THE CONVERGENCE OF PHYSICAL AND LOGICAL ACCESS: WHAT IT REALLY MEANS FOR AN ORGANIZATION S SECURITY

Similar documents
Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Information Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Accelerate Your Enterprise Private Cloud Initiative

Integrated Access Management Solutions. Access Televentures

5 Reasons for IT to Get Physical with Access Control

Make security part of your client systems refresh

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

To Audit Your IAM Program

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Five Reasons It s Time For Secure Single Sign-On

MOVING MISSION IT SERVICES TO THE CLOUD

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

5 reasons for IT to get physical with Access Control

Virtual Machine Encryption Security & Compliance in the Cloud

Toward an Automated Future

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

The 2017 State of Endpoint Security Risk

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

State of Cloud Survey GERMANY FINDINGS

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Making the most of DCIM. Get to know your data center inside out

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Cognizant Cloud Security Solution

Mobile Access is the Killer App The Path to Flexible, Secure Credentials Brandon Arcement Senior Director, Product Marketing April 8, 2019

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

How to Improve Your. Cyber Health. Cybersecurity Ten Best Practices For a Healthy Network

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cisco Connected Factory Accelerator Bundles

Retail Security in a World of Digital Touchpoint Complexity

Vulnerability Assessments and Penetration Testing

Sales Presentation Case 2018 Dell EMC

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

6 Vulnerabilities of the Retail Payment Ecosystem

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

INTELLIGENCE DRIVEN GRC FOR SECURITY

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

Enabling the Always-On Enterprise

CA Security Management

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Dell helps you to simplify IT

a publication of the health care compliance association MARCH 2018

THALES DATA THREAT REPORT

Escaping PCI purgatory.

Symantec Data Center Transformation

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Cisco Start. IT solutions designed to propel your business

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

EXECUTIVE BRIEF. The Evolution of Cards and Credentials in Physical Access. In this Paper

The Modern Manufacturer s Guide to. Industrial Wireless Cisco and/or its affiliates. All rights reserved.

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

IBM Lotus Notes and Lotus Domino 7 software: the new face of business collaboration and communications.

A company built on security

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

The Windstream Enterprise Advantage for Banking

Security Automation Best Practices

Cybersecurity. Securely enabling transformation and change

Healthcare IT Modernization and the Adoption of Hybrid Cloud

How to Write an MSSP RFP. White Paper

BEYOND CJIS: ENHANCED SECURITY, NOT JUST COMPLIANCE

A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Halifax Regional Municipality

Solution. Imagine... a New World of Authentication.

Cloud Computing: Making the Right Choice for Your Organization

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

Securing Digital Transformation

Combating Cyber Risk in the Supply Chain

Practical SCADA Cyber Security Lifecycle Steps

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Why Enterprises Need to Optimize Their Data Centers

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

The security challenge in a mobile world

HOW WELL DO YOU KNOW YOUR IT NETWORK? BRIEFING DOCUMENT

Government IT Modernization and the Adoption of Hybrid Cloud

MITIGATE CYBER ATTACK RISK

Modern two-factor authentication: Easy. Affordable. Secure.

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

112 th Annual Conference May 6-9, 2018 St. Louis, Missouri

Dell helps you simplify IT

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

THALES DATA THREAT REPORT

SDN meets the real world part two: SDN rewrites the WAN manual

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

locuz.com SOC Services

SECURITY AUTOMATION BEST PRACTICES. A Guide to Making Your Security Team Successful with Automation

Transcription:

THE CONVERGENCE OF PHYSICAL AND LOGICAL ACCESS: WHAT IT REALLY MEANS FOR AN ORGANIZATION S SECURITY FOR MANY SECURITY PROFESSIONALS, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that the majority of respondents are more concerned by outside threats than those that originate internally. Contents 02 The Benefits of Convergence: Improved User Experience, Operational Efficiency, and Security 04 Challenges to Achieving PACS and LACS Convergence 06 Best Practices to Successfully Launch Convergence Projects 07 Conclusion

