sword. While stricter environments may enhance security, they often lead to negative user experiences. Employees or contractors might seek to bypass these constraints, either consciously or inadvertently, leading to data being exposed to unauthorised external platforms.

Managing Access Exemptions Effectively

A vital aspect of maintaining an equilibrium between security and accessibility is how organisations manage access exemptions. While deviations from standard access protocols are occasionally necessary, they must be approached with caution to prevent the introduction of new security risks.

Assessing Exception Requests

When a request for an exception is submitted, organisations should evaluate both the authenticity and urgency of the request. Is it coming from a trusted high-level executive, or is it from an externally contracted individual with limited supervision? Understanding the context helps assess the associated risks of granting the exemption.

For instance, if temporary access to a sensitive system is requested by a contractor, it is essential to scrutinise the request thoroughly and consider if alternative solutions, such as granting restricted access with enhanced oversight, would be adequate.

Temporary Exemptions

A practical tactic is to provide temporary exemptions. By enforcing an expiration date on access permissions, organisations can mitigate the risk of exposure to vulnerabilities. If access is only required for a week, permissions should automatically lapse after that timeframe. However, this method presents its own challenges.

Some propose lifting all restrictions on an endpoint temporarily to facilitate operations, yet this tactic broadens the attack surface and contradicts the Essential Eight’s principles regarding limiting administrative privileges. A more balanced strategy would involve granting only necessary permissions while mandating multi-factor authentication (MFA) for any exception requests.

Policy-Based Exception Management

To minimise risks, organisations should embrace a policy-driven method of handling exceptions. Policies need to be adaptable enough to manage a range of scenarios, from urgent access requests to routine exceptions, while also being stringent enough to avert abuse. For example, protocols could stipulate that all exception requests go through a formal approval process with multiple stakeholders involved, ensuring that security remains a priority over convenience.

The Importance of User Experience in Security

While it’s common for organisations to heavily prioritise security, doing so at the detriment of user experience can lead to adverse outcomes. If employees find the security landscape excessively restrictive, they might resort to circumventing it altogether. This could result in the adoption of unauthorised cloud services, personal devices, or other third-party platforms that fall outside the organisation’s control or compliance measures.

Comprehensive Identity Security Strategy

To prevent this, organisations should implement a comprehensive identity security strategy that includes multiple layers of defence, such as application management, user application fortification, and administrative privilege oversight. By coordinating these measures effectively, the organisation can reap the benefits of digital transformation while avoiding unnecessary security vulnerabilities.

For example, integrating MFA with privilege management tools can ensure users access necessary systems only under secure conditions. Additionally, continuous monitoring and routine audits can assist in pinpointing potential vulnerabilities before they can be exploited.

Conclusion

As the cybersecurity landscape in Australia progresses, organisations must discover methods to harmonize security with accessibility. With the rise of ransomware and other threats, proper privileged access management has taken center stage. The Essential Eight and Protective Security Policy Framework provide a regulatory foundation, but organisations must proactively manage exemptions to ensure security does not compromise user experience.

By employing time-limited, policy-driven exemptions and integrating a robust identity security strategy, organisations can achieve the right balance between safeguarding their assets and allowing their workforce to stay productive.

Q&A

Q: What is the primary cybersecurity concern for Australian organisations?

A:

Currently, ransomware represents one of the most pressing threats for Australian businesses. It frequently exploits flaws in access management and privileged account controls, highlighting the necessity for organisations to strengthen their security protocols.

Q: In what ways does the Essential Eight framework assist with cybersecurity?

A:

The Essential Eight, formulated by the Australian Cyber Security Centre (ACSC), comprises a set of guidelines aimed at helping organisations alleviate security risks by concentrating on aspects such as application patching, restricting administrative privileges, and employing multi-factor authentication.

Q: Why is balancing security and user experience crucial?

A:

If security measures are overly stringent, users might attempt to bypass them, which may lead to insecure behaviours, such as using unapproved devices or services. Such actions could result in new vulnerabilities and expose the organisation to heightened risks.

Q: What are access exemptions, and why are they important?

A:

Access exemptions are temporary permissions enabled for users needing access to specific systems for a limited duration. While they are vital in certain situations, they should be managed judiciously to avert prolonged exposure to security threats.

Q: How can time-sensitive exemptions enhance security?

A:

Time-sensitive exemptions automatically terminate access after a specified duration, thereby lowering the chances of long-term vulnerabilities. This guarantees that permissions are not left active indefinitely, which could be misused by malicious entities.

Q: What significance does multi-factor authentication (MFA) hold in access management?

A:

MFA introduces an additional security layer by necessitating users to provide two or more verification factors to access a system. This complicates matters for attackers, even if they manage to obtain a password.

Q: How can organisations ensure the effectiveness of their access control policies?

A:

Organisations should periodically evaluate their access control policies, ensuring they align with industry best practices and regulatory requirements. Implementing continuous monitoring solutions and conducting regular security assessments can help identify potential vulnerabilities.

Posted by David Leane

David Leane is a Sydney-based Editor and audio engineer.

Leave a Reply

Your email address will not be published. Required fields are marked *