{"id":1762,"date":"2015-05-28T22:04:22","date_gmt":"2015-05-29T03:04:22","guid":{"rendered":"https:\/\/justinparrtech.com\/JustinParr-Tech\/?p=1762"},"modified":"2015-05-28T22:04:22","modified_gmt":"2015-05-29T03:04:22","slug":"identity-management-access-control-and-employee-termination","status":"publish","type":"post","link":"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/","title":{"rendered":"Identity Management, Access Control, and Employee Termination"},"content":{"rendered":"<p>When an employee or contractor leaves the company, it&#8217;s best practice to immediately disable their access to company resources.<\/p>\n<p>In the digital and online world, it&#8217;s easy to miss some forms of access, and remember off-hand every single system where the employee&#8217;s access should be revoked.<\/p>\n<p>The level of risk increases when the employee separation occurs involuntarily, which might create a situation where the former employee is disgruntled, and increases exponentially if the employee has administrative privileges to sensitive systems.<\/p>\n<p>In this article, I will attempt to outline best practices for a policies and processes around identity and\u00a0 access management, enumerate specific forms of access, many of which might be overlooked, and share some anecdotes resulting from the failure to properly revoke a terminated employee&#8217;s privileges.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<\/div><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#disclaimer\" >Disclaimer<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#identity-management\" >Identity Management<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#authentication-vs-access-control\" >Authentication vs. Access Control<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#the-advantage-of-centralized-identity-management\" >The Advantage of Centralized Identity Management<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#access-control-best-practices\" >Access Control Best Practices<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#create-and-maintain-an-access-inventory\" >Create and Maintain an Access Inventory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#establish-a-key-and-password-vault\" >Establish a Key and Password Vault<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#what-goes-in-the-vault\" >What Goes in the Vault?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-deceased-administrator\" >Anecdote: Deceased Administrator<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#avoid-%e2%80%9ckey-man%e2%80%9d-issues-by-assigning-a-backup\" >Avoid &#8220;Key Man&#8221; Issues by Assigning a Backup<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-held-hostage-by-the-network-admin\" >Anecdote:\u00a0 Held Hostage by the Network Admin<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#use-generic-e-mail-addresses-for-vendors-and-external-accounts\" >Use Generic E-mail Addresses for Vendors and External Accounts<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-tims-domain\" >Anecdote:\u00a0 Tim&#8217;s Domain<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#implement-a-policy-requiring-the-use-of-company-owned-communication-resources\" >Implement a Policy Requiring the use of Company-Owned Communication Resources<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#vendor-access\" >Vendor Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#client-perspective\" >Client Perspective<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-the-displaced-support-engineer\" >Anecdote:\u00a0 The Displaced Support Engineer<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#implement-a-policy-requiring-a-centralized-directory-for-identity-management-authentication-and-access-control\" >Implement a Policy Requiring a Centralized Directory for Identity Management, Authentication, and Access Control<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-difficulties-matching-directories\" >Anecdote:\u00a0 Difficulties Matching Directories<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#require-quarterly-reviews-for-all-access-system\" >Require Quarterly Reviews for All Access System<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-stale-users\" >Anecdote:\u00a0 Stale Users<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#contractors-and-vendors\" >Contractors and Vendors<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#maintain-a-master-contractor-vendor-list\" >Maintain a Master Contractor \/ Vendor List<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#equipment\" >Equipment<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-buggy-contractor-laptop\" >Anecdote:\u00a0 Buggy Contractor Laptop<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#use-web-conferencing-for-vendor-access\" >Use Web Conferencing for Vendor Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-27\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#identity-and-access\" >Identity and Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-28\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#identify-and-mitigate-liability\" >Identify and Mitigate Liability<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-29\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#a-tale-of-three-contractors\" >A Tale of Three Contractors<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-30\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-the-missing-contractor\" >Anecdote: The Missing Contractor<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-31\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-the-double-dipping-contractor\" >Anecdote: The Double-Dipping Contractor<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-32\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-free-laptop-and-tech-support\" >Anecdote: Free Laptop and Tech Support<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-33\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#exit-process-checklist\" >Exit Process Checklist<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-34\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#company-assets\" >Company Assets<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-35\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#logical-access\" >Logical Access<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-36\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#access-termination-checklist\" >Access Termination Checklist<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-37\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#physical-controls\" >Physical Controls<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-38\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#facility\" >Facility<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-39\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#storage\" >Storage<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-40\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#electronic-access\" >Electronic Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-41\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-my-other-badge\" >Anecdote:\u00a0 My OTHER Badge<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-42\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-my-badge-allowed-it\" >Anecdote:\u00a0 My Badge Allowed It<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-43\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-the-permanent-safe\" >Anecdote:\u00a0 The Permanent Safe<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-44\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#vendor-accounts\" >Vendor Accounts<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-45\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#web-hosting-external-vendors\" >Web Hosting \/ External Vendors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-46\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#financial\" >Financial<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-47\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#redirect-contact-information\" >Redirect Contact Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-48\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#data-and-telecommunications\" >Data and Telecommunications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-49\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#warnings-about-conferencing\" >Warnings about Conferencing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-50\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-pc-spending-spree\" >Anecdote:\u00a0 PC Spending Spree<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-51\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#anecdote-dns-jacked\" >Anecdote:\u00a0 DNS-Jacked!<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-52\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#logical-access-2\" >Logical Access<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-53\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#remote-access\" >Remote Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-54\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#control-systems\" >Control Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-55\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#a-brief-word-on-radius\" >A Brief Word on RADIUS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-56\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#infrastructure-devices-%e2%80%93-best-practices\" >Infrastructure Devices &#8211; Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-57\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#list-of-infrastructure-devices\" >List of Infrastructure Devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-58\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#central-directory-%e2%80%93-best-practices\" >Central Directory &#8211; Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-59\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#servers-and-applications\" >Servers and Applications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-60\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#task-specific-servers\" >Task-specific Servers<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-61\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#home-office-equipment\" >Home Office Equipment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-62\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#termination-checklist-template\" >Termination Checklist Template<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-63\" href=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/identity-management-access-control-and-employee-termination\/#summary\" >Summary<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"disclaimer\"><\/span>Disclaimer<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>All of the names, as well as many of the details and situations in the anecdotes have been changed in order to protect the confidentiality of my customers and their businesses, as well as the people involved.<\/p>\n<p>In some cases, details from multiple incidents were &#8220;merged&#8221; in to a single anecdote, meant to be illustrative and not specific.<\/p>\n<p>You might read an anecdote, and think that I&#8217;m referring to YOU, or YOUR BUSINESS, or YOUR SITUATION.\u00a0 Lack of proper identity management, access control, and incomplete termination processes tend to precipitate the same type of problem, and many of these problems are quite common.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>In the anecdotes below, I am not referring to any actual person, company, or incident, and any similarity is purely coincidental.<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"identity-management\"><\/span>Identity Management<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Managed, Central Identity is the basis for authentication and access control.<\/p>\n<p>Identity includes all attributes about an employee, such as their user name, &#8220;real&#8221; name, e-mail address, phone number, office location, and organizational hierarchy (their management chain and subordinates).<\/p>\n<p>All of this information is typically contained in a &#8220;directory&#8221;, which is an X.500 database that stores identity and credential information (&#8220;attributes&#8221;) for all employees.<\/p>\n<p>A directory, such as OpenLDAP or Microsoft Active Directory, can be used as a central authority for determining whether a person is a valid user of company resources, for authenticating users, and for access control.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"authentication-vs-access-control\"><\/span>Authentication vs. Access Control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Many people discuss authentication and access control as if they were the same process, but they are separate.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Authentication<\/strong><\/span> is the process of providing credentials to &#8220;prove&#8221; (authenticate) who you are, as a user of the system.<\/p>\n<p>In addition to your identity (such as a user ID), authentication uses one or more factors, consisting of secret information or physical objects, to help ascertain that you are who you claim to be.\u00a0 Here are some common factors used for authentication:<\/p>\n<ul>\n<li><strong>Password<\/strong> &#8211; This is the easiest and most prevalent form of authentication, but can also be one of the least secure.\u00a0 A password is some secret value that you enter when your identity is established (for example, when you create an account), and then you have to provide your password each time you authenticate.<\/li>\n<li><strong>Biometrics<\/strong> &#8211; Although currently very popular, this type of authentication is also highly-overrated, and can be fraught with problems.<\/li>\n<li><strong>Personal Identification Number (&#8220;PIN&#8221;)<\/strong> &#8211; A 4 to 8 digit &#8220;secret&#8221; number.\u00a0 Like a password, a PIN is meant to be kept secret.\u00a0 Anything with a 10-digit keypad, also known as a PIN pad, can be secured with a PIN.\u00a0 Examples include credit and debit card transactions, ATMs, voice mail, alarm systems, the lock code on your cell phone, and some door locks.\u00a0 Since a PIN only consists of numeric digits, PINs are much weaker than passwords.\u00a0 Also, people inherently tend to use the same PIN for everything, further weakening the system.<\/li>\n<li><strong>Certificate<\/strong> &#8211; Using a Public Key Infrastructure (PKI), each user is assigned a certificate which contains a cryptographic key that can be used to uniquely identify that person.\u00a0 Certificates might be installed on a company-owned laptop, or stored on a smart card or USB drive.\u00a0 Certificates are highly-secure, but can be easily copied or compromised, if not properly stored and handled.<\/li>\n<li><strong>Physical Token<\/strong> &#8211; A physical cryptographic device that displays a regularly-changing number.