WHILE EXTERNAL THREATS ARE VERY REAL, working to confront internal vulnerabilities can prevent incidents from happening in the first place. By addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency. This idea is frequently referred to by the industry buzzword of convergence. From a technical standpoint, convergence is defined as the merging of distinct technologies, industries, or devices into a unified whole. In terms of access control, convergence can be viewed as the merging of physical and logical access control technologies to provide a more unified and simplified approach to identity management. Convergence means a simplified approach, said Sheila Loy, Director of Healthcare Industry, Identity and Access Management at HID Global. That can mean many different things, but it s essentially making it easier for the user to get both digital access and door access. That usually comes in the form of a card or a mobile device something that can do both. The Benefits of Convergence: Improved User Experience, Operational Efficiency, and Security Security administrators are looking for solutions that are easy, convenient, and fast. By introducing solutions that better blend physical access control (PACS) with logical access control (LACS), organizations of all types will enjoy three key benefits, including: 1) positive user experience, 2) enhanced administrative experience, and 3) improved security. Positive User Experience Oftentimes, the weakest link in even the strongest of security systems lies within the end user. If interactions with security technologies are confusing or cumbersome, employees will take shortcuts that introduce unnecessary vulnerabilities. Converged PACS and LACS solutions help reduce this risk by boosting convenience, particularly by requiring employees to only carry one card or mobile device. This type of solution also eliminates the need to constantly refresh passwords. In today s world, most end-users wear an ID badge to access facilities, which is a form factor they are accustomed to using. Even more, many employees either use a username and password or a one-time password fob or token to access networks. While this approach may provide an additional layer of security, it is prohibitive in terms of convenience. Alternatively, providing a single form factor for both physical and logical access creates a more streamlined user experience, which ultimately increases user adoption to desired security policies. While the notion of convergence is nothing new, this approach to security is becoming an increasingly viable way to mitigate threats. To explore this further, ASIS International recently partnered with HID Global to survey security professionals regarding their experience and related plans on convergence projects. The data in this paper is based on the responses of 745 ASIS International members who have direct responsibilities in Physical and/or Information Security. Building occupants who have entitlements to both physical areas and logical applications will see an en- RANK THE FOLLOWING BENEFITS OF INCREASED PACS AND LACS CONVERGENCE Average Rank on scale of 1-6 Easier to manage employee credentials One card for multiple applications 3.77 3.83 Easier maintenance and upgrades Working with technology or vendor Combined risk analysis for PACS/LACS Scalable for future technologies 3.35 3.31 3.46 3.71 2 The Convergence of Physical and Logical Access

Convergence results in greater employee efficiency and a more pleasant work environment for building occupants. It s easier for employees to carry one card or one mobile device to access both systems, rather than having to carry a card for the door as well as a fob for the computer or having to remember passwords. hancement in their experience, said Brandon Arcement, Director of Product Marketing at HID Global. Convergence results in greater employee efficiency and a more pleasant work environment for building occupants. It s easier for employees to carry one card or one mobile device to access both systems, rather than having to carry a card for the door as well as a fob for the computer or having to remember passwords. In terms of logical or network access, one major pain point for end users is the need to remember and frequently reset their passwords. When ASIS International members were asked, How is access to network and logical applications done today?, a resounding 85% of respondents indicate that they use a username and password. 85% of respondents also indicate that they have an organizational policy regarding the creation of passwords, such as requiring numbers or special characters. Not only is this inconvenient for users and administrators, it presents another common security risk: employees writing their passwords on notes left visible on their desk. Enhanced Administrative Experience Converged access control solutions provide an improved administrative experience. When survey respondents were asked to rank a series of benefits of PACS and LACS convergence, the top response was Easier to manage employee credentials, followed by One card for multiple applications. reduces costs for additional or replacement cards, as well as reduces the time required to produce multiple credentials for individual applications. According to survey data, the value of leveraging smart cards for applications beyond physical access is more than theoretical 73% of respondents agree that they have interest in using smart cards for applications beyond traditional physical access control. Finally, more converged access control solutions provide security administrators with more visibility into audit data. This makes achieving compliance easier, thus reducing the potential for associated fines and damaged reputations. Improved Security The most important benefit of any technology is improved security. Innovative technologies for physical access include contact and contactless cards with encryption that adds additional layers of security upon entering doors, elevators, or parking garages. Meanwhile, digital certificates loaded onto that same smart card can ensure trusted login to networks and appli- These top responses reflect two key angles within an improved administrative experience. First, many applications used to manage credentials are now web-based with secure, simple access for administrators. This allows security teams to issue, modify, or revoke credentials away from the office or during off-hours. The second angle is the ability to deploy a converged, high value form factor that allows for multiple applications. For example, using one card for multiple uses 3 The Convergence of Physical and Logical Access

