Identity Risk

Background image

The Unmeasured Risk of Third-Party, Non-employees

While many organizations assess the risk of third-party, non-employees at the organizational level, they usually know very little about the users who will be granted assess.  This can be attributed to shortcomings that most organizations have in their onboarding, auditing, and offboarding processes for third-party, non-employee users.

Oftentimes, these processes are highly manual, time-consuming, and rushed in order to accelerate time to utilization. However, while these processes may take a long time, they are often incomplete and consequently do not result in well-informed access decisions.  On the contrary, good data on the actual users, their business needs, and risk to the organization is lacking, which leads IT departments to frequently “assume” access needs based on previous user profiles.

What’s needed is an authoritative source of third-party data that takes into consideration the unique needs of third-party users and facilitates collaborative information gathering that includes internal and external sources, ongoing risk assessments, revalidation, and timely offboarding processes.

According to a 2018 Ponemon Institute study, most organizations don’t even know their exact number of non-employees, and only one third of organizations had a list of all non-employees with which they share sensitive information.

SecZetta Can Help

SecZetta’s Third-Party Identity Risk solution features a comprehensive set of Identity Risk capabilities that enable organizations to not only improve the efficiency and cut the cost of managing third-party identities but most importantly to reduce the risk.

Key to this value proposition is transparency into the dynamic relationships organizations have with each individual third-party identity. This facilitates well-informed, risk-based decisions about provisioning, verifying, and deprovisioning access which can’t be achieved using homegrown, HR, and IAM solutions. Importantly, the organization’s business processes can be easily automated by customizing SecZetta’s “no code” workflows.

Another key feature is SecZetta’s ability to risk rate individual identities. With the SecZetta risk rating feature, individual identities can “inherit” the risk assessed to their employer through an organization’s third-party risk assessment but can also be assessed individually based on SecZetta’s proprietary algorithms or factors like their work history, location, role, and level of access. By risk rating each individual non-employee, organizations can ensure that access is based on least privilege, meaning that users have the appropriate privileges to the appropriate resources at a specific point in time, and that access is terminated in a timely manner when it is no longer required.

How We Do It

  • Identity Risk Modeling

    • Risk ratefor eachindividual third-partyidentity 
    • Inherit risk from employer third-party risk assessment
    • Proprietary risk scoring methodology 
    • Set thresholds to trigger conditional approvals 
    • Integrate with existing vendor risk solutions for holistic view of exposure 
    • Automateworkflows to support identity re-validation audits  

  • Third-Party Identity Lifecycle Management

    • Central repository for all third-party, non-employee data 
    • Purpose-built to manage non-employee and third-party resources 
    • Easily integrates with IGA, IAM, and other identity verification providers
    • Pre-set access termination time
    • One step offboarding for all identities associated with a single, third-party organization
    • Robust reporting to provide visibility of your highest risk identities (non-employees) 

The Risk Management Blind Spot

Download our latest whitepaper to read more on : Risk management best practices Applying risk tolerance for third parties Third-party identity risk management responsibilities SecZetta’s approach to third-party identity management

Download Now