\u00a0 The number scheme is deterministic, and synchronized between the token device and the authentication server.\u00a0 The user enters the number along with a user ID and some other factor, such as a password.<\/li>\n<li><strong>Identity<\/strong> &#8211; Attributes such as your employee ID, work location, desk phone number, or other attributes can be used to support authentication.<\/li>\n<li><strong>Secret Questions<\/strong> &#8211; Creating secret questions and answers gives the server another method to authenticate you.<\/li>\n<li><strong>Public Data<\/strong> &#8211; Although intrusive and invasive (and thus, alienating), many companies have adopted a means for authenticating a user by asking questions that have been created based on public information, such as &#8220;What was your street address in 1992&#8221;.<\/li>\n<li><strong>RFID \/ Proximity<\/strong> &#8211; Using an RFID embedded in a badge, wristband, or fob allows for proximity-based authentication.<\/li>\n<li><strong>Text \/ E-mail Verification<\/strong> &#8211; Some systems send you a text message with a PIN, or an e-mail with a link, as a secondary validation factor.<\/li>\n<\/ul>\n<p>Once authenticated, <span style=\"text-decoration: underline;\"><strong>Access Control<\/strong><\/span> determines who can access what, and who can perform which actions.<\/p>\n<p>Access Control is typically managed by role, and roles are typically mapped to group objects within the directory.<\/p>\n<p>Person &#8211;&gt; Group &#8211;&gt; Role &#8211;&gt; Permissions<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"the-advantage-of-centralized-identity-management\"><\/span>The Advantage of Centralized Identity Management<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Centralized identity management, using a directory containing user and group objects, that can be mapped by role to permissions, allows for one, central administration point for all entitlements (permissions and roles) for a given user.<\/p>\n<p>As an example, a database server might have a &#8220;System Administrator&#8221; role, allowing full access to the database instance and all databases within the instance.<\/p>\n<p>Perhaps &#8220;Sam&#8221; is a new database administrator.\u00a0 There might be several ways to grant access for &#8220;Sam&#8221;.<\/p>\n<ul>\n<li><strong>Create a local &#8220;Sam&#8221; user ID on the database server, and assign the SA role.<\/strong>\u00a0 <BR><em>Person &#8211;&gt; Local User &#8211;&gt; Server Role &#8211;&gt; Permissions<\/em><BR>This is the worst option, because there are now multiple &#8220;Sam&#8221; accounts that do different things, depending on where they are, who created them, and what roles are assigned.\u00a0 Auditing is a nightmare, and disabling Sam&#8217;s access necessitates disabling a local account on every server where Sam has permissions.<\/li>\n<li><strong>Create a global &#8220;Sam&#8221; user ID in the directory.\u00a0 Assign &#8220;global Sam&#8221; from the directory to the SA role on the database server.<\/strong>\u00a0 <BR><em>Person &#8211;&gt; Directory User &#8211;&gt; Server Role &#8211;&gt; Permissions<\/em><BR>This is better, because there is now one &#8220;Sam&#8221; identity being leveraged multiple times.\u00a0 However, there is no central view of Sam&#8217;s roles.\u00a0 Although disabling Sam&#8217;s access can now be accomplished by simply disabling his directory user ID (thus preventing authentication), auditing or modifying permissions requires going to each database server to look at the SA role to see if &#8220;global Sam&#8221; is\u00a0 a member.<\/li>\n<li><strong>Create a global &#8220;Sam&#8221; user ID in the directory.\u00a0 Create a &#8220;DBA&#8221; group in the directory.\u00a0 Assign Sam to the DBA group.\u00a0 Assign the &#8220;global DBA&#8221; group from the directory to the SA role on each database server.<\/strong>\u00a0 <BR><em>Person &#8211;&gt; Directory User &#8211;&gt; Directory Group &#8211;&gt; Server Role &#8211;&gt; Permissions<\/em><BR>From the directory, you can see that Sam is a member of the DBA group.\u00a0 You can remove Sam&#8217;s DBA privileges without disabling his user ID (the user ID is his ability to authenticate), by removing him from the global DBA group.\u00a0 Likewise, let&#8217;s say Sam is a DBA but his job function is to work ONLY on Accounting databases.\u00a0 Sam might be a member of DBA_Accounting, but NOT DBA_HR nor DBA_Marketing.\u00a0 Now, if Sam takes on greater responsibility, permissions can be assigned simply by adding him to those other groups, without modifying permissions on individual servers.\u00a0 In addition, the configuration of individual database servers is identical, making misconfiguration easier to detect.<\/li>\n<\/ul>\n<p><strong>Centralized identity and access management allows an employee to have one &#8220;user identity&#8221; that can be authenticated, and then seamlessly granted access for various resources and servers.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"access-control-best-practices\"><\/span>Access Control Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"create-and-maintain-an-access-inventory\"><\/span>Create and Maintain an Access Inventory<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Maintain a master list (inventory) of all systems where an employee might have logical or physical access.<\/p>\n<p>The list should include the following information:<\/p>\n<ul>\n<li><strong>System name<\/strong><\/li>\n<li><strong>Description<\/strong> &#8211; what does this system do, or what can an employee access using this system?<\/li>\n<li><strong>Type of system<\/strong> &#8211; Physical, logical, internal, external, etc&#8230;<\/li>\n<li><strong>Risk Level<\/strong> &#8211; what damage could be done, if someone malicious gained access?<\/li>\n<li><strong>Owner<\/strong> &#8211; Every system needs an owner.\u00a0 We will cover this during the review process.<\/li>\n<li><strong>Backup Owner<\/strong> &#8211; It&#8217;s prudent to have a 2nd person who can make administrative decisions if the owner is unavailable<\/li>\n<li><strong>Vendor Contact<\/strong> &#8211; Vendor name, website, sales contact name and phone number.<\/li>\n<li><strong>Support Contact<\/strong> &#8211; Support website, phone number, plus account number or other pertinent information to open a support case (If you lose access, who do you contact to gain it back)<\/li>\n<li><strong>Authorized Contact List<\/strong> &#8211; Which employees are authorized by the vendor to make contact, open a support case, transfer a license, or the like.\u00a0 Critical company authentication information, such as phone numbers or e-mail addresses should be listed as well.\u00a0 For example, if e-mail confirmation is required to make account changes, that e-mail address should be listed here.<\/li>\n<li><strong>Mitigating Control<\/strong> &#8211; List any forms of access that preclude access to this system.\u00a0 For example, safe keys can&#8217;t be used unless the employee has either a key or badge access to the location where the safe is stored.\u00a0 Likewise, access to databases and\u00a0 other internal systems might be limited based on remote access to the network, and further gated by centralized authentication such as Active Directory.<\/li>\n<\/ul>\n<p><strong>The purpose of the master list is as follows:<\/strong><\/p>\n<ul>\n<li>Ensure that there is a single point of authorization (the &#8220;Owner&#8221;) for approving access, and to review current access.\u00a0 This should NOT be the &#8220;administrator&#8221; &#8211; the administrator&#8217;s role is to actuate permission changes, NOT to review and approve them.<\/li>\n<li>Ensure that all physical and logical systems are enumerated, to prevent inadvertently leaving access in place for a terminated employee.<\/li>\n<li>Ensure that privileged access is identified, to ensure that the account can&#8217;t be hijacked by a disgruntled employee.<\/li>\n<li>Ensure continuity in the event that a system administrator leaves or dies.<\/li>\n<li>Serve as the basis for a periodic access review by the respective owners.<\/li>\n<\/ul>\n<p>For disaster recovery purposes, a printed copy of the list should be stored securely in a bank safe deposit box, or at a disaster recovery site.<\/p>\n<p>Building this list might require coordination across several departments, for example, Technology, Facilities, Office Admin, etc&#8230;\u00a0 It&#8217;s better to build one large list than maintain separate lists.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"establish-a-key-and-password-vault\"><\/span>Establish a Key and Password Vault<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>What do you do, if you have to fire your network administrator, or your network administrator quits, and refuses to disclose privileged passwords?<\/p>\n<p>What if that person dies unexpectedly?<\/p>\n<p>Rather than grant administrative access for an executive, who probably doesn&#8217;t understand how to properly administer the systems in question, a better approach is to create a &#8220;failsafe&#8221; administrative user with a unique password, seal the credentials in a labeled envelope, and store all of the envelopes in a safe or vault.<\/p>\n<p>Likewise, a copy of all physical master keys, badges, and other physical access tokens should be stored in the same safe or vault.<\/p>\n<p>Make sure the vault is physically secure &#8211; a locked filing cabinet is insufficient, as it can be easily picked, pried open, or destroyed in a fire.<\/p>\n<p>A fire safe is relatively inexpensive, and can be bolted to the floor.<\/p>\n<p>Another option is to use a bank safe deposit box.<\/p>\n<p>Assume that all passwords, including privileged passwords should be changed regularly, and plan to update the password vault accordingly.<\/p>\n<p>It goes without saying &#8211; the vault should be accessible by someone OTHER than the system administrator(s).\u00a0 Usually, this would be someone with a VP title or above.<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"what-goes-in-the-vault\"><\/span>What Goes in the Vault?<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>In short, everything on the Access Inventory list.<\/p>\n<p>Here are the highlights:<\/p>\n<ul>\n<li>Physical master keys for facilities, filing cabinets, safes, storage, etc&#8230;<\/li>\n<li>Master badges, fobs, and other physical tokens<\/li>\n<li>Alarm system codes<\/li>\n<li>Administrator user ID and password for Active Directory, and other enterprise-wide authentication systems<\/li>\n<li>Administrator user ID and password for every server.\u00a0 Hopefully, your company has a standard or scheme.<\/li>\n<li>Administrative user IDs and passwords for all Databases and Applications<\/li>\n<li>URL, Administrator user ID and password for each application (internal and external)<\/li>\n<li>Bank account information (Account Numbers, authorized users, passwords or PINs, wire transfer codes, safety deposit box numbers)<\/li>\n<li>Vendor access information and credentials (such as authorized billing codes, account numbers, etc)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-deceased-administrator\"><\/span>Anecdote: Deceased Administrator<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>When I was a consultant, I was called in on an emergency basis on a Monday morning, to a small business where they had a couple of servers and maybe 50 employees.<\/em><\/p>\n<p><em>The network administrator had unfortunately passed away over the weekend, and no one else had access to do anything.<\/em><\/p>\n<p><em>They had been able to obtain access to some of their vendor accounts, but they also had a Novell server, a Windows server, and other internal systems, as well as external accounts that no one else could access.<\/em><\/p>\n<p><em>We were able to break in to the Novell and Windows servers to obtain administrative access, but there was a database platform that had to be rebuilt.\u00a0 Luckily, no data was lost, and we were able to gain access to everything, with only about one day of down time.<\/em><\/p>\n<p><em>Many of the external accounts were tied to this person&#8217;s e-mail address, which required access to the specific e-mail account.\u00a0 Once we had administrative access, we were able to reset the deceased administrator&#8217;s password, and access their e-mail account in order to recover external account access.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ol>\n<li><em>Always have a password vault<\/em><\/li>\n<li><em>Make sure every person in a critical role has a backup.<\/em><\/li>\n<li><em>Use a group or generic mailbox for external accounts and vendors.<\/em><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"avoid-%e2%80%9ckey-man%e2%80%9d-issues-by-assigning-a-backup\"><\/span>Avoid &#8220;Key Man&#8221; Issues by Assigning a Backup<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For critical functions, always ensure that there is another person in the organization with at least a basic knowledge, and appropriate permissions to act as a backup.<\/p>\n<p>Sometimes, people think that being a &#8220;key man&#8221; is job security.\u00a0 It&#8217;s also a prison.\u00a0 You can&#8217;t take a personal day, you can&#8217;t take vacation, you can&#8217;t attend to family matters, or take a sick day, because you have to be available 24 x 7 to perform this critical function.\u00a0 You will also never get promoted &#8212; if management promotes you, who will do YOUR job?<\/p>\n<p>Having a backup means that you can take a day off.\u00a0 They can call you for emergencies, or if an unfamiliar situation arises.<\/p>\n<p>In smaller companies and organizations, the &#8220;backup&#8221; person doesn&#8217;t need to be dedicated &#8211; he or she can be someone who already has full-time or part-time responsibilities in other areas.\u00a0 With as little as 4 hours per week and some cross-training, a person with the proper aptitude can quickly come up to speed as a proper backup to the &#8220;key man&#8221;.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-held-hostage-by-the-network-admin\"><\/span>Anecdote:\u00a0 Held Hostage by the Network Admin<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>A friend of mine runs a small business, and became suspicious of his network administrator.\u00a0 Some hardware purchases had been made, that didn&#8217;t show up in any inventory, and couldn&#8217;t be located in the office.\u00a0 In addition, he had a suspicion that some of his servers weren&#8217;t being properly backed up, and there were some additional red flags.<\/em><\/p>\n<p><em>I came in after hours to perform a lightweight audit \/ survey, just to figure out what was going on, and if things were being properly managed.<\/em><\/p>\n<p><em>I found some serious gaps, and we started talking through options.\u00a0 Ultimately, due to the missing items, and some other sketchy things that had transpired, the owner felt that he could no longer trust the network administrator, and we developed a plan to replace him.<\/em><\/p>\n<p><em>The network administrator either got wind of this plan, or sensed that his time was near, and secretly started removing access for anyone except himself.