cations, as well as encrypt emails and digitally sign documents. Converged solutions improve security in three key areas: Increased Adoption Rate of Converged Credentials: With a simplified experience, users are more likely to adopt desired security protocols. HID Global s Loy says, Your employees may have had a badge to access doors for quite some time. But when they don t have to carry extra form factors like a fob or token, or they don t have to take extra steps by entering a username and password, it provides a streamlined end user experience that increases adoption rate. Credential More Closely Guarded: A converged credential is used more frequently and is relied on for more daily activities, thus is more quickly noticed when lost or missing. Whenever someone uses a credential for applications beyond basic physical access control, it increases value to that card and adds more reason to keep it handy now that card becomes more closely guarded, Arcement notes. Reduced Need for Strong Passwords: Security is also improved because cards can eliminate the need for WHAT CHALLENGES DO YOU CURRENTLY HAVE WHEN WORKING WITH YOUR ORGANIZATION S IT DEPARTMENT? Select all that apply Project prioritization Conflicting objectives passwords, which are often the weak link in logical access control. Beyond reducing this vulnerability, leveraging a converged card requires users to remove their card to move around in a secure facility, automatically locking a computer upon card removal. From improving user and administrative experience to strengthening organizational security, upgrading access control to leverage a more converged credential seems like a valuable exercise. However when it comes to actually implementing convergence-based projects, multiple barriers can disrupt progress. Challenges to Achieving PACS and LACS Convergence Despite an increasingly relevant business case and a growth in available technologies, the implementation of convergence projects can be described as surprisingly slow. This lack of adoption can be attributed to two primary obstacles: organizational and technical challenges. Organizational challenges include common conflicts between Physical Security and IT departments, like budgets and priorities, whereas technical challenges encompass the implementation itself, such as upgrade paths and compatibility. Project ownership/ division of labor Technical acumen Conflicting budgets 0% 10% 20% 30% 40% 50% 60% Organizational Challenges Organizational and internal communication challenges serve as a key barrier to implementing convergence projects, most often due to a lack of alignment between priorities and objectives. When asked what obstacles Physical Security professionals face when working with their organization s IT department, top answers included: 4 The Convergence of Physical and Logical Access

Executive leadership is willing to spend money to avoid similar outcomes for their organizations. There s no guaranteed assurance, but they want to ensure they re keeping up with risk mitigation best practices, which includes attention to both physical and cyber security. 1) project prioritization and alignment, 2) conflicting objectives, and 3) project ownership/division of labor. Traditional Physical Security professionals often have a background in law enforcement or military. They re wellskilled in forensic investigations, executive protection, and physical security measures guards, fences, and alarms, Arcement says. On the other hand, the IT teams are traditionally more comfortable with data protection and cyber security measures but, they are not as comfortable in the physical domain, even with something like cards. Because these departments have evolved separately, the two face challenges in collaboration and communication. Fortunately, progress in building stronger relationships is growing. When Physical Security professionals were asked how they currently work with their IT departments, a resounding 60% said they collaborate to establish security best practices, with 55% indicating they look for new technologies together. Budget is another common concern for convergence projects. IT departments typically enjoy much larger IN WHAT WAYS DO YOU CURRENTLY WORK WITH YOUR ORGANIZATION S IT DEPARTMENT? Select all that apply Establishing security best practices Looking for new technologies together budgets than Physical Security departments, and they re used to receiving funds for constant updates to keep up with advances in technology. Physical Security departments, on the other hand, may invest in cameras and card systems that are expected to remain in place for decades. Such thinking is no longer practical as technology evolves and vulnerabilities are publicly revealed. Physical security equipment needs to be on a refresh rate closer to that in the IT industry. 55% 60% Most convergence projects 54% according to the ASIS survey are shared in both the Physical Security and IT budgets, with 24% percent coming exclusively from the Physical Security budget and 22% percent from the IT budget. No partnership Sharing budget Other 7% 16% 13% Physical Security departments should work to leverage IT budget and justify their investments by highlighting improved risk management and asset protection to the organization. They should stress to leadership that a budget that covers convergence would enhance user experience, which can attract better em- 5 The Convergence of Physical and Logical Access

