Security Experts:

The Rising Threat Stemming From Identity Sprawl

Identity sprawl in the age of remote working and business transformation is a threat to cybersecurity

The identity sprawl generated by remote working and business digitization is out of control. This is the clear message from a global survey of more than 1,000 IT professionals.

The survey was undertaken by Dimensional Research for One Identity, a provider of unified identity security, and returned similar results across all industry verticals. 

Larry Chinski, One Identity’s VP of global IAM strategy, described the three primary results of the survey (PDF). These are the rapidly expanding and almost unchecked growth in the number of identities in use (sprawl); the large number of different tools used to manage the identities, leading to poor overall visibility; and the need to find a unified approach to identities as a solution. 

“We found that organizations have experienced an enormous amount of identity sprawl, especially over the last two years,” he told SecurityWeek. Eighty-four percent of the respondents said the number of identities they manage has more than doubled. Twenty-five percent said the number of identities they manage has increased by a factor of 10 or more. And 95% of the respondents are struggling to manage them.

“To get more control over their identities,” continued Chinski, “companies are investing in more and different types of identity-based tools. But the more tools you drop on the problem, the more siloed and fragmented it becomes.” The result is poor visibility into the overall problem.

Fifty-one percent of the respondents struggle with this lack of visibility; 55% complain that it complicates provisioning and deprovisioning; and 85% have employees with more privileged access than is needed for their work.

“So, although the tools are good and perform well,” Chinski told SecurityWeek, “the problem is that each one of those tools doesn't necessarily understand the identities it is managing are the same identities that other tools are managing. When you create that fragmented state, you don't have a single way to manage identities from a central location.”

This leads to the third conclusion from the survey: users need and are beginning to demand a unified solution to the identity problem. “We found that the ability to unify those tools is something that 62% of respondents would like to achieve,” he said, “and 45% believe they would benefit from end-to-end unification of all the identities and accounts.”

One of the problems with many surveys is that they are designed as marketing tools to justify the vendor’s own product. “I wish that were true here,” said Chinski. “I wish we could turn round and say ’we have the solution’. But we don’t – at least, not yet.”

The problem is getting worse. Two years ago, it was relatively easy to get good identity protection because everybody came into a central office protected by firewalls and other perimeter defenses. “But when people are out in the remote, you have to manage on top of the identity – and that's where it gets more difficult,” he said. “That's why a unified approach is the best way to manage the identity sprawl and to resolve that fragmented approach to identities.”

There is no one product that solves this problem. “The survey,” concludes Chinski, “describes a paradigm shift and philosophy around cyber security that needs to be employed. The different fragmented existing tools need to be unified. We haven't got the one tool to do that yet. So, the key finding of the survey will hopefully get individuals and customers to understand that this is a process. Now you can start that process anywhere with different types of technology solutions, but the survey indicates that a new philosophy and methodology needs to be applied.”

Related: Are Overlapping Security Tools Adversely Impacting Your Security Posture?

Related: CISA Expands 'Bad Practices' List with Single-Factor Authentication

Related: Pass the Hash Remains a Poorly Defended Threat Vector

view counter
Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.