<\/em><\/p>\n<p><em>The owner and I had interviewed and selected a new network administrator, and the plan was to let the current one go on Friday afternoon, bringing the new guy in on Monday morning.<\/em><\/p>\n<p><em>When the time came, the owner called the administrator in to his office, and before anyone could say anything, the network admin said, <strong>&#8220;If you&#8217;re thinking of letting me go, I think you should know that I&#8217;ve locked everyone out, and I have the only admin account.&#8221;<\/strong><\/em><\/p>\n<p><em>The owner threatened to have him arrested, to which he replied, &#8220;there&#8217;s no law against doing the job that you&#8217;ve hired me to do, which is, to protect the company&#8217;s data.&#8221;<\/em><\/p>\n<p><em>The owner threatened to sue him, to which he replied, &#8220;I&#8217;m sure it will take weeks to get this in front of a judge, and I&#8217;m sure I will have forgotten the password by then.\u00a0 Can your business afford to be down for that long?&#8221;<\/em><\/p>\n<p><em>This guy thought he had the owner over a barrel.<\/em><\/p>\n<p><em>After some heated words, the network administrator was escorted off the property, with the parting words, &#8220;Call me on Monday, when you change your mind.&#8221;<\/em><\/p>\n<p><em>Fortunately, we had pulled a backup tape out of rotation during my &#8220;survey&#8221; the week prior, and we were able to use that to restore the security database for the network, file permissions, other users&#8217; admin access, as well as the original password for the &#8220;Administrator&#8221; account.<\/em><\/p>\n<p><em>Instead of two weeks&#8217; severance pay, the network admin ended up terminated with cause, and because the IT community at that time was very tight knit, he ended up blacklisted, as well.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ol>\n<li><em>Having the tape, which was basically a password vault, saved much time and effort.\u00a0 Breaking in to the server still would have been possible, but it would have taken days to re-create user accounts, create a new permission scheme for files and other resources, restore access to files, resources, and e-mail, and fix various other problems.<\/em><\/li>\n<li><em>If there had been a designated junior administrator, unless the two conspired, there would have been some forewarning about the network admin&#8217;s malicious actions.<\/em><\/li>\n<li><em>Anything dealing with money should have dual authorization or dual control.\u00a0 In this case, the network admin was authorized to order equipment, and the invoice went straight to accounting.\u00a0 A better process is to have the network admin submit a purchase request to the office manager, who then places the order.\u00a0 Once the equipment arrives, it should be added to a hardware inventory and the fixed asset list.<br \/>\n<\/em><\/li>\n<li><em>Carrying out what basically amounts to extortion is not the best career move.<\/em><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"use-generic-e-mail-addresses-for-vendors-and-external-accounts\"><\/span>Use Generic E-mail Addresses for Vendors and External Accounts<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Most vendors require a technical, administrative, and accounting contact, or they let you set up as many points of contact as you want.<\/p>\n<p>Have the vendor structure their communications as follows:<\/p>\n<ul>\n<li>Invoices should go to &#8220;invoices@yourcompany.com&#8221; or &#8220;accounting@yourcompany.com&#8221;<\/li>\n<li>Renewal and down time notices should go to &#8220;technical@yourcompany.com&#8221; or similar.<\/li>\n<\/ul>\n<p>In turn, these e-mail addresses should either distribute to multiple people within the company, or should route to a shared mailbox that&#8217;s checked regularly &#8211; for example, the Help Desk is a perfect technical contact.\u00a0 When they receive a renewal or down time notice, they can escalate to the appropriate person.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-tims-domain\"><\/span>Anecdote:\u00a0 Tim&#8217;s Domain<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>A person who we will call &#8220;Tim&#8221; worked at a medium-sized company, and was managing a team whose objective was to build and manage an ASP implementation of the software that the company produces and normally sells to customers, to run in their data centers, where the ASP would target the small-tier market who would not normally be able to make the capital investment for the software plus supporting hardware and infrastructure.<\/em><\/p>\n<p><em>&#8220;Tim&#8221; registered a bunch of domain names for use by this ASP environment.\u00a0 Rather than using an existing corporate account with a reputable vendor who already provided domain name and registration services for the company, &#8220;Tim&#8221; decided to save a buck, and go with another registrar.\u00a0 &#8220;Tim&#8221; set himself up as the billing, technical, and administrative contact for the domains in question.<\/em><\/p>\n<p><em>A few months later, &#8220;Tim&#8221; left the company, and eventually, the ASP implementation went live (obviously, without &#8220;Tim&#8217;s&#8221; help)<\/em><\/p>\n<p><em>A year later, BAM, clients attempting to log in to the ASP website were greeted with a message indicating that the domain name registration has lapsed, and that the domain has been purchased, but was available for resale at a very &#8220;reasonable&#8221; price.<\/em><\/p>\n<p><em>When &#8220;Tim&#8221; left the company, no one realized that every attempt by the registrar to contact the company went to &#8220;Tim&#8217;s&#8221; mailbox and phone number &#8212; the same mailbox and phone number that ceased to exist about a week after &#8220;Tim&#8221; left.<\/em><\/p>\n<p><em>At the renewal mark, the registrar sent the company an e-mail,\u00a0 that bounced.\u00a0 After a few more unanswered e-mails and phone calls, the registrar sent a paper invoice, that, YOU GUESSED IT, went to &#8220;Tim&#8221;, and since &#8220;Tim&#8221; was no longer an employee, the paper invoice got tossed without ever being opened.<\/em><\/p>\n<p><em>The registrar put the company&#8217;s account in to delinquent status, and after 3 more months, terminated the account, and released the domain registration.<\/em><\/p>\n<p><em>Again, since &#8220;Tim&#8221; had an individual account with this registrar, rather than a corporate account with the company&#8217;s vendor of choice, no one noticed that anything was wrong, nor did the vendor have any other company contact information.<\/em><\/p>\n<p><em>The minute the domain became available, it was snarfed up by domain squatters who look for exactly this type of opportunity to make a large sum of money by holding the domain hostage.<\/em><\/p>\n<p><em>Now, the company looks like a bunch of idiots, because their ASP clients are staring at a web page (with misspelled words, I might add) indicating that the company can&#8217;t pay its bills on time.\u00a0 Aside from the revenue impact, the reputational impact was beyond measure.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<p><em>Obviously, you can&#8217;t fix the &#8220;Tim&#8217;s&#8221; of the world, who have a proclivity to run off in whatever random direction their brain manages to concoct, rather than do &#8220;that other thing&#8221; that I like to call &#8220;asking someone who knows&#8221;, but you CAN certainly mitigate &#8220;Tim-like&#8221; issues by conducting infrastructure reviews, and using generic e-mail addresses.\u00a0 If &#8220;Tim&#8221; leaves the company, invoices should still go straight to accounting, and renewal notices should still go to the Help Desk.<br \/>\n<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"implement-a-policy-requiring-the-use-of-company-owned-communication-resources\"><\/span>Implement a Policy Requiring the use of Company-Owned Communication Resources<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"vendor-access\"><\/span>Vendor Access<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>If someone creates a vendor account on behalf of the company, but uses their personal e-mail and phone number, two problems could arise when they leave the company.<\/p>\n<p>A disgruntled employee could disrupt critical services and infrastructure.\u00a0 Here are some vendor-provided services that are particularly vulnerable.<\/p>\n<ul>\n<li><strong>Domain name registration.<\/strong>\u00a0 The employee could basically turn off access to your company&#8217;s website, e-mail, and any client-facing or B2B applications hosted on the web.\u00a0 Maliciously, your company&#8217;s website could be redirected to, say, a porn site, or your company&#8217;s e-mail could be redirected to a competitor.<\/li>\n<li><strong>SSL \/ TLS certificates<\/strong>.\u00a0 If you conduct commerce on the internet, or allow your users to securely log in to your website, you probably use SSL \/ TLS to encrypt web traffic.\u00a0 Certificates, issued from a third-party Public Key Infrastructure (PKI), such as Symantec \/ Verisign, are used to authenticate your server to the user, and to facilitate encryption key exchange.\u00a0 A disgruntled employee could cancel your web site&#8217;s certificate, preventing secure access, or create a new certificate for a new,\u00a0 malicious web server, that your customers think is your web site.<\/li>\n<li><strong>Hosting Services.<\/strong>\u00a0 If your website resides with a hosting provider, whoever has administrative access to the hosting service could shut off the website, or replace it with less flattering or malicious content.<\/li>\n<\/ul>\n<p>The other big problem that could arise, occurs when an employee sets up a vendor account on behalf of the company using their own credentials and contact information, such as a personal cell phone and e-mail address, but the invoices go straight to accounting.<\/p>\n<p>In this scenario, a disgruntled employee could order goods and services on behalf of the company, that could go undetected for quite some time.<\/p>\n<p>For example, the disgruntled employee could purchase a server or hosting services, and set himself up in business, competing with YOUR company, and YOU would be paying for it!<\/p>\n<p><strong>If an employee owns the contact information used for a vendor account, THEY own the relationship, NOT the company<\/strong>.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"client-perspective\"><\/span>Client Perspective<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>In addition to securing vendor \/ partner access, it&#8217;s important to protect your clients.<\/p>\n<p>You might ask, &#8220;What&#8217;s the harm in allowing our sales guy to use his personal cell phone?\u00a0 I don&#8217;t even have to pay for it, so he&#8217;s saving me money!&#8221;<\/p>\n<p>YOUR CLIENTS CALL HIS PHONE NUMBER.<\/p>\n<p>Unless you own that phone and the associated phone number, they are HIS clients, NOT yours.<\/p>\n<p>I&#8217;ve seen many consultants and sales folks assert that &#8220;they already have a cell phone&#8221; that they prefer to use, or consultants who assert that &#8220;they already have a business line at home&#8221; &#8211; the ONLY correct answer is:<\/p>\n<p><strong>&#8220;You&#8217;re welcome to use your personal phone for personal use, but the ONLY phone number and e-mail address that&#8217;s going on your business card, are the ones I own.&#8221;<\/strong><\/p>\n<p>The same should be true for e-mail and other communication channels &#8211; any method that the client can use to contact the company should be owned by the company.<\/p>\n<p>In addition, consider implementing a social media policy:<\/p>\n<ul>\n<li>Preclude using the company&#8217;s name in social media account names (prevent impersonation)<\/li>\n<li>Preclude discussing the company or its clients, as well as speaking on behalf of the company in social media<\/li>\n<li>Authorize the company&#8217;s Communication Manager to create and control all company-related social media accounts, and mandate that any social media needs should be addressed by the Communication Manager.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-the-displaced-support-engineer\"><\/span>Anecdote:\u00a0 The Displaced Support Engineer<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>I had a professional acquaintance who I&#8217;ll refer to as &#8220;Rob&#8221;, who worked as a Support Engineer for a large company, that we&#8217;ll call &#8220;XYZ&#8221; company.<\/em><\/p>\n<p><em>&#8220;Rob&#8221; worked for &#8220;XYZ&#8221; for about 3 years as a support engineer, which at the time was about <strong>double<\/strong> the average employment term for someone in &#8220;Rob&#8217;s&#8221; profession.<\/em><\/p>\n<p><em>&#8220;Rob&#8221; worked nights and weekends supporting his customers, and took calls at all times of the day and night.\u00a0 &#8220;XYZ&#8221; corp didn&#8217;t provide &#8220;Rob&#8221; with a cell phone, but let him expense business calls made on his personal cell, so many of &#8220;Rob&#8217;s&#8221; customers had &#8220;Rob&#8217;s&#8221; personal cell phone number, so they could contact &#8220;Rob&#8221; for critical or urgent issues, without having to go through the normal escalation process.<\/em><\/p>\n<p><em>&#8220;Rob&#8217;s&#8221; customers were always happy with his work, and &#8220;Rob&#8221; always got top marks from his clients.<\/em><\/p>\n<p><em>One afternoon, I got a call from &#8220;Rob&#8221;, who informed me that he had been unexpectedly let go, and wanted to meet with me to get my perspective.\u00a0 At the end of the day, I met &#8220;Rob&#8221; for drinks at a nearby establishment.<\/em><\/p>\n<p><em>While we were talking, &#8220;Rob&#8221; got a call on his cell &#8211; one of his larger customers had an issue and needed &#8220;Rob&#8217;s&#8221; help.\u00a0 &#8220;Rob&#8221;, the consummate professional, began the call by outlining the situation &#8211; he had been let go just that day, but he cared about his customers, and he wanted to make sure they got the help they needed.\u00a0 &#8220;Rob&#8221; provided a few suggestions for them to try, and instructed the customer to call their &#8220;XYZ&#8221; rep, who would then be able to provide the contact information for a new Support Engineer.<\/em><\/p>\n<p><em>I called &#8220;Rob&#8221; a week later, to see how things were going, and he related to me the events that transpired after we met at the bar.<\/em><\/p>\n<ul>\n<li><em>His ad-hoc suggestion had, in fact, resolved the customer&#8217;s initial problem<\/em><\/li>\n<li><em>Following &#8220;Rob&#8217;s&#8221; prompting, the customer tried to call their rep to get a new SE contact, but couldn&#8217;t get a hold of their rep.<\/em><\/li>\n<li><em>Later that night, the client had another issue.\u00a0 Out of respect for &#8220;Rob&#8217;s&#8221; situation, they avoided calling him.\u00a0 They repeatedly reached out to the &#8220;XYZ&#8221; sales rep, as well as the main &#8220;XYZ&#8221; support numbers.