First of all, let’s clear up any confusion the title might have brought on: this is not about removing admin rights forever, for everyone but yourself or anything like that. This is about making the removal of admin rights the default setting in your organizational network.
After making sure every employee but a few system administrators have a user profile instead of an admin one, the administrative rights should be managed by a case by case basis.
- Why free admin rights are dangerous (for both internal and external threats)
- The vulnerabilities which get closed by removing admin rights
- How risks are minimized by closing admin rights
- Data and real-world examples
Ready? Let’s go!
Managing Admin Rights for Neutralizing Insider Threat
You may already be familiar with the concept of neutralizing insider threat by managing admin rights.
First of all, as a disclaimer, you should know that that removing admin rights for regular users inside your organization doesn’t completely eliminate risks associated with insider threat. You can’t control for everything a user might be doing which is dangerous just by deescalating their administrative rights on their endpoint.
There are still plenty of risky things which an employee can do, both intentionally and unintentionally, even without admin privileges. These include:
- Setting a weak password or a password they also use for other personal accounts
- Sharing their password with others, who might be targeting the employee for malicious purposes
- Clicking unsafe links from emails or the web
- Giving protected information to malicious third parties, because of a scam (like CEO fraud) or intentionally
- Snooping through the files on a colleague’s workstation when they leave it unattended (risky especially if the colleague has access to more sensitive data than they do)
- Inserting an infected USB stick or external hard drive into a workstation.
Still, removing admin rights by default is often a bare minimum for reducing insider threat considerably. While not a lot of people know that removing admin rights still doesn’t prevent all insider threat risks, almost everyone knows it’s a good thing to do, security-wise.
Here are just some of the risks derived from granting everyone admin privileges. As you’ll see, a user can do even more harm to your organization if they do have access to full administrative rights. Such things include:
- Installing malicious apps like spyware or malware meant to steal money, data or disrupt activities
- Creating back-doors for third parties to install malicious apps or to hijack the systems
- Access or export sensitive data which can then be further mishandled
- Creating changes to lock legitimate users out of the systems
- Publishing misleading or embarrassing content in order to cause a PR crisis etc.
Of course, this doesn’t mean that the user would willingly do all of these things, but it’s something which hackers could accomplish by tricking a user with admin privileges. The trick could be accomplished by almost anything – a spam email, a USB stick which the hackers replaced with one of their own and so on.
So why then do some organizations still allow default administrative rights to their users? Because they are still succumbing to some dangerous myths about admin privileges:
- Only employees who hate us could cause harm and we get along well with all employees
- We have anti-virus and a firewall installed so we’re fine, there’s no harm they could do
- If admins need to approve all requests they will lose a ton of time
I have to admit that there may be a grain of truth in some of the myths above, but not in the way people who buy into these myths may think. For example, it does indeed help to have an anti-virus solution and firewall installed, but it’s not enough.
Also, it is true that admins lose a bit of time approving admin rights requests but that’s nothing compared to the risk they help avoid and, more importantly, the time waste can be completely avoided by using an admin rights management software.
Managing Admin Rights for Neutralizing External Threat. Vulnerabilities Closed by Removing Admin Rights
Few people know this, but removing admin rights and granting them only upon request and within a specific time frame can help close external threats too. It’s not just about managing insider threat. It’s also about closing security gaps which are often found in common B2B software, operating systems and so on.
Such systemic vulnerabilities are often discovered and patched without a breach having to happen for security researchers to become aware of the threat. But other times, unfortunately, the vulnerabilities are discovered by hackers and exploited before they can be patched up.
So, what can you do to avoid your company becoming the next news-worthy example of a breach?
Removing admin privileges from your organization is the immediately effective, most powerful protective measure you can take.
Examples of data breaches done by hackers exploiting system vulnerabilities
Just to give you a better idea about the scope of the danger, here is what you should be aware of.
- 63% of all data breaches come from weak or stolen passwords – if users didn’t have admin privileges, this would not be so dangerous
- 74% of all data breaches come from the abuse of accounts with admin privileges
- In a notoriously bad decision, Equifax used ‘admin’ as the username and password of a database, leading to a huge data breach
- Deloitte had a data breach in 2017 by having accounts with admin privileges compromised
- Facebook has been all over the news with scandals and data breaches and leaks derived from mishandling of admin rights
- Linksys routers leaked all historic records in May 2019 because that was their default admin setting
- Marriot had the financial data of over 400 million users stolen over a time window of 4 years – if unauthorized access was tracked better through admin rights management, the breach would have been discovered sooner
I could go on, but I think you have a better picture now of what happens when administrative rights are mishandled. You can probably see news of data breaches pop up in the news all the time, but while you learn the tech details and methods used by hackers (DNS hijacking, a Trojan, good old malware, etc.), you rarely hear how it all began and how the hackers gained access in the first place: through abusing an account with administrative privileges.
Systemic vulnerabilities which can be closed by removing admin rights from users
Besides classic insider threat scenarios, there are also system vulnerabilities which can be easily abused from a fully-privileged account.
An analysis over Microsoft security revealed that the number of Microsoft vulnerabilities ranked as ‘critical’ is up and running, increasing by 29% over a period of 6 years (from 2013 to 2018). In 2018, there were over 700 vulnerabilities reported for various Windows OS versions.
Only 272 vulnerabilities are reported for 2019 at the time of me writing this article (June 2019), but it’s still a huge figure. This doesn’t mean that Microsoft products are bad or unsecure, on the contrary. But system vulnerabilities are inevitable in products with this kind of a user pool and with hackers working tirelessly to find loopholes in them.
Since risk is inevitable, the only way to mitigate it is to remove admin privileges for regular users and only grant them upon request and for a limited time frame.