Reversing the hidden risk of permission creep

Issue 6 2022 Information Security

Does the following scenario ring true? An employee starts at the bottom, working their way up through the organisation. As they are promoted, they require access to different applications and files. Within a couple of years, they have accrued an impressive number of permissions on their user account, even though they don't need many of those privileges.

Now, imagine someone gets their hands on that well-permissioned account – what could they do? If it's a criminal, they can unleash a very effective and widespread ransomware attack. If it's the employee, they might consider committing fraud, stealing competitive business information or causing damage in self-righteous rage. Whatever the scenario, user accounts are the preferred way to compromise business technologies.

"It's not even a claim that needs qualification anymore. Whether you look at reports from Gartner, Microsoft or other sources, compromised user accounts are almost always at the root of successful breaches. It has inspired a surge of identity-driven security, such as zero-trust and data-centric privilege management. But if we look at the source of the problem, it's usually because user accounts gain too many access rights," says Paul Green, head of Microsoft Identity and Access at cybersecurity company, Performanta.

The source of permission creep

Permission creep, also called access creep and privilege creep, is when a user account has permissions it doesn't require. This creep can occur in two ways: employees can attain permissions as their career evolves within the organisation, or they might gain temporary permissions for projects or events that are never withdrawn.

It's tempting to blame administrators for such oversights, but permission creep can often occur to meet business needs. For example, an entire team might gain specific permissions because a few members require those access levels. Whole departments could enjoy access to certain information to accommodate specific staff members.

Overlaps between different parts of the business also create elaborate permissions – legal and HR working on employment contracts might require both groups to access resources they'd typically not need. Then there is the matter of ego: people like the status of access privileges, and higher-ranking employees – especially executives – can expect or demand access just because they feel entitled to it.

"User permissions can look very simple, like a bouncer with a guest list – how complicated could it really be?" says Green. "But when you deal with numerous business systems, file storage, collaboration environments and overlapping projects, it's very easy to assign permissions and lose track of who can do what."

Newer developments such as cloud services and remote working have made permission creep more common and complicated. Most organisations still have to catch up on the issue.

Fixing permission creep

Companies pay close attention to user permissions, at least at the start. It's common practice to have rigid permission rules and policies when creating a new account. But such discipline grows lax as the employee's tenure grows. Overworked administrators are very likely to reflexively grant permissions when asked because they have competing priorities and don't wish to prevent other people from doing their jobs.

It's important to have appropriate access policies that include provisions for permission creep, such as matching roles with appropriate permissions, conducting regular audits on accounts, and stipulating the shelf lives of temporary access. Companies should have formal channels for permission requests, particularly to help protect the integrity of administrators who don’t want managers screaming at them over the phone, demanding access.

Likewise, policies must clarify that nobody is above the privilege line – even the CEO should justify why they need this or that access. Groups used to widespread access, such as IT super users or master administrators, must dampen their expectations – if they don't need the access, they can't have it.

"Look at access from the vantage point of a criminal," says Green. "If they get their hands on an executive or senior IT administrator's account, how much damage can they do and how hard will it be to track them down in your systems? Those are the accounts they target."

Notably, phishing (a fake correspondence attack that tries to steal user credentials) and spear-phishing (the same as phishing, but targeting specific groups or individuals) have risen sharply in recent years.

Yet policy, audits and awareness aren't sufficient. They take time and are prone to human error. Companies should link their user management and HR systems, using business rules to determine access. It's becoming best practice to integrate HR data with an access management system such as Active Directory and a robust identity management platform where rules automate permission choices.

"The best way to manage user accounts is to automate them through HR data. If someone is promoted, they automatically gain and lose certain permissions. If someone leaves the company, their access is automatically revoked. Temporary rules can cover certain project or user groups, with built-in expirations. If you combine automated identity management, access policies and privilege audits, you'll reduce and contain permission creep,” says Green.

There are many ways to break into business systems, but getting your hands on an account brimming with different access rights is the easiest and most common method. Criminals and insiders are much greater risks if your organisation doesn't address permission creep. Conversely, a robust access management environment will bolster security and productivity.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...