\u00a0 No one could help them fix the problem, and no one was familiar with their particular situation, necessitating many explanations, and time wasted with no results.<\/em><\/li>\n<li><em>The following morning, they called &#8220;Rob&#8221; on his cell (hey&#8230; they already had his cell number&#8230;) and offered him a job, $100k salary plus benefits, and a $5k signing bonus if he could start immediately.\u00a0 As in, if he could start at 9 AM.<br \/>\n<\/em><\/li>\n<\/ul>\n<p><em>&#8220;XYZ&#8221; was charging $150\/hr for &#8220;Rob&#8217;s&#8221; time, and he was only making $80k\/yr &#8211; now the customer gets &#8220;Rob&#8221; for about $55\/hr, and &#8220;XYZ&#8221; loses about $100K\/yr in revenue.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ul>\n<li><em>Grace, commitment, and integrity are an investment.<\/em><\/li>\n<li><em>The customer&#8217;s perception of value translates to revenue.<\/em><\/li>\n<li><em>Enforce company-owned communication channels.<\/em><\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong><em>Alternate Ending:\u00a0 Rob is Out&#8230;Rick is In<\/em><\/strong><\/span><\/p>\n<p><em>Here is what <span style=\"text-decoration: underline;\"><strong>might<\/strong><\/span> have played out for &#8220;XYZ&#8221; corp, if they had provided &#8220;Rob&#8221; a company-owned cell phone:<\/em><\/p>\n<ul>\n<li><em>At &#8220;Rob&#8217;s&#8221; termination, the manager retrieves the company-owned cell phone that &#8220;Rob&#8221; normally uses for support purposes.<\/em><\/li>\n<li><em>That night, the big, important customer calls &#8220;Rob&#8217;s&#8221; company-issued cell phone number, but &#8220;Rob&#8217;s&#8221; former manager answers.<\/em><\/li>\n<li><em>&#8220;Rob&#8217;s&#8221; former manager explains the situation, and engages &#8220;Rob&#8217;s&#8221; peer, &#8220;Rick&#8221;<\/em><\/li>\n<li><em>&#8220;Rick&#8221; isn&#8217;t 100% familiar with &#8220;big important customer&#8221;, but he works through their issue.<\/em><\/li>\n<li><em>The next day, the &#8220;XYZ&#8221; rep gets a scathing call from &#8220;big important customer&#8221;, and the &#8220;XYZ&#8221; rep offers a 30% services discount over the next 3 months, to ensure continuity and help build the customer&#8217;s perception of value in &#8220;XYZ&#8221; corp.<\/em><\/li>\n<li><em>&#8220;Rick&#8221; eventually comes up to speed, and &#8220;big important customer&#8221; is satisfied with &#8220;Rick&#8221;, even though he&#8217;s no &#8220;Rob&#8221;.<\/em><\/li>\n<\/ul>\n<p><em>&#8220;Big important customer&#8221; continues to leverage &#8220;XYZ&#8221; support at $150\/hr.\u00a0 &#8220;XYZ&#8221; built good will, and demonstrated commitment to its customer, in light of a difficult situation.<\/em><\/p>\n<p><em>Meanwhile, the folks at &#8220;big important customer&#8221; corp still sit around at break time, wondering, &#8220;What ever happened to &#8216;XYZ Rob&#8217;?\u00a0 Man!\u00a0 That guy was sharp!&#8221;<\/em><\/p>\n<p><span style=\"text-decoration: underline;\"><em><strong>Alternate Ending:\u00a0 Disgruntled Rob<\/strong><\/em><\/span><\/p>\n<p><em>It&#8217;s easy to give in to frustration.\u00a0 Here is what <span style=\"text-decoration: underline;\"><strong>might<\/strong><\/span> have happened if &#8220;Rob&#8221; was a little less graceful.<\/em><\/p>\n<ul>\n<li><em>&#8220;XYZ&#8221; lets &#8220;Rob&#8221; go, but he has been using his personal cell phone for customer support.<\/em><\/li>\n<li><em>&#8220;SomeBig&#8221; corp calls &#8220;Rob&#8221;, who spends 20 minutes filling their ear with a profanity-laced litany of every &#8220;XYZ&#8221; corp shortcoming.<\/em><\/li>\n<\/ul>\n<p><em>Obviously, &#8220;Rob&#8221; isn&#8217;t going to parlay this experience in to a career.<\/em><\/p>\n<p><em>On the other hand, at best, this sours the relationship slightly between &#8220;SomeBig&#8221; and &#8220;XYZ&#8221;.\u00a0 Degraded trust might mean deferred future spending on &#8220;XYZ&#8221; products and services.\u00a0 <\/em><\/p>\n<p><em>At worst, &#8220;SomeBig&#8221; terminates their agreement with &#8220;XYZ&#8221;, citing all the dirty secrets revealed by &#8220;Rob&#8221;.<\/em><\/p>\n<p><em>All this, over one cell phone.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"implement-a-policy-requiring-a-centralized-directory-for-identity-management-authentication-and-access-control\"><\/span>Implement a Policy Requiring a Centralized Directory for Identity Management, Authentication, and Access Control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If your company is a Microsoft customer, Active Directory is a natural choice for the centralized directory, and all major platforms interoperate with Active Directory either through Windows security mechanics, or via another directory such as OpenLDAP.<\/p>\n<p>If your company is not a Microsoft customer, implement one of several open source directory servers, including OpenLDAP or Apache Directory.<\/p>\n<table width=\"100%\" cellspacing=\"0\" cellpadding=\"4\">\n<colgroup>\n<col width=\"128*\" \/>\n<col width=\"128*\" \/> <\/colgroup>\n<tbody>\n<tr valign=\"TOP\">\n<td width=\"50%\"><span style=\"text-decoration: underline;\"><strong>Policy Element<\/strong><\/span><\/td>\n<td width=\"50%\"><span style=\"text-decoration: underline;\"><strong>Purpose<\/strong><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">Each employee should have a unique user ID in the enterprise directory<\/td>\n<td width=\"50%\"><em>Ensure that each person is able to be uniquely identified and authenticated, and that permissions and entitlements can be applied individually.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">The enterprise directory should enforce the following password policy:<\/p>\n<ul>\n<li>Minimum of 8 positions<\/li>\n<li>Require a letter, a number, and a symbol<\/li>\n<li>Maximum password age: 90 days<\/li>\n<li>Minimum password age: 10 days<\/li>\n<li>Can&#8217;t reuse the last 10 passwords<\/li>\n<\/ul>\n<\/td>\n<td width=\"50%\"><em>Ensure that passwords adhere to a minimum level of security. By requiring that passwords MUST be changed periodically, a compromised user ID would become secure. By remembering previous passwords, and establishing a minimum password age, you prevent \u201cstubborn\u201d users from cycling quickly through known passwords, in an attempt to keep their \u201cfamiliar\u201d password.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">The &#8220;full name&#8221; of the user within the directory should directly match the name of the employee, as stored in HR records or HRIS \/ HCMIS (HR application).<BR>The employee&#8217;s proper name should be stored, in order to match HR records, in addition to any nickname.<\/td>\n<td width=\"50%\"><em>Ensure that any user ID can be tied to a known employee of the company. Employment is a pre-requisite for access to company-owned systems. Contractors and vendors present an obvious issue \u2013 we will address that separately.<BR><\/em><em>Ensure that users who go by a nickname are correctly tied to the HRIS \/ HCMIS application.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">Any new servers, databases, and applications should support enterprise authentication and access control using open protocols and standards, such as LDAP.<\/td>\n<td width=\"50%\"><em>Ensure that single identity is leveraged for authentication. One user ID, multiple access.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">All systems capable of supporting enterprise authentication must use the enterprise directory for user authentication.<\/td>\n<td width=\"50%\"><em>Ensure that single identity is leveraged for access control. One user ID can be assigned to multiple groups, which map to various roles on various systems.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">All systems capable of supporting enterprise access control must leverage groups within the enterprise directory, mapped to local roles, for permissions and entitlements.<\/td>\n<td width=\"50%\"><em>Ensure that local systems do not bypass enterprise identity management.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">Edge devices (routers, firewalls, and VPN) must use the enterprise directory for authentication, either through LDAP, or indirectly through RADIUS<\/td>\n<td width=\"50%\"><em>Ensure that remote access to company-owned networks and network devices leverage single identity, and that only approved roles are authorized to connect to and \/ or manage these devices.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">Systems that are NOT capable of supporting enterprise authentication must use local user IDs named identically to the enterprise directory.<\/td>\n<td width=\"50%\"><em>Create an easy audit process, where each local user ID can be matched to the enterprise directory.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">Systems that are NOT capable of supporting enterprise authentication must be configured with a system-enforced password policy that complies with enterprise standards.<\/td>\n<td width=\"50%\"><em>Ensure consistent security controls across systems.<\/em><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"50%\">Systems that are NOT capable of supporting enterprise authentication must have a mitigating control, such as necessitating local network or VPN connectivity as a pre-requisite to direct system access.<\/td>\n<td width=\"50%\"><em>Ensure that systems which can&#8217;t leverage centralized authentication, can&#8217;t be accessed directly (e.g. via the internet)<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-difficulties-matching-directories\"><\/span>Anecdote:\u00a0 Difficulties Matching Directories<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><em><strong>I had a large scale project at a large company, to collapse several NT domains<\/strong>.\u00a0 The first step in a project like this is to clean up the directory &#8211; in this case, a Windows NT domain &#8211; that will be used for the &#8220;master record&#8221; for each user account.\u00a0 This can take days, and is an iterative process, working with Human Resources to validate if &#8220;so and so&#8221; is still here at the company, and if so, what is their &#8220;actual&#8221; name.<BR><BR>We got down to just a few mismatches, and we had two accounts that we couldn&#8217;t reconcile.\u00a0 One, we&#8217;ll call &#8220;Timmy Stevens&#8221;, and the other we&#8217;ll call &#8220;Bobby Stevens&#8221;.\u00a0 Usually, you can match two accounts because the phone number, office location, e-mail address, or their manager&#8217;s information will be the same between the two accounts.\u00a0 In this case, these looked like two different people.<BR><BR>We contacted HR, and there was a record of &#8220;Robert Stevens&#8221;, and we were able to match that to &#8220;Bobby&#8221;.\u00a0 We called &#8220;Bobby&#8221; to ask if he knew &#8220;Timmy&#8221;.<BR><BR>&#8220;Oh, that&#8217;s my old account.\u00a0 I switched departments a few years back, and Thomas is my middle name, but I started going by Bobby because this department already has a Timmy, so they just set me up a new account.&#8221;\u00a0 You can&#8217;t make this stuff up.<BR><BR><\/em><\/li>\n<li><em><strong>I did a network audit for a medium-sized company.<\/strong>\u00a0 I mapped out who all had administrative access, and most of the names made sense &#8211; the IT guys had admin access, the IT director had access, and a couple of folks who &#8220;had been&#8221; in IT but had moved to other departments, yet no one had removed their admin rights.\u00a0 <BR><BR>I also found an account called &#8220;Steve Kennedy&#8221;.\u00a0 No one knew who &#8220;Steve Kennedy&#8221; was.\u00a0 We looked at the security logs, and he mostly connected via RAS (the old Windows NT dial-up access &#8211; this is what people used before VPN was practical) or from a couple of very-critical, very-sensitive servers.\u00a0 There was no record of who created the account, and it was set to never expire, with no password enforcement.<BR><BR>It turned out that the previous Network Administrator had been let go about 6 months ago, and one of the reasons they brought me in, was because &#8220;suspicious&#8221; things had been happening &#8211; there were several instances that files got moved or deleted, or information had been updated.\u00a0 When he got let go, they immediately disabled his account &#8211; just about the exact minute he left the building.<BR><BR>What they didn&#8217;t know, is that the admin had surreptitiously created a second admin account with RAS and Admin access.\u00a0 He had been dialing in for months, and intentionally causing little problems all over the network.\u00a0 What he either didn&#8217;t know, or didn&#8217;t consider, is that his phone number had been recorded in the RAS server&#8217;s logs.\u00a0 We disabled his account, and turned copies of all the logs over to the corporate attorney.<BR><BR><\/em><\/li>\n<li><em><strong>I did some work for another medium-sized company, helping streamline their IT department.<\/strong>\u00a0 The company had an HRIS (Human Resources Information System) that was managed by&#8230; Human Resources.\u00a0 When a new employee started with the company, the HR folks would enter his\/her information in to the HRIS.<BR><BR>The HR folks would create a user ID for the HRIS based on their best guess about how the IT department was going to create the network ID &#8211; the idea was to make sure the user ID for the HRIS matched the network ID.\u00a0 HR had the first step &#8211; setting up the new employee in the HRIS, which established their name, employee ID number, employment status, organization (management chain and list of subordinates), and other basic employee information.<BR><BR>The next step in the process, was to forward all of the information over to IT, who would then create the network ID.\u00a0 The problem occurred because the rules followed by IT to create the network ID would not always match the guess made by HR, so IT would then have to send the network ID information BACK to HR, who might have to adjust it in the HRIS.<BR><BR>For example, if &#8220;Robert Thomas Stevens&#8221; is a new employee, and prefers to be called &#8220;Tom Stevens&#8221;, HR might create &#8220;tstevens&#8221;, but the IT group might create his network ID as &#8220;rstevens&#8221;, requiring HR to go back and update the HRIS ID to &#8220;rstevens&#8221;.<BR><BR>We resolved this, and simplified the process by handing HR a few simple rules for user naming and resolving duplicate names, and placed the responsibility with HR for user ID naming.\u00a0 Now, HR creates the user ID when they create the HRIS record, and IT uses the same ID.<BR><BR>Later, we were able to link HRIS authentication to Active Directory through LDAP &#8211; the extra effort spent ensuring that the HRIS user ID matched the network user ID was an investment.<br \/>\n<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"require-quarterly-reviews-for-all-access-system\"><\/span>Require Quarterly Reviews for All Access System<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Once per quarter, a full access review should be conducted.