Third-party access: the forgotten security risk

Third-party access: the forgotten security risk
(Image credit: Image Credit: Geralt / Pixabay)

Nearly every organisation today relies on a variety of remote third-party vendors to access, maintain, and support critical internal systems and resources. These vendors have come to play a critical role in maintaining modern organisations’ complex and distributed IT infrastructures. However, third-party access does not come without accompanying risk. Whilst organisations may have extensive security measures in place to guard from attacks targeting internal accounts, the security of third-party vendors with access to internal systems is a well-overlooked issue.

About the author

David Higgins, EMEA Technical Director at CyberArk.

Third-party access use is worrying because recent data breaches have shown that it is a common factor in successful cyber-attacks. In January, co-working provider Regus suffered a highly-sensitive breach in which employee performance details ended up being published online. The breach was a direct result of third-party access insecurities and occurred because Regus commissioned a third party to assess staff performance using secretive filming. The results were then accidentally leaked through a task management website. 

The threats brought about by third-party access are clear and are rising as the level of third-party use is significantly more extensive than might be expected. Despite this, it is still not being given a priority, even though it is high up on the list of likely targets for cyber-attackers. Third Party Privileged Access Permeates Business Today

Third-party use is growing

The extent of third-party use today is truly astounding. Businesses are looking more and more to outsource internal functions and operations and external services. According to our recent study, a quarter of businesses claimed they use over 100 third-party vendors, mostly requiring access to internal assets, data, and business apps in order to operate effectively and fulfill their contracts. 

Our study also found that 90% of respondents allow third parties to access not only internal resources but critical internal resources. That should be an immediate cause for attention for any CISO. When a third-party has access to critical data, the team in question immediately becomes only as fast as its slowest man. In other words, businesses relying on external vendors might have implemented excellent cybersecurity measures themselves, but this all means nothing when the vendor’s access controls are insecure. 

For many organisations, securing third-party vendor access is incredibly complex – often requiring a cobbled together solution of products like multi-factor authentication, VPN support, corporate shipped business laptops, directory services, agents, and more. This has not only led to confusion and overload for security practitioners, but also creates tangled and often insecure routes for third parties to access the systems they need to do their jobs.

Third-party access is a priority to de-risk

Despite such extensive use of third parties – and nearly all requiring access to critical internal assets – businesses are still not implementing appropriate security measures. A whopping 89% of businesses felt that they could do better or were entirely unhappy with their efforts to secure third-party vendor access, according to our research. Despite this, third party access regularly featured as one of their top 10 organisation-wide security risks, alongside others like cloud abuse – when cybercriminals exploit vulnerabilities in cloud computing environments, phishing, and insider threats. 

Securing third-party access, then, is becoming a top priority for organisations, and with good reason. These attacks and resulting data breaches can be incredibly costly, both in terms of reputation and financial losses. Despite this, the same businesses are overwhelmingly dissatisfied with how they currently approach managing and securing access for these remote vendors.

Getting cybersecurity access right

If third party access is a top 10 risk, why are so many failing to secure it?

Provisioning and deprovisioning access can feel a lot like Goldilocks and the Three Bears. You can’t allow too much access, where vendors have access to things they don’t need or for longer than they’re needed, or too little, where vendors are forced to create unsafe backdoor routes to critical resources. The level of access has to be just right. Provisioning and deprovisioning access are often cited as the biggest roadblocks to achieving this, with a lack of visibility also a repeated problem.

Legacy solutions currently dominate. Most modern organisations rely on VPNs to secure third-party access, but these were not designed to manage the dynamic privileged access that is a feature of modern requirements, like role-based access protection and session recording. Companies also don’t have a holistic view of what third-party vendors are doing once they authenticate, and that is a serious problem. Best practice is to record, log, and monitor privileged network activities, a common requirement for audit and compliance.

As organisations depend more and more on third parties to get the work done, the security difficulties they face become harder and harder to ignore. Without a dedicated solution for managing third-party privileged access, organisations have been forced to use miscast solutions like VPNs.

Third party access remedies

There are a couple of clear remedies for this problem. The first answer is to swiftly set up secure, structured, and multi-leveled privileged access controls. By introducing a process governing the types of data and assets that can be accessed by third parties and running it on a case-by-case basis, businesses can take a big step towards building a more effective defense against third-party vulnerabilities.

Alternatively, ‘all-in-one’ SaaS-based subscriptions to security are also now available. These novel solutions provide a combined approach by integrating standard security tools and services, including privileged identity management, resulting in an easy-to-implement solution to securing third-party access. As a result, where securing one of the businesses’ top security risks was once complex, organisations can now access all the tools they need through a single package, which creates a much more digestible approach for businesses who don’t want to deal with the complexity of a tangled web of security measures.

Securing third-party access is clearly an issue that needs to be addressed, and quickly too. Incidents like the controversial Regus data breach show us how costly these vulnerabilities can be when left untended. Although the culprits are sometimes caught in the end, both the human and business costs remain. When contemporary SaaS offerings provide all the tools necessary to secure an organisation’s external accounts, there is no excuse for third-party access not to be secure and for businesses to function freely.

David Higgins

EMEA Technical Director, CyberArk.

Latest in Security
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Latest in News
Tesla Roadster 2
Tesla is still taking deposits on its long overdue Roadster, despite promising it would arrive in 2020
Samsung HW-Q990D soundbar with Halloween theme over the top
Samsung promises to repair soundbars bricked by its disastrous software update for free – but it'll probably involve shipping
Google Gemini AI
Gmail is adding a new Gemini AI tool to help smarten up your work emails
DJI Mavic 3 Pro
More DJI Mavic 4 Pro leaks seemingly reveal launch date, price and key features of the triple camera drone – here's what to expect
Android 16 logo on a phone
Here's how Android 16 will upgrade the screen unlocking process on your Pixel
Man sitting on sofa, drinking coffee, looking at phone in surprise
Thousands of coffee lovers warned to stop using their espresso machines immediately after reports of burns and lacerations