Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

Considerations When Firing a Network Security Administrator

When it comes to letting someone go, very rare will you find a business leader who enjoys that part of the job. When you have to fire a network security administrator, not only is it a downer, it’s a risky proposition – unless you follow basic steps.

When it comes to letting someone go, very rare will you find a business leader who enjoys that part of the job. When you have to fire a network security administrator, not only is it a downer, it’s a risky proposition – unless you follow basic steps.

Pivot Point Security, an information security assessment firm, has published 24 things to consider when releasing a network security administrator from his or her job. Some of the items on the list go without saying, and others are essential. Here are a few key considerations when you have to let that someone in that all important position go:

ManagementPre-termination:

• Understand what systems are external to your organization for which the user may have privileged access: hosted web sites, ISP routers, exposed administrative interfaces on firewalls, DR sites, PBX interfaces. User account reviews and changing of administrative level passwords post-firing are likely necessary. Be aware that system-to-system communication may leverage these passwords and that some things may “break” if you don’t map these dependencies before making the changes.

• Ensure that all remote access mechanisms – VPN, Citrix, Terminal Services, and Dial up modems/RAS are secure. Determine if local authentication takes place at any of these points (as post-firing you will need to disable the employee’s accounts), do a review/clean-up of all accounts, and force a password change.

Termination:

• De-provision access to all systems possible just prior to notifying the individual. (Remove all administrative access)

• Ensure that all assets: phones, PDA’s, laptops, credit cards, keys, access cards, and tokens are retrieved and tracked.

Advertisement. Scroll to continue reading.

• Notify all personnel immediately that the person is no longer an employee and that any communication with the individual needs to be reported to management.

• Notify all consultants, vendors, and business partners immediately that the person is no longer an employee and that any communication with the individual needs to be reported to management.

Post-termination:

• Remove all ex-employee administrative access.

• Change company domain account password with domain name vendors. Change the technical administrative contact if necessary.

• Ghost laptop and make copy of all shares with critical data.

• Change voice mail password.

• For all critical systems (remote access, key applications, firewalls, etc.) validate that logging is enabled and working properly and monitor the logs for a period of time to detect any rogue access attempts.

As the report notes, the greater risk the employee and situation pose – the more of these practices you will need to execute. The full PDF for “Firing a Network Security Administrator – Best Practices” can be found here.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.