<\/p>\n<ol>\n<li>Starting with the central directory (such as OpenLDAP or Active Directory), <strong>compare a list of directory users to HR&#8217;s list of employees<\/strong>.\u00a0 Excluding service accounts, any user ID that can&#8217;t be matched to a valid employee (or contractor) should be immediately disabled until the ID can be validated and properly documented, or deleted because it&#8217;s no longer needed.<\/li>\n<li><strong>Compare users within each access system to the central directory<\/strong>.\u00a0 Any user ID that can&#8217;t be matched should be immediately disabled until it can be properly identified and documented, or deleted because it&#8217;s not needed.\u00a0 By &#8220;Access System&#8221;, we mean every system utilizing access control, listed on the Access Inventory.<\/li>\n<li><strong>For each access system, the owner should review what users are assigned to each role<\/strong> (thereby assigning permissions), and make any necessary adjustments.\u00a0 For example, if a particular employee switches departments, their ID might no longer need access to the accounting system, and should be removed, or, they might need to be changed to a different role within the accounting system.<\/li>\n<li><strong>Physical access systems should be reviewed<\/strong>, including lists of who has keys to the building or internal offices, badge access, safe keys, and access PINs.<\/li>\n<li><strong>External accounts should be reviewed by the owner<\/strong>, ensuring that users who no longer need access should be removed, and that all remaining users&#8217; permissions are correct.\u00a0 For example, who has purchasing authority with your hardware vendor?<\/li>\n<li>Artifacts of the review process should be stored, including copies of the user lists, changes requested by each owner, and the person&#8217;s name who performed each review.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-stale-users\"><\/span>Anecdote:\u00a0 Stale Users<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>When I was a consultant, it was quite common to perform an audit, and find user IDs for people who had been gone for years.<\/em><\/p>\n<p><em>The user IDs were usually active, and some had administrative access!<\/em><\/p>\n<p><em>In one case, the former CFO (who left the company over a year previously) still had an active user ID, with full access to the accounting system!\u00a0 Someone could have logged in as him, and generated a check using the AP or payroll systems.<\/em><\/p>\n<p><em>In another case, I was doing some work for a hospital, and we found active user IDs for doctors that had left.\u00a0 The problem is that any of those user IDs could be used to generate a prescription for drugs that could then be picked up at the hospital&#8217;s dispensary!\u00a0 A malicious employee could have modified a patient&#8217;s proscribed medication or treatment.<\/em><\/p>\n<p><em>Fortunately, in these particular situations, no one did anything malicious, but the potential was certainly there!<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ul>\n<li><em>Promptly remove access for terminated employees<\/em><\/li>\n<li><em>Quarterly Access Reviews would have caught all of these problems.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"contractors-and-vendors\"><\/span>Contractors and Vendors<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Contractors and vendors represent a special set of challenges for identity management and access control.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"maintain-a-master-contractor-vendor-list\"><\/span>Maintain a Master Contractor \/ Vendor List<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Either HR (preferably) or Accounting should maintain a master list of contractors and vendors &#8211; named individuals who are allowed on company premises and to use company-owned equipment.<\/p>\n<p>Depending on the situation, such as a long-term project, Contractors and Vendors might be issued keys or badge access to the facility.\u00a0 If not, they should be escorted by an employee at all times.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"equipment\"><\/span>Equipment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Prior to 2007, one of the &#8220;IRS 20 factors&#8221; when determining a person&#8217;s status as &#8220;employee&#8221; versus &#8220;independent contractor&#8221; was that an employee would be provided work equipment, while a contractor is expected to procure their own equipment.<\/p>\n<p>This created a conflict between HR and IT:<\/p>\n<ul>\n<li>IT wants everyone to use company-owned equipment, in the interest of protecting the company from stolen data, viruses, and other security problems.<\/li>\n<li>HR wants contractors to bring and use their own equipment, to protect the company from having contractors mis-classified as employees.<\/li>\n<\/ul>\n<p>As of 2007, the IRS now uses 3 factors, based on the level of behavioral and financial control, as well as the type of relationship (e.g. contracts or agreements in place between the parties).<\/p>\n<p>Because the use of company-supplied \/ company-owned equipment is no longer an issue, <span style=\"text-decoration: underline;\"><em><strong>enforce a policy requiring contractors and vendors to use company-owned equipment when accessing company-owned information systems.<\/strong><\/em><\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-buggy-contractor-laptop\"><\/span>Anecdote:\u00a0 Buggy Contractor Laptop<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>As a consultant, I was doing some work for a medium-sized company.<\/em><\/p>\n<p><em>At about 8:30 AM, the help desk started getting widespread calls of people getting disconnected from the network, or having intermittent connectivity issues.<\/em><\/p>\n<p><em>The IT group trusted me, and asked me to help take a look at the problem &#8211; this was potentially a huge issue, if everyone in the company was essentially unable to work.<\/em><\/p>\n<p><em>We tracked down a person who was having the problem, and observed what was happening.\u00a0 There was no log entry or other indication, so we loaded a packet capture tool, and looked at the underlying network traffic.\u00a0 We observed a specific type of network broadcast that seemed to be causing the network client to disconnect from the network because the broadcast was triggering a re-negotiation.<\/em><\/p>\n<p><em>Using the information in the broadcast packet, we eventually traced the &#8220;rogue&#8221; broadcast packet down to a particular switch port.\u00a0 We shut down the switch port, and sent a team to go trace the port to a specific network jack, so that we could figure out who was connected and what they were doing.\u00a0 The minute I disabled the switch port, the problem stopped!\u00a0 10 minutes later, it started again.\u00a0 I began the process of tracing down the rogue broadcast packet again, and found that it was originating from another port on the same switch, so we shut that one down, as well.<\/em><\/p>\n<p><em>We got a call from the team we had sent out to trace the connection&#8230;\u00a0 They had found the rogue machine and disconnected it from the network, so I grabbed my cell phone and headed toward them.<\/em><\/p>\n<p><em>What happened?<\/em><\/p>\n<p><em>The Marketing department had hired a contractor, who had brought his own laptop with him, and plugged it in to the network. It had taken us about an hour to find the problem and disable his switch port.\u00a0 When his connection &#8220;stopped working&#8221;, he moved to an adjacent empty cubicle, and plugged in to that network connection &#8211; explaining why the problem appeared to &#8220;move&#8221;.<\/em><\/p>\n<p><em>He had worked for quite a few companies, and had usually used his own laptop.<\/em><\/p>\n<p><em>This person, who we will refer to as &#8220;Stan&#8221; considered himself an IT expert and power user, and when we tried to talk to him about his laptop, he got very defensive, and insisted that &#8220;he was an expert&#8221;, and therefore couldn&#8217;t be responsible for taking the network down.<\/em><\/p>\n<p><em>After some verbal argument between &#8220;Stan&#8221; and the IT guys, I stepped in, told him that, &#8220;expert&#8221; or not, we had proof that his laptop was disrupting the network, and therefore we were taking it.\u00a0 He could either give us the laptop, or security would be happy to escort him from the premises.\u00a0 <\/em><\/p>\n<p><em>After confiscating his laptop, we took it back to the IT lab, and here is what we found:<\/em><\/p>\n<ul>\n<li><em>His laptop had come with 1 free year of Norton antivirus.\u00a0 Even though it popped up, prompting him to renew every time he logged in, his subscription had expired <strong>over a year ago<\/strong>, and he had just never noticed.<\/em><\/li>\n<li><em>He had two different viruses &#8211; this event pre-dated the age of adware and &#8220;PUPs&#8221; (Potentially-Unwanted Programs).<\/em><\/li>\n<li><em>At each company where he had done some work, the local IT guys had obviously tweaked it or installed various network client software on his laptop, allowing him to connect to their networks.\u00a0 Therefore, his laptop was a hodge-podge of software, most of which was not necessary but running.<\/em><\/li>\n<li><em>He was running unlicensed copies of several graphics packages.<\/em><\/li>\n<\/ul>\n<p><em>The problem turned out to be with one of the network client software packages, loaded by the IT guys at some other company, long ago.\u00a0 It was misconfigured, and kept sending out broadcasts in an attempt to determine the proper configuration, and these broadcasts were causing all sorts of network problems.<\/em><\/p>\n<p><em>I went back to &#8220;Stan the expert&#8221;, reviewed my findings, and gave him two options.\u00a0 Either the IT staff would wipe his laptop, restoring it back to factory defaults, or he could remove his laptop from the premises and use a company-owned desktop to do his work.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<p><em>Require contractors and vendors to use company-owned equipment<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"use-web-conferencing-for-vendor-access\"><\/span>Use Web Conferencing for Vendor Access<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Web conferencing, such as WebEx (<a title=\"WebEx\" href=\"http:\/\/webex.com\" target=\"_blank\">www.webex.com<\/a>) or Go to My PC ( <a title=\"Go to My PC\" href=\"http:\/\/gotomypc.com\" target=\"_blank\">gotomypc.com<\/a> ) can be used to &#8220;share out&#8221; a desktop or server, allowing the vendor to connect to and &#8220;share&#8221; a session with one of the company&#8217;s authorized administrators for that system.<\/p>\n<p>This allows a trusted company employee to monitor all actions performed by the vendor, and has the added benefit of having the employee be able to observe, and therefore learn, corrective actions taken by the vendor to administer or repair the system in question.<\/p>\n<p>Vendors usually have a very limited scope, making web conferencing an excellent option for them to connect to specific systems, without having to create an identity and set up access &#8211; they are proxying the employee&#8217;s already-authorized access.<\/p>\n<p>This option does NOT work well for contractors, who are expected to work independently.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"identity-and-access\"><\/span>Identity and Access<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>HR should maintain a list of contractors or vendors who have long-term access requirements.<\/p>\n<p>These types of contractors and vendors should have an entry in the central directory, and their account should be set to expire either at a specified contract end-date, or if the service is open-ended, set the expiry for 30 days.<\/p>\n<p>Every contractor or vendor should have an assigned &#8220;manager&#8221;, an employee who &#8220;owns&#8221; the relationship and can authorize, request, or extend access to network resources on their behalf.<\/p>\n<p>The contractor&#8217;s status should be reviewed and confirmed with the manager every 30 days.<\/p>\n<p>HR should be notified of all new contractors, as well as changes in status, and exiting contractors.<\/p>\n<p>Considerations:<\/p>\n<ul>\n<li>A contractor working in the company&#8217;s facility could get injured, and the company is liable.\u00a0 There needs to be a clear understanding of who is \/ is not authorized to work in a company facility.<\/li>\n<li>Equipment.\u00a0 Contractors must be required to surrender company-owned assets upon exit.<\/li>\n<li>Contractor IDs should be immediately disabled upon exit &#8211; this requires coordination with HR and IT.<\/li>\n<li>Accounting should be made aware of changes in status for active contracts.<\/li>\n<li>Facility access should be revoked &#8211; Contractors must surrender keys and badges upon exit.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"identify-and-mitigate-liability\"><\/span>Identify and Mitigate Liability<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The company&#8217;s liability to the contractor revolves around payment for services rendered, but additional situations may exist, where the company is liable if the contractor is injured in a company-owned facility.<\/p>\n<p>A regular employee would be able to leverage Workman&#8217;s Compensation insurance &#8211; a product designed to limit and manage the company&#8217;s exposure to workplace injuries &#8211; but a contractor would not.<\/p>\n<p>An employment agreement or employment contract spells out items that are in the company&#8217;s interest.\u00a0 Any agreement with an independent contractor should include similar protections:<\/p>\n<ul>\n<li>Non-compete:\u00a0 Can&#8217;t work for a competitor during, nor 6 months following the end or termination of the contract.<\/li>\n<li>Non-disclosure:\u00a0 Can&#8217;t reveal any proprietary or confidential information to any third party.\u00a0 The term of non-disclosure should be specified, and relevant to the value of proprietary information that the contractor might obtain.\u00a0 For example, a client list or marketing strategy should be protected from disclosure for perhaps 1 year, but a proprietary algorithm or process should be protected for perhaps 10 years or even perpetuity.\u00a0 The Colonel&#8217;s herb&#8217;s and spices are proprietary to this day.<\/li>\n<\/ul>\n<p>Unlike an employee, a contractor should also agree to indemnify or insure the company and their customers against harm &#8211; usually through negligence or disclosure on the part of the contractor.<\/p>\n<p>With a regular employee, the company has 100% liability for actions taken by the employee on behalf of the company.\u00a0 The company directs the employees actions, and controls the employee financially, and with the threat of termination.\u00a0 If an employee deletes a customer&#8217;s file, or discloses information, they can be terminated, and if their actions involve criminal behavior, they could be subject to prosecution, but the company maintains the liability with respect to its customers.<\/p>\n<p>With a contractor, any protections for either party have to be specified within the contract, which needs to ensure that potential liability is appropriately maintained with the contractor.<\/p>\n<p>As a contractor, most people don&#8217;t have extensive personal assets that could be recovered in a civil suit, in the event that the contractor creates or exposes a liability.\u00a0 In addition, any individual can declare personal bankruptcy, which protects their home, vehicles, &#8220;tools of the trade&#8221; used to make money, retirement funds and certain other personal assets, which could severely limit the extent of what can be recovered.<\/p>\n<p>As they say, you can&#8217;t get blood out of a turnip.<\/p>\n<p>Further, some contractors do business as a Limited Liability Company (LLC) or Limited Liability Partnership (LLP), which separates the assets of their company from their personal assets.\u00a0 In this situation, the contractor&#8217;s &#8220;company&#8221; might not have any assets that could be recovered in a civil suit, but any assets owned by the individual would be fully protected.\u00a0 In this case, the contractor could (intentionally or otherwise) cause a problem that costs your company or its customers a lot of money, but they get to walk away without any financial impact &#8211; they simply fold their LLC \/ LLP and walk away, but they get to keep their bank accounts, speed boat, and collection of sports memorabilia.<\/p>\n<p>For these reasons, contractors should be able to provide some form of liability protection &#8211; either a bond or insurance that would mitigate any direct liability to the company.<\/p>\n<p>In order to gauge the level of liability protection required, the company needs to fully understand both the value and the impact due to down time or disclosure for all of its information assets, but specifically in the context of any damage that a contractor could cause.<\/p>\n<p>Contractors should be vetted in order to protect the company and its customers:<\/p>\n<ul>\n<li>Criminal background check &#8211; theft, fraud, or embezzlement could all be significant red flags.\u00a0 Someone with drug connections might be involved in money laundering.<\/li>\n<li>Financial background check &#8211; Although filing for bankruptcy isn&#8217;t a crime, a contractor is basically their own business.\u00a0 Your company might prefer not to do business with a contractor who can&#8217;t manage their finances.\u00a0 Bankruptcy can also be a way to shield themselves from financial debt or previous liability.<\/li>\n<li>As part of the background check process, look for association with LLCs or LLPs that have recently declared bankruptcy, which could be used to hide debt\u00a0 or previous liability, and could be a red flag.<\/li>\n<li>Licenses and Accreditation &#8211; All professional \/ trade licenses and accreditation should be current.\u00a0 Membership with any applicable trade associations should be current and in good standing.<\/li>\n<li>Insurance &#8211; If applicable, the contractor should be able to show proof of liability and other applicable forms of insurance.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"a-tale-of-three-contractors\"><\/span>A Tale of Three Contractors<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-the-missing-contractor\"><\/span>Anecdote: The Missing Contractor<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>Consulting with a medium-sized company, we came across a network ID that we couldn&#8217;t validate as an active employee.\u00a0 We finally tracked him down, and the &#8220;owning&#8221; manager indicated that he had been an employee at one point, but retired, and they had hired him back as a contractor.\u00a0 The manager indicated that &#8220;he does work for us, from time to time&#8221; and that they still pull him in for &#8220;special projects&#8221;.<\/em><\/p>\n<p><em>Three months went by, and during a user access review, we noted that the account hadn&#8217;t been active, as far as we can tell, for two years &#8211; dating back to the creation of the NT domain where the ID existed.\u00a0 We reached out to the manager, who confirmed that the person &#8220;is still a contractor, and we still use his services from time to time&#8221;.<\/em><\/p>\n<p><em>Through three more user access reviews, his last-login time had not changed, and the manager in question kept insisting that &#8220;we still use his services&#8221;.<\/em><\/p>\n<p><em>After a year of this, I contacted accounting, who had no record of any invoices in the last 24 months.\u00a0 In fact, they couldn&#8217;t determine the last invoice they had processed for this person.\u00a0 I called the phone number listed under his user ID, and had an interesting conversation.\u00a0 I introduced myself, and asked about his current business relationship with the company.\u00a0 He indicated that, he HAD been employed there about four years ago, but that he had retired.\u00a0 I asked about his ongoing assistance with special projects, and he was not aware of any such involvement, and refuted that he&#8217;d done any work at all, since retiring 4 years ago.\u00a0 I thanked him for his time, and disabled his user ID.<\/em><\/p>\n<p><em>The manager in question had always <strong>meant<\/strong> to bring him back as a contractor, and just never had!\u00a0 When he left the company, the company was using Novell for directory and access management.\u00a0 Someone had migrated his user ID to NT almost 3 years prior (at that point), and he had never used it!<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<p><em>We should have just disabled his access during the first user access review, and then deleted it after 90 days.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-the-double-dipping-contractor\"><\/span>Anecdote: The Double-Dipping Contractor<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>One day, accounting contacted me, to see if we had a user ID for a person we&#8217;ll call &#8220;Steve&#8221;.\u00a0 &#8220;Steve the contractor&#8221; had done some work for the company, but had exited nearly a year ago.\u00a0 Fortunately, we had a record of terminating his access and receiving his laptop upon his exit date.<\/em><\/p>\n<p><em>The accounting admin shared with me, that the company had been processing invoices for this person on a monthly basis, averaging about 20 hours per week.\u00a0 She asked if there was any way he could be performing the services in question without network access.\u00a0 My assertion was &#8220;no, but let&#8217;s talk to his manager.&#8221;<\/em><\/p>\n<p><em>We called his manager in to a meeting to discuss this person&#8217;s status with the company, and review the invoices.\u00a0 The manager related that he had done some work for his department, but they had terminated his contract about a year ago.\u00a0 The manager also asserted that, without network access, there&#8217;s now way he could have been performing any kind of service for the company.<\/em><\/p>\n<p><em>Apparently, when this guy got let go, he just decided that he&#8217;d keep billing the company for almost a year, for services he was never performing.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<p><em>Accounting should have the cost center manager verify all invoices prior to paying them.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-free-laptop-and-tech-support\"><\/span>Anecdote: Free Laptop and Tech Support<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>I had recently implemented a policy requiring that, upon contacting the Help Desk, they should look the person up in Active Directory, and confirm their contractor ID or employee ID, or confirm some other relevant information, in order to verify their identity.<\/em><\/p>\n<p><em>One of the Help Desk staff called me one afternoon, and asked to see me in my office, after which, he related to me that a guy showed up, asking for tech support for his laptop.\u00a0 That&#8217;s not unusual &#8211; at that time we were closing 100 cases per day.\u00a0 The support analyst had tried to find his user ID in Active Directory, and couldn&#8217;t find it, but the man, who we will call &#8220;Ralph&#8221;, indicated that he was a contractor for the company.<\/em><\/p>\n<p><em>I went down to meet with &#8220;Ralph&#8221; &#8211; I instructed the Help Desk staff to go ahead and start working on his laptop, and pulled &#8220;Ralph&#8221; in to my office.\u00a0 I told him that we couldn&#8217;t locate his network ID, but that we would go ahead and start working on fixing his issue &#8211; he and I could clear up the paperwork.\u00a0 I called HR to see if they had any record of him, which they did not.\u00a0 HR would have had a list of at least 7 years of employment records, and up to 3 years of contractor history, so we should have a record of him.<\/em><\/p>\n<p><em>I asked who his manager is, and he told me a name I didn&#8217;t recognize.\u00a0 I called HR back, to see if they had any record of the manager, and they indicated that the manager HAD been an employee, but had left the company about 4 years ago.\u00a0 I called the current manager over that department, to see if they recognized &#8220;Ralph&#8221;.\u00a0 The current manager related that &#8220;Ralph&#8221; had done some work for the company a long time ago, but didn&#8217;t think he had done any work recently.<\/em><\/p>\n<p><em>This was getting interesting&#8230;<\/em><\/p>\n<p><em>Again, I asked &#8220;Ralph&#8221; when he had worked for the company, and he confirmed that it had been a &#8220;been a while&#8221; but that he had a blanket contract with the company.<\/em><\/p>\n<p><em>Taking another tact, I called the Support Analyst, to see how the laptop was progressing, but also to get his laptop&#8217;s model number and asset ID information.\u00a0 While talking with him, the Support Analyst told me that the laptop was definitely ours, had client data on it, and seemed to have a bunch of software installed (more than average).\u00a0 I called Accounting, to get the Fixed Asset information for the laptop.\u00a0 It had been assigned, new, about a year ago, and the depreciation was assigned to the department for whom &#8220;Ralph&#8221; claimed he worked.<\/em><\/p>\n<p><em>He was well dressed.\u00a0 He had an access badge for the facility.\u00a0 I asked &#8220;Ralph&#8221; how long he had his laptop, and he said, &#8220;about a year&#8221;.\u00a0 So all of that matches.\u00a0 How could he have a 1-year-old company-issued laptop if he hadn&#8217;t worked for us in 4 years?\u00a0 At this point, I was rather suspicious.<\/em><\/p>\n<p><em>I asked Ralph how he obtained his current laptop, and he responded that we (the company) had swapped out his old one when it died, about a year ago.\u00a0 He had had the old one for about 3 years.\u00a0 &#8220;Ralph&#8221; said that whenever he has a problem, he drops by, since we are close to his house, so that we can fix his laptop.\u00a0 I asked &#8220;Ralph&#8221; the last time he had submitted an invoice, and he responded that it had &#8220;been a while&#8221; since he had submitted an invoice, and come to think of it, he should probably go through his records and submit one.<\/em><\/p>\n<p><em>I gave him one more chance &#8211; I asked him who at the company he&#8217;d dealt with, in the last year, and he replied that he had dealt with my staff (the Help Desk) for tech support, and he had also needed a new cell phone, also probably about a year ago, so he had spoken to the office coordinator to get a new one.\u00a0 I asked him, other than my staff and the office coordinator, who he had spoken to or worked with in the last year.\u00a0 At this point he became a little flustered.<\/em><\/p>\n<p><em>I used a little deception.\u00a0 I asked to see his badge, since I was sure that would clear things up.\u00a0 I pretended to type something in to my computer, while looking at the badge.\u00a0 I asked if he had any other badges, and he said that was the only badge he had ever been issued.\u00a0 I did NOT hand his badge back.<\/em><\/p>\n<p><em>Instead, I told him that we would absolutely go ahead and fix his laptop, but that we were going to retain it, along with his badge, until he could prove his relationship to the company.\u00a0 At this point, he got really mad.\u00a0 I stood up, and informed him that I would be escorting him to the elevator.\u00a0 He could go home, or wherever he wanted, and look through his documentation, and if he could produce a recent invoice, a contract, or any documentation linking him to the company, we&#8217;d be happy to return the laptop and submit the proper paperwork.<\/em><\/p>\n<p><em>He shouted at me, &#8220;HOW am I supposed to do my work??&#8221;<\/em><\/p>\n<p><em>To which I replied, &#8220;What work is that?&#8221;<\/em><\/p>\n<p><em>&#8220;Well, I have several important clients waiting on my work, and I need the data that&#8217;s on my laptop!&#8221;<\/em><\/p>\n<p><em>&#8220;Well, then you can tell me who you&#8217;re working with.\u00a0 Tell me the Account Executive&#8217;s name, and I&#8217;ll call them, and clear this up.&#8221;<\/em><\/p>\n<p><em>Silence.<\/em><\/p>\n<p><em>I just-short-of-forcefully escorted him to the elevator, and repeated my assertion that he should find some documentation to clear this up.\u00a0 He shouted at me a few more times, and left.<\/em><\/p>\n<p><em>What happened?<\/em><\/p>\n<p><em>After asking Accounting to do a deep dive, we DID finally find some evidence that he worked for the company as a contractor&#8230; about 4 years ago.\u00a0 He had worked on two or three short-term assignments, over about a 6 month period of time, during which, he had been issued a company-owned laptop and cell phone.<\/em><\/p>\n<p><em>I have no idea what was discussed between &#8220;Ralph&#8221; and the company at that point, but obviously he kept the laptop, cell phone, and badge, with some expectation that he was on retainer, &#8220;waiting&#8221; for new projects.\u00a0 Looking at his laptop, he HAD been doing work, just not for us!\u00a0 He had actually been doing work for a competitor, and had THEIR clients data on OUR laptop.\u00a0 Whenever he needed tech support, he had a badge, so he just &#8220;showed up&#8221; and convinced whoever was at the desk to help him.\u00a0 When his old laptop died, the Support Analyst assumed that because he had a company-issued laptop and a company-issued badge, that he was an employee, and assigned him a brand new laptop out of inventory.<\/em><\/p>\n<p><em>Moral of the story<\/em><\/p>\n<ul>\n<li><em>Badge access reviews would have identified that &#8220;Ralph&#8221; was no longer associated with the company, and his badge should be revoked or disabled<\/em><\/li>\n<li><em>Any internal or external support desk should have a process in place for verifying the caller&#8217;s identity and association with the company as a current employee or contractor.<\/em><\/li>\n<li><em>All employees should receive basic training against social engineering.