Industry Research : Avecto says that admin privileges would have helped prevent the Global Payments 1.5m card credentials data breach
Commenting on the aftermath of the data breach at an Atlanta-based card transaction process, Avecto says that the possibility that the breach was caused by a compromised administrative account that was insufficiently protected shows that governance is a central requirement of modern IT security.
Paul Kenyon, chief operating officer with the Windows privilege management provider, says that financial services companies have a duty of care – and in many cases a firm legal obligation – to meet minimum security standards laid down by legislation and several governance organisations. With 1.5 million sets of card credentials going walkabout from the transaction processor’s computers, these standards have not been met, especially on the PCI DSS front.
"As the PCI Security Standards Council says, `the keystone is the PCI Data Security Standard, which provides an actionable framework for developing a robust payment card data security process - including prevention, detection and appropriate reaction to security incidents’," he said.
More than anything, Kenyon notes, the data breach incident – as well as leaving a sour taste in a number of US and Canadian cardholders – teaches IT security professionals that data breaches can still occur in major financial services companies, but that multiple layers of security can go a long away to helping to prevent future data breaches of this type.
One security analyst, he explained, has suggested that the privileged accounts that are reportedly at the heart of this breach need several layers of protection to properly insulate them from hackers.
"Our observations on this breach suggest that minimising administrative privileges – an exercise in the principle of least privilege – would have gone a long way to preventing the breach" he said.
"In a properly designed, administered and maintained environment there is no requirement for any user to have administrative privileges on their day-to-day account. In addition there should be no account which has both administrative privileges and access to networks outside of the organisation, such as Internet or email services," he added.
"The use of privilege management technology can help to prevent the leak of data, as well as supporting the setting up of simple policies for on-going monitoring - and auditing - of all privileged activity."
Today's Tip of the Day - Handling Electronic Mail
More Editorial From Avecto
Published: Friday, April 13, 2012