{"id":1969,"date":"2024-01-16T12:36:00","date_gmt":"2024-01-16T17:36:00","guid":{"rendered":"https:\/\/readibots.com\/?p=449"},"modified":"2024-06-11T10:29:31","modified_gmt":"2024-06-11T14:29:31","slug":"random-acts-of-identity-automation","status":"publish","type":"post","link":"https:\/\/readibots.com\/staging\/random-acts-of-identity-automation\/","title":{"rendered":"Random Acts of Identity Automation \u2013 Take the Quiz!"},"content":{"rendered":"\r\n<h2 class=\"wp-block-heading\">The problem<\/h2>\r\n\r\n\r\n\r\n<p>IT shops are typically complex and managing an array of moving parts. Keeping identities provisioned, licensed and secure, involves endless touch points. There\u2019s the basics of ensuring that people in roles have access to the right applications, but most organizations quickly find that they still have a lot of gaps even after they deploy and configure a well-known IGA software product<s>.<\/s> IT professionals quickly discover, many applications aren\u2019t covered, data still needs to be managed, recertification campaigns need to be kicked off at the right time, self-service needs to be implemented. There are literally hundreds of these scenarios. Buying an IGA was just the beginning. Many IT shops decide that solving the problems is either beyond the abilities of their IGA, or requires a tremendous amount of costly custom development. This in turn, creates a new problem of documenting and maintaining custom code.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Take the Identity AutomationQuiz!<\/h2>\r\n\r\n\r\n\r\n<p>Not sure about this? Take the Random Acts of Identity Automation Quiz with your team:<\/p>\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\">\r\n<li>Do we have any privileged scripts? Where\u2019s the list?<\/li>\r\n\r\n\r\n\r\n<li>Do we have an identified owner of each?<\/li>\r\n\r\n\r\n\r\n<li>What systems and data do they touch?<\/li>\r\n\r\n\r\n\r\n<li>Where are they deployed?<\/li>\r\n\r\n\r\n\r\n<li>What credentials are being used with these scripts?<\/li>\r\n\r\n\r\n\r\n<li>How are the credentials stored \/ accessed?<\/li>\r\n\r\n\r\n\r\n<li>How are we protecting scripts from malicious modification?<\/li>\r\n\r\n\r\n\r\n<li>Is there an existing audit record showing who\u2019s modified them and when?<\/li>\r\n\r\n\r\n\r\n<li>When was each of these scripts and their access audited?<\/li>\r\n\r\n\r\n\r\n<li>What mechanism will alert when the scripts are changed?<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<p>If any of these 10 questions make you take pause, then a serious team discussion is warranted.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">The Lesser of Evils<\/h2>\r\n\r\n\r\n\r\n<p>wo choices remain:<\/p>\r\n\r\n\r\n\r\n<p>1. Automate or<\/p>\r\n\r\n\r\n\r\n<p>2. Send it \u00a0the ITSM and manually fulfill<\/p>\r\n\r\n\r\n\r\n<p>The manual fulfillment option is the obvious choice and gets the job done but it\u2019s error prone, slow, and very expensive. Often, only the most painful of these tasks will get automated.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Random Identity Automation<\/h3>\r\n\r\n\r\n\r\n<p>Many organizations will pursue a path that we refer to as <em>Random Acts of Automation.<\/em> When the pain becomes unmanageable, someone decides to write a script to address the problem. With an immediate win, another isn\u2019t far behind. Then another, and it continues. Virtually every IT shop has these. Random scripts that \u201cdo something\u201d that \u201csomeone wrote\u201d, put on a server, and scheduled to run at certain points in the day.<\/p>\r\n\r\n\r\n\r\n<p>Let\u2019s be clear\u2026these scripts can offer great relief. They are a quick fix to a problem(s) but they are the seeds of future problems.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Risk!<\/h3>\r\n\r\n\r\n\r\n<p>In a nutshell\u2026 random scripts are NOT governed and likely not documented; and that is a major risk. Especially in a world where every organization is working to implement a governance model.<\/p>\r\n\r\n\r\n\r\n<p>Scripts almost always run in an elevated, admin context, and they run against production systems and data. These scripts often wield greater power than the admins that wrote them. People move on. They forget. Departments evolve. Many orgs are shocked to find out the extent of their problem! Many of these scripts have been running for years and as long as the org is evolving, new scripts are likely being created to address new challenges. These scripts are prime candidates for a future breach!<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">History<\/h3>\r\n\r\n\r\n\r\n<p>How did we get here? \u201cIf it ain\u2019t broke, don\u2019t fix it.\u201d There\u2019s little desire to fix something that is working. These band aids get created, they work, the team moves on. Months later, the pain is long gone, and the band aid is forgotten. These build up. They are unmanaged, random, and therefore go undetected.<\/p>\r\n\r\n\r\n\r\n<p>Awareness is key. Often, CISO\u2019s aren\u2019t aware that this is happening and so they are unable to govern it. Correcting this has to come from the top as part of a security initiative.