\u00a0 If someone is a client or employee, they should have no problem being able to verify that fact.\u00a0 If someone asks you to do something outside the ordinary, take steps to authenticate the person, and validate if you are authorized to perform the requested task.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"exit-process-checklist\"><\/span>Exit Process Checklist<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These are items that should be conducted during the exit process &#8211; in other words, as the employee is leaving.\u00a0 Some of these items will overlap the more thorough access termination checklist, but this is designed to be a guide for HR and IT, regarding actions that should be taken prior to the employee leaving the facility.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"company-assets\"><\/span>Company Assets<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Upon exit, the employee should surrender company assets and equipment<\/p>\n<ul>\n<li><strong>Laptop<\/strong><\/li>\n<li><strong>Corporate Card<\/strong><\/li>\n<li><strong>Cell Phone<\/strong><\/li>\n<li><strong>ID Badge<\/strong><\/li>\n<li><strong>Electronic Badge (if not the same as the ID badge)<\/strong><\/li>\n<li><strong>Office Keys<\/strong><\/li>\n<li><strong>Offsite Storage Keys<\/strong><\/li>\n<li><strong>Bin \/ Desk \/ File Drawer Keys<\/strong><\/li>\n<li><strong>VPN token<\/strong><\/li>\n<li><strong>Parking Pass<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"logical-access\"><\/span>Logical Access<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Disable central directory access \/ user identity &#8211; LDAP or Active Directory<\/li>\n<li>Disable VPN credentials<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"access-termination-checklist\"><\/span>Access Termination Checklist<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Access to company resources should be immediately revoked, upon employment \/ contract termination.\u00a0 Waiting leaves potentially critical systems exposed.<\/p>\n<p>The best practice is:<\/p>\n<ul>\n<li>Immediately disable any system that is WITHOUT a mitigating control<\/li>\n<li>Systems WITH a mitigating control should be disabled within 24 hours<\/li>\n<li>Maintain a log of all forms of access, who terminated each, and on what date<\/li>\n<\/ul>\n<p>I will attempt to enumerate as many forms of access that should be considered during termination, as possible.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"physical-controls\"><\/span>Physical Controls<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"facility\"><\/span>Facility<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Building keys<\/strong> should be surrendered<\/li>\n<li><strong>Office keys<\/strong> should be surrendered<\/li>\n<li><strong>Master keys<\/strong> should be surrendered<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"storage\"><\/span>Storage<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Safe keys<\/strong> should be surrendered<\/li>\n<li><strong>Safe combinations<\/strong> should be disclosed<\/li>\n<li><strong>Safe combinations<\/strong> should be changed<\/li>\n<li><strong>Filing cabinet \/ desk \/ bin keys<\/strong> should be surrendered<\/li>\n<li><strong>Keys to shared filing areas<\/strong> should be surrendered<\/li>\n<li><strong>Combinations to locked, shared filing areas<\/strong> should be changed<\/li>\n<li><strong>Keys to offsite storage<\/strong> should be surrendered<\/li>\n<li><strong>Combinations to locked, offsite storage<\/strong> should be changed<\/li>\n<li><strong>Revoke access to Safe Deposit boxes<\/strong> with the bank, and update contact information.\u00a0 Consider changing to a new safe deposit box, if ultra-sensitive.<\/li>\n<li><strong>Keys to Safe Deposit boxes<\/strong> should be surrendered.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"electronic-access\"><\/span>Electronic Access<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>PINs<\/strong> should be set to explicitly deny.\u00a0 If PIN pad authentication systems don&#8217;t support a &#8220;deny&#8221; list, the PINs should be deleted.<\/li>\n<li><strong>Badges<\/strong> should be surrendered<\/li>\n<li><strong>Badges<\/strong> should be explicitly disabled (Even if you have possession of a physical access device, it should be stored, disabled until reused)<\/li>\n<li><strong>Biometrics<\/strong> signatures should be set to explicitly deny.\u00a0 If biometric systems don&#8217;t support a &#8220;deny&#8221; list, or if local laws prevent long-term storage of biometric signatures due to privacy laws, signatures should be deleted.\n<ul>\n<li>Retina patterns<\/li>\n<li>Finger prints<\/li>\n<li>Palm signatures<\/li>\n<li>Facial signatures<\/li>\n<\/ul>\n<\/li>\n<li><strong>Fobs and other tokens<\/strong> should be surrendered<\/li>\n<li><strong>Fobs and other tokens<\/strong> should be explicitly disabled (don&#8217;t store active fobs or other tokens)<\/li>\n<li><strong>Electronic safe PINs<\/strong> should be disclosed<\/li>\n<li><strong>Electronic safe PINs<\/strong> should be changed<\/li>\n<li><strong>Alarm System<\/strong> &#8211; PIN codes and biometrics should be set to explicitly deny, or if not feasible, deleted<\/li>\n<li><strong>Alarm System<\/strong> &#8211; Shared or well-known access codes should be changed<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-my-other-badge\"><\/span>Anecdote:\u00a0 My OTHER Badge<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>Circumstances are what they are, and it&#8217;s never pleasant, but I had to let one of my Network Administrators go &#8211; not with cause, but due to down-sizing.<\/em><\/p>\n<p><em>Let&#8217;s call him &#8220;Jay&#8221;<\/em><\/p>\n<p><em>I called &#8220;Jay&#8221; in to a conference room with his HR rep, we let him go, it wasn&#8217;t pleasant, but he understood.\u00a0 <\/em><\/p>\n<p><em>&#8220;Jay&#8221; surrendered his keys and badge, signed his affirmation of company policy, including non-compete and non-disclosure.<\/em><\/p>\n<p><em>I solemnly walked &#8220;Jay&#8221; to the elevator, and we parted amicably.<\/em><\/p>\n<p><em>The next day, I saw &#8220;Jay&#8221; in the hallway visiting with a small group of people.<\/em><\/p>\n<p><em>I walked up to him, and he greeted me, very friendly, and I asked him how he got in to a secure floor, of a secure facility.<\/em><\/p>\n<p><em>He answered that he still had his &#8220;guest badge&#8221; in his car.<\/em><\/p>\n<p><em>I gave him &#8220;the look&#8221;, and he handed it to me.<\/em><\/p>\n<p><em>What happened?<\/em><\/p>\n<p><em>&#8220;Jay&#8221; forgot his badge one day, and got a visitor badge.\u00a0 He had called the office manager and asked them to assign all of his permissions to the guest badge, so that he could use it as a backup.<\/em><\/p>\n<p><em>So, his &#8220;guest badge&#8221; had access to the facility as well as secured floors, and secured areas such as the SERVER ROOM, so that if he left his badge at home, he had a backup.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ul>\n<li><em>Conduct regular badge access reviews.<\/em><\/li>\n<li><em>Ensure that all guest \/ visitor badges are accounted for.<\/em><\/li>\n<li><em>Ensure that each person only has ONE badge assignment.<\/em><\/li>\n<li><em>Disable all badges that can&#8217;t be accounted for.<\/em><\/li>\n<li><em>What if someone had broken in to &#8220;Jay&#8217;s&#8221; car and stolen the badge?\u00a0 That person could use &#8220;Jay&#8217;s&#8221; personal information to figure out where he works, and based on his job description, a clever criminal could infer that his badge has special access to a secure room on a secure floor, in a secure facility, and use his badge to steal very expensive equipment.\u00a0 DO NOT LEAVE YOUR BADGE IN YOUR CAR.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-my-badge-allowed-it\"><\/span>Anecdote:\u00a0 My Badge Allowed It<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>In spite of camera systems, I always assign at least one person to keep an eye on the server room door, which was magnetically locked, and required special badge access to gain entry.<br \/>\n<\/em><\/p>\n<p><em>One day, I got a call, &#8220;you&#8217;d better get down here&#8221;<\/em><\/p>\n<p><em>The analyst related that a regular employee, who we will call &#8220;Tim&#8221; just badged himself in to the server room, and brought a small group of people with him.<\/em><\/p>\n<p><em>I entered the server room, just as &#8220;Tim&#8221; was finishing his &#8220;tour&#8221;.\u00a0 I took &#8220;Tim&#8221; aside, and asked how he had gained access to the server room, obviously a sensitive and therefore RESTRICTED area.<\/em><\/p>\n<p><em>His response?<\/em><\/p>\n<p><em>&#8220;My badge had access, so I just assumed I was allowed.&#8221;<\/em><\/p>\n<p><em>I informed &#8220;Tim&#8221; that if he ever entered this room again, unescorted by someone on my staff, he would be collecting unemployment.<\/em><\/p>\n<p><em>What happened?<\/em><\/p>\n<p><em>&#8220;Tim&#8221; had gotten a badge when he joined the company, several months ago.<\/em><\/p>\n<p><em>The badge had formerly belonged to a member of my staff, who had quit.<\/em><\/p>\n<p><em>&#8220;The people in charge of badges&#8221; gave &#8220;Tim&#8221; the ADMIN badge without checking to see where it had access.<\/em><\/p>\n<p><em>After a few weeks at the company, &#8220;Tim&#8221; randomly swiped his badge on the server room door, and it let him in!<\/em><\/p>\n<p><em>&#8220;Tim&#8221; just assumed he had been granted some special access to the server room.\u00a0 &#8220;Tim&#8221; told his friends about his &#8220;special access&#8221;, and he decided, on his own authority, to give a &#8220;tour&#8221; for a group of unauthorized people, to the most sensitive room in the company.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ul>\n<li><em>Upon recovery, badges should be disabled, and all access permissions should be removed.\u00a0 Upon reassignment, the badge should be granted specific access.<\/em><\/li>\n<li><em>Regular access reviews would have caught an active badge assigned to a non-administrative employee, with access to a sensitive area.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-the-permanent-safe\"><\/span>Anecdote:\u00a0 The Permanent Safe<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>I worked for a medium-sized company, whose employees were largely remote, and traveled frequently to customer sites.<\/em><\/p>\n<p><em>We did so much business with the travel agency, that we had our own on-site travel office, with a few reps, and equipment.<\/em><\/p>\n<p><em>After rolling out the self-service travel portal, our need for onsite help dramatically decreased, and eventually, we had just a single rep.<\/em><\/p>\n<p><em>That person was relocated from a 6 person bull pen, so that the space could be reclaimed for other uses.<\/em><\/p>\n<p><em>In the process, they moved the travel rep in to the office next to me &#8211; he dealt with confidential information and had access to sensitive documents, so it made sense.<\/em><\/p>\n<p><em>They also moved a fairly bulky safe from the old travel area in to his office, and it was bolted to the floor such that you had to have access to the INSIDE of the safe to unbolt it from the floor.\u00a0 The safe was used to store blank airline tickets and travel vouchers that had real monetary value, so the safe was a necessity.<\/em><\/p>\n<p><em>Eventually, the one remaining travel rep moved back to his company&#8217;s offices, and vacated his office in our facility.<\/em><\/p>\n<p><em>The office he was using sat empty for a while, but eventually got reassigned.\u00a0 The first question from the new occupant:\u00a0 &#8220;What is that thing in the corner, and how can I get rid of it?&#8221;<\/em><\/p>\n<p><em>No one knew the safe combination.<\/em><\/p>\n<p><em>The travel rep had left the company, and no one had any contact information for him.<\/em><\/p>\n<p><em>The travel company did not know the safe combination.<\/em><\/p>\n<p><em>As far as I know, that safe is still in that office, to this day.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<p><em>Someone probably should have asked for that safe combination at some point&#8230; More important, no one knows it, and therefore it can&#8217;t be changed, and no one knows exactly what&#8217;s in there.\u00a0 That was 7 years ago.<br \/>\n<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"vendor-accounts\"><\/span>Vendor Accounts<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"web-hosting-external-vendors\"><\/span>Web Hosting \/ External Vendors<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Domain Registrar<\/strong> &#8211; revoke access, and update contact information<\/li>\n<li><strong>DNS Provider<\/strong> &#8211; revoke access, and update contact information<\/li>\n<li><strong>Certificate \/ Trust provider<\/strong> &#8211; revoke access, and update contact information<\/li>\n<li><strong>Hosting provider<\/strong> &#8211; revoke access, and update contact information<\/li>\n<li><strong>Cloud vendor<\/strong> &#8211; revoke access, and update contact information<\/li>\n<li><strong>FTP \/ File sharing<\/strong> &#8211; revoke access, and update contact information<\/li>\n<li><strong>Web Conferencing<\/strong> &#8211; revoke access, and update contact information.\u00a0 Some web conferencing sites can be automatically configured to automatically log in to a customer&#8217;s system, for the purpose of providing &#8220;unattended&#8221; vendor support.\u00a0 This is a special type of risk that must be explicitly managed.<\/li>\n<li><strong>Instant Messenger<\/strong> &#8211; Make sure to revoke administrative access for hosted \/ federated instant messenger access.<\/li>\n<li><strong>Hosted Fax Service<\/strong> &#8211; YES, Fax!\u00a0 Many companies still use fax for purchase orders and signed contracts.\u00a0 Make sure to revoke administrative access to hosted fax services.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"financial\"><\/span>Financial<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Bank access<\/strong> &#8211; revoke access, change authentication codewords, approval codes, or other credentials<\/li>\n<li><strong>Payroll vendor<\/strong> &#8211; If your company uses a 3rd party payroll vendor, be sure to revoke access as appropriate, both for online viewing (regular employee access), as well as possible administrative access (e.g. if the employee was a payroll administrator).<\/li>\n<li><strong>Cloud-based ERP<\/strong> &#8211; Disable the user account, and remove access to time entry and create expense reports.\u00a0 Remove any possible administrative access, for example, the ability to approve time sheets and expense reports.<\/li>\n<li><strong>Travel Portal<\/strong> &#8211; Disable access to company travel portal and company-owned travel website accounts, to prevent booking travel.<\/li>\n<li><strong>Corporate Card<\/strong> &#8211; Company-issued credit card(s) should be surrendered, including any kind of voucher cards, parking vouchers, travel vouchers, gas cards, meal vouchers, and the like (example, cafeteria cards).