ployees and be used to differentiate the organization from its competitors. Convergence can also help mitigate risk, which is especially necessary in light of the recent high-profile hacks of companies including Home Depot, Target, and Equifax. Executive leadership is willing to spend money to avoid similar outcomes for their organizations, Arcement said. There s no guaranteed assurance, but they want to ensure they re keeping up with risk mitigation best practices, which includes attention to both physical and cyber security. WHAT CONCERNS DO YOU HAVE ABOUT MORE CONVERGED SOLUTIONS? Select all that apply Managing multiple credentials in multiple systems Difficulty implementing and maintaining new technologies Increased technological complexity 49% 55% 68% Technical Challenges Many organizations may be hesitant to adopt a more converged access control system due to implementation concerns, including establishing an upgrade path, compatibility with existing systems, and overall complexity of the upgraded solution. Furthermore, there is an understandable fear of needing to rip and replace existing systems to complete the upgrade. To illustrate this point, survey respondents were asked to identify their concerns regarding more converged PACS and LACS solutions. The top answer involved managing multiple credentials in various systems, which speaks to operational efficiency, whereas other top concerns included difficulty of implementation/maintenance and increased technological complexity. Despite these challenges, understanding implementation best practices, leveraging modern technologies, and collaborating with trusted partners can facilitate the introduction of converged access control solutions more easily than ever. Best Practices to Successfully Launch Convergence Projects The primary technical challenge for organizations is the notion that introducing converged access control requires an interruptive rip and replace of existing technology. The reality, however, is that the process can be more simple, such as by starting with converged cards. We re seeing a trend toward converged cards where it s no longer exclusively the physical access control credential. Organizations are looking to either extend the contactless technology on the card or to embed an additional contact chip on the card for strong authentication to logical access applications as well, Arcement said. 72% of survey respondents indicate that they would like to leverage smart cards for additional applications, with the most useful including network and computer login. Beginning with a converged card approach essentially adds logical access to an existing physical access control system. By doing so, organizations can create a migration path that increases security and convenience but still utilizes existing infrastructure, access control systems, and panels. This allows more converged solutions to be implemented without needing to rip and replace, making upgrades to newer technology less disruptive. In terms of logical access, this process usually includes adding credential management software solutions to the IT side of the house to manage the lifecycle of digital certificates on a single ID badge, Loy said. There can also be multiple integration points to help ease the workflow of getting those cards provisioned for desktop use, making it as streamlined as possible. Some providers also offer professional services to sup- 6 The Convergence of Physical and Logical Access

port whatever is needed to get the system running as quickly as possible. Arcement also recommends that organizations first pilot the technology before deploying it company-wide. A marathon starts with one step, and it can be overwhelming to think about all the things that need to be done during the transition of an entire organization, he said. We have seen companies be most successful by structuring pilots and deployments in phases and by starting deployment in a single building, floor, or department. This enables the project team to clearly understand the opportunities they have with the new technology, the limitations that may exist, and the policy changes that might be necessary to consider before deployment throughout the entire organization. To overcome organizational challenges, increased collaboration between Physical Security and IT is key, particularly when budget is involved. Loy notes that while budget is a concern, the two departments can share expertise and information to be more cost effective. Sometimes to get greater security you have to spend more money, she said. For example, companies typically spend under $10 on a card, but with a converged solution that card could cost $20. You must understand what you re getting and why it s more expensive, and you have to understand risks and associated risk tolerance. Think how expensive it will be if you become the next headline or ransomware attack versus making a change in your everyday security to shore up systems from a physical space and a digital space. Bridging the communication gap between IT and Physical Security presents another opportunity for increased collaboration. To start, both sides should acknowledge their shared objective the security of the organization and recognize the expertise that each side has in the equation. Departmental leadership must understand that their security responsibilities are dependent on vulnerabilities on the other side of the house, because it can mean entry points that ultimately threaten the overall organization. Facilitating a more collaborative environment can begin with physical proximity and project involvement. To start, IT and Physical Security can share a common workspace, such as an operations center or server room. These teams can also establish a recurring forum to provide updates, discuss vulnerabilities, and share audit data. Survey results shows that while 89% of respondents indicate they conduct a Physical Security risk analysis, only 2/3 of those respondents share the findings with their IT team. This collaboration should be leveraged to create joint proposals to company executives that show mutual benefit - for example, with increased convergence, ticket volume to the IT help desk will decrease due to a reduced need to reset passwords. Finally, once a convergence project begins, it is important to train users on the benefits of the new approach. Arcement offers, Managing expectations is critical as organizations move to more secure technologies there is a slight change to the user experience. He compares it to shoppers adjusting to using smart card chips on their credit cards instead of magnetic stripe, noting, At first, the change presented an inconvenience to the user, but cardholders accepted the change because they recognized the added security it provides in this age of identity theft. This offers a good analogy to share with your user population that this transition is first and foremost designed to elevate security for the organization and all who occupy its facilities. Conclusion Physical Security and IT departments are recognizing that now, more than ever, converged threats are real. Vulnerabilities that exist in both domains are fronts that have traditionally been handled separately. In isolation, they can be viewed as managed risks. But when malicious attacks or simple carelessness connect these vulnerabilities, the risks become more than the sum of their parts. To meet the growing security needs of today s organization, Physical Security and IT must better align their budgets and objectives to reduce risks while ensuring convenience so end users abide to company policies. While more converged physical and logical access technologies can help show the way, the ultimate responsibility lies within security professionals to chart the right course for their organization. 7 The Convergence of Physical and Logical Access