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Discovery<\/h3>\r\n\r\n\r\n\r\n<p>The old adage: you can\u2019t manage what you can\u2019t measure. Starts awareness. A scan of all target servers and workstations that are likely to have automation scripts is a good start. Identify the potential sources; you might be surprised what you actually find.<\/p>\r\n\r\n\r\n\r\n<p>Next, look for the low hanging fruit: are there embedded credentials? Is this running in an admin context. Get these ones identified and on the action list.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Management and Governance<\/h2>\r\n\r\n\r\n\r\n<p>The next step is taking measured action. To solve this, scripts will need to be co-located in a common repository where there\u2019s some access governance. Scripts can be moved to folders, code signed, and credentials pulled from a vault. This is a big step forward, but still many controls remain missing. The organization will need to assign a capable script author and create a thoughtful implementation plan.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Going Forward<\/h3>\r\n\r\n\r\n\r\n<p>How will we handle auditing? How will we ensure that a script cannot be changed? How will we know if it has been changed? How will we implement SOD? For these kinds of controls, typical of an ISO27001 shop, the bare-knuckles approach to identity automation becomes very complicated.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Identity Automation Platforms<\/h3>\r\n\r\n\r\n\r\n<p>This is one area where products like <a href=\"http:\/\/www.servicenow.com\/\">ServiceNow<\/a> have made their mark. They provide a very sophisticated, managed environment for identity automation. It\u2019s one of the greatest things about ServiceNow beyond their ITSM services. A move in this direction, is an evolution beyond Random Acts of Automation. Everything is centralized, governed, secure and audited.<\/p>\r\n\r\n\r\n\r\n<p>But not everyone needs or wants ServiceNow. There are many ITSM products and if you\u2019re already a user of one of them, it likely isn\u2019t feasible to make the switch to ServiceNow.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\">Compliment your IGA and ITSM Investments<\/h3>\r\n\r\n\r\n\r\n<p>That\u2019s where Readibots Identity Automation comes in. Like ServiceNow, The READI platform is designed specifically for IT automation. Readibots offers IT shops a choice \u2013 a cloud-based automation platform that is technology agnostic. The READI platform is \u00a0agile, cost effective and integrates seamlessly with any IGA solution (SailPoint, Oracle, IBM, MicroFocus, Saviynt and others) and any ITSM solution (ServiceNow, Cherwell, BMC, Freshdesk, SolarWinds and others.) With the READI platform, you get secure, governed automation at a fraction of the cost.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Are you READI to get started?<\/h2>\r\n\r\n\r\n\r\n<p>The READI Platform provides management and governance over scripts which already exist as well as providing a platform for you to build more with governance.\u00a0 As a bonus, Readibots has a free assessment tool that will help organizations discover their scripts and identify the highest risks. In only a few hours, scripts can be cataloged, risk ranked, and if desired, migrated into the READI platform where they will become governed as part of a greater automation strategy.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>The problem IT shops are typically complex and managing an array of moving parts. Keeping identities provisioned, licensed and secure, involves endless touch points. There\u2019s the basics of ensuring that people in roles have access to the right applications, but most organizations quickly find that they still have a lot of gaps even after they<\/p>\n","protected":false},"author":6,"featured_media":1981,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Random Acts of Identity Automation \u2013 Take the Quiz!","_seopress_titles_desc":"IT shops are typically complex managing many moving parts. Provisioning identities licenses involves endless touch points. Readibots is built for IT Automation.","_seopress_robots_index":"","footnotes":""},"categories":[12],"tags":[98,29],"class_list":["post-1969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-identity","tag-service-desk"],"acf":[],"_links":{"self":[{"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/posts\/1969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/comments?post=1969"}],"version-history":[{"count":1,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/posts\/1969\/revisions"}],"predecessor-version":[{"id":1982,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/posts\/1969\/revisions\/1982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/media\/1981"}],"wp:attachment":[{"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/media?parent=1969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/categories?post=1969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/readibots.com\/staging\/wp-json\/wp\/v2\/tags?post=1969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}