\u00a0 All company-issued payment instruments should be disabled, so that they can&#8217;t be stolen and reused.<\/li>\n<li><strong>Supplier purchasing accounts<\/strong> &#8211; Disable access to all supplier accounts authorized to make purchases on behalf of the company, such as computer equipment, office supplies, or food.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"redirect-contact-information\"><\/span>Redirect Contact Information<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>E-mail<\/strong> &#8211; Make sure e-mail is forwarded to the manager (or appropriate contact), and then go back and provide e-mail archives.\u00a0 E-mail archives could include copies of contracts, agreements, fragments of discussions, and other information necessary to continuing a client relationship.<\/li>\n<li><strong>Cell phone<\/strong> &#8211; You required the use of a company-issued cell phone, and confiscated it during the exit process.\n<ul>\n<li>Make sure the number hasn&#8217;t been forwarded to a personal number<\/li>\n<li>Disable the employee&#8217;s access to the cell phone&#8217;s voicemail.\u00a0 This might be via a PIN code entered after dialing the phone number, or perhaps via a website with the employee&#8217;s login.<\/li>\n<li>Forward the cell number to an accountable manager or employee who can receive calls and answer client requests \/ concerns.<\/li>\n<li>Provide manager access to the cell phone&#8217;s voice mail repository, to ensure continuity for customers who may have called and left a message.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Desk Phone<\/strong> &#8211; In the age of IP telephony, make sure to disable IP (&#8220;station&#8221;) access by changing the employee&#8217;s PBX password.\u00a0 Forward the employee&#8217;s DID (direct line) to a manager or designated employee who can address client \/ vendor requests and concerns.\u00a0 Provide manager access to voicemail archives for continuity.<\/li>\n<li><strong>Fax<\/strong> &#8211; YES, Fax is still in use, especially for purchase orders and contracts.\u00a0 Some companies use online fax services, such as those provided by eFax, while others use a &#8220;fax gateway&#8221;, integrated with the company PBX.\u00a0 In either case, make sure to disable access to the Fax mailbox (should be limited by disabling network access), and make sure to forward the fax number to a manager or designated employee.\u00a0 Providing access to the employee&#8217;s fax mailbox ensures continuity &#8212; sometimes, SIGNED (executed) copies of contracts and other critical artifacts can be found in an employee&#8217;s fax archive.<\/li>\n<li><strong>Instant Messaging<\/strong> &#8211; This one is counter-intuitive, but many companies use external or federated instant messaging to communicate with clients and vendors.\u00a0 Your goal is to ensure that whoever reaches out via IM reaches a company employee who can assist them appropriately.\u00a0 Change IM passwords, and forward IM access to the manager or an appropriate employee.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"data-and-telecommunications\"><\/span>Data and Telecommunications<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Datacom and private circuit vendors (Wide-Area Networks)<\/strong> &#8211; Verizon, AT&amp;T, and the like.\u00a0 Revoke access and update contact information<\/li>\n<li><strong>ISP (Internet Service Provider)<\/strong> &#8211; Revoke access and update contact information<\/li>\n<li><strong>Telecom (Local telecom lines)<\/strong> &#8211; Revoke access and update contact information<\/li>\n<li><strong>Telecom (Long distance lines)<\/strong> &#8211; Revoke access and update contact information.\u00a0 Often, long distance and local access are managed by two different vendors, or might be two different accounts under the same vendor.\u00a0 The goal is to make sure all telecom accounts are updated.<\/li>\n<li><strong>PBX (Phone system) Vendor and Maintenance<\/strong> &#8211; Revoke access and update contact information.<\/li>\n<li><strong>Cloud VoIP Vendor<\/strong> &#8211; Skype or other external communication channels<\/li>\n<li><strong>Audio Conferencing<\/strong> &#8211; Disable personal conference bridge line<\/li>\n<li><strong>Audio Conferencing<\/strong> &#8211; Consider changing well-known conference bridge information for regular meetings.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"warnings-about-conferencing\"><\/span>Warnings about Conferencing<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><span style=\"text-decoration: underline;\"><strong>Beware of regular conference calls<\/strong><\/span><\/p>\n<p>Let&#8217;s say &#8220;Steven&#8221;, the VP of Marketing for &#8220;QRS Corp&#8221;, exits the company in a less-than-amicable fashion.<\/p>\n<p>As an employee of &#8220;QRS&#8221;, &#8220;Steven&#8221; had attended the Monday morning Marketing strategy call.<\/p>\n<p>A few weeks later, &#8220;Steven&#8221; works for a competitor, &#8220;XYZ&#8221;.<\/p>\n<p>Knowing that his old company, &#8220;QRS&#8221;, conducts Monday morning Marketing strategy calls at 9 AM, and knowing the conference bridge line, he buys a disposable cell phone, and surreptitiously dials in each week for several months.<\/p>\n<p>He dials in at the top of the hour, puts his disposable phone on mute, and simply collects information.<\/p>\n<p>&#8220;QRS&#8221; steadily loses clients, and can&#8217;t figure out how &#8220;XYZ&#8221; is always one step ahead.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Best Practice<\/strong><\/span>:\u00a0 Establish a regular cycle, such as 60 or 90 days, where conference bridge information for recurring meetings (especially sensitive ones) will be changed.\u00a0 Distribute the new conference bridge information to current participants, and cease using the old bridge information on a specified date.<\/p>\n<p>If your audio conference vendor allows it, identify all attendees for sensitive meetings, and disconnect unidentified connections.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Web Conferencing<\/strong><\/span><\/p>\n<p>Beware information leakage and eavesdropping.<\/p>\n<div id=\"attachment_2016\" style=\"width: 392px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2016\" class=\"size-full wp-image-2016\" src=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-content\/uploads\/RandomWebex.png\" alt=\"Random Webex\" width=\"382\" height=\"576\" srcset=\"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-content\/uploads\/RandomWebex.png 382w, https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-content\/uploads\/RandomWebex-199x300.png 199w\" sizes=\"auto, (max-width: 382px) 100vw, 382px\" \/><p id=\"caption-attachment-2016\" class=\"wp-caption-text\">Random Webex<\/p><\/div>\n<p>For the above, I did the following Google search:<\/p>\n<blockquote><p><em>site:webex.com\u00a0 SomeCompany<\/em><\/p><\/blockquote>\n<p>&#8220;QLD&#8221; is Queensland, and &#8220;SOW&#8221; is Scope of Work (a definition of work to be performed for a client).<\/p>\n<p>Each meeting has a 9-digit code and a password.<\/p>\n<p>Every link in the list above includes the meeting number, and with VERY little social engineering, you could obtain the password.<\/p>\n<p>If SomeCompany was YOUR company, an ex-employee or a competitor could easily gain access to a web conference, to view client presentations, sales and marketing strategies, design sessions, and the like.<\/p>\n<p><strong>Make all meetings &#8220;private&#8221; so that they can&#8217;t be browsed.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-pc-spending-spree\"><\/span>Anecdote:\u00a0 PC Spending Spree<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>A friend of mine owned a small business.<\/em><\/p>\n<p><em>After a few arguments with his office manager, &#8220;Stephanie&#8221;, who had worked for him for several years, he decided to let her go.<\/em><\/p>\n<p><em>He generously gave &#8220;Stephanie&#8221; 4 weeks of severance, and stated that he&#8217;d be happy to provide her with a reference.<\/em><\/p>\n<p><em>About 6 weeks later, he got an invoice for just under $10,000 from his computer supplier &#8211; $10,000 was his credit limit with that particular vendor.<\/em><\/p>\n<p><em>Someone had ordered three computers, monitors, and other equipment on his account, and he got the bill two weeks later.<\/em><\/p>\n<p><em>Looking at the invoice, the shipping address was his office address, but he certainly didn&#8217;t order the equipment, none of his employees ordered the equipment, and he didn&#8217;t receive any of the equipment.<\/em><\/p>\n<p><em>Looking at the invoice history, &#8220;Stephanie&#8221; had logged in to the vendor&#8217;s website, about 4 weeks after she had been let go, since her account had never been disabled.\u00a0 She knew the company&#8217;s credit limit was $10K, so she ordered just enough equipment to total just under that limit, including tax and shipping.\u00a0 She knew no one would be at the office on Saturday, so she specified Saturday delivery.\u00a0 The office itself was located inside a building whose front door lock utilized a common access code that never changed.\u00a0 The delivery guy used the access code to enter the building and drop off the equipment in the hallway just outside of the owner&#8217;s office suite &#8211; the delivery guy didn&#8217;t have a master key, and since the building itself was locked, he assumed the boxes were secure.\u00a0 <\/em><\/p>\n<p><em>Checking the building&#8217;s surveillance footage, &#8220;Stephanie&#8217;s&#8221; husband entered the front door a short time after the delivery &#8211; everyone knows the common access code that never changes &#8211; and then proceeded to remove all of the boxes that had just been delivered, taking 3 trips in the process.\u00a0 Very few people are in the building on a Saturday, and no one questioned him because he looked official, and had the front door access code.\u00a0 A smile and a wave seals the deal.<br \/>\n<\/em><\/p>\n<p><em>I guess &#8220;Stephanie&#8221; thought she needed some additional severance!<\/em><\/p>\n<p><em>Instead of an employment reference of her work history, professional skills, and loyal service, she got a criminal reference outlining her fraud and theft.<\/em><\/p>\n<p><em>Moral of the story:<\/em><\/p>\n<ul>\n<li><em>The owner retrieved &#8220;Stephanie&#8217;s&#8221; office key upon termination, but the building&#8217;s common, never-changing access code presents a real problem.\u00a0 Ideally, each user should have their own PIN code.\u00a0 If the building is unwilling to spring for newer equipment that supports this feature, they should at least change the access code monthly, or ideally, weekly.<\/em><\/li>\n<li><em>&#8220;Stephanie&#8217;s&#8221; vendor account was still active 4 weeks after she was let go, allowing her to charge $10k in equipment on behalf of the company.\u00a0 Having a detailed termination checklist would have resulted in her account being disabled.<br \/>\n<\/em><\/li>\n<li><em>Dual authorization workflow would have necessitated the owner&#8217;s authorization to make the purchase.\u00a0 He would have received an e-mail with a link to approve or deny the order, at which time he could have cancelled the order (and disabled &#8220;Stephanie&#8217;s&#8221; account).<\/em><\/li>\n<li><em>Two weeks is a long time to go, between the time the equipment was stolen, and the time the theft was noticed.\u00a0 Luckily, the building kept plenty of tapes (back then, before digital, cameras recorded to VHS tapes), and were able to show who stole the equipment.\u00a0 Reviewing a weekly report from the vendor would have caught the fake order, which could have been cancelled or intercepted.\u00a0 Most suppliers are happy to offer this type of reporting, and can usually provide regular reports via e-mail.<\/em><\/li>\n<li><em>Buildings should have a secure &#8220;mail drop&#8221; area, where mail and other packages can be dropped off when the recipient is out of office, rather than allowing deliveries in common areas such as hallways.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"anecdote-dns-jacked\"><\/span>Anecdote:\u00a0 DNS-Jacked!<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p><em>A start-up, Company &#8220;Z&#8221; had a well-established infrastructure, and a very secure network.\u00a0 Hosting a small-but-growing, public-facing application, Company &#8220;Z&#8221; also hosted their own DNS.<\/em><\/p>\n<p><em>During the post-Enron crash, Company &#8220;Z&#8221; lost some of its funding, and had to let some folks go.<\/em><\/p>\n<p><em>Unfortunately, they didn&#8217;t remove one of their network administrators from having access to their domain registrar.<\/em><\/p>\n<p><em>An external vendor account, the registrar is responsible for creating the &#8220;registration&#8221; record for a domain name, which includes basic information about the company who owns the domain name, and includes &#8220;pointers&#8221; to the DNS servers that &#8220;own&#8221; the domain.<\/em><\/p>\n<p><em>Registrar &#8211;&gt; Domain Registration &#8211;&gt; DNS &#8211;&gt; Website<\/em><\/p>\n<p><em>Even though the Company &#8220;Z&#8221; DNS servers were highly-secure, the rogue admin was able to change the registration to point to another DNS server, bypassing the data center!\u00a0 Without entering the building physically or logically, he was able to hijack the entire hosted application by simply logging in to a registrar account that had not been updated to remove his access!<\/em><\/p>\n<p><em>He set up a fake web site, mocking &#8220;Company Z&#8221;, and used HIS DNS to point &#8220;www.CompanyZ.com&#8221; to the fake web site.<\/em><\/p>\n<p><em>By the time calls started pouring in, it was already too late.\u00a0 As a final insult, he had changed his password, and removed all other users&#8217; access to the registrar&#8217;s website, necessitating a lengthy negotiation process with the registrar to prove rightful ownership of the account, and eventually unlock it.<\/em><\/p>\n<p><em>Moral of the Story:<\/em><\/p>\n<ul>\n<li><em>Maintain an access inventory that includes EXTERNAL as well as internal accounts and access.<\/em><\/li>\n<li><em>Disable vendor accounts immediately upon termination.<\/em><\/li>\n<li><em>Conduct regular access reviews of EXTERNAL as well as internal accounts and access.<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"logical-access-2\"><\/span>Logical Access<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"remote-access\"><\/span>Remote Access<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>VPN access should be disabled<\/strong>.\u00a0\u00a0 Each factor should be individually disabled:\n<ul>\n<li>If leveraging central identity, the directory account should be disabled, and the VPN access role should be removed.\u00a0 For example, if there is a &#8220;VPN access&#8221; group, the user should be removed from the group, on top of being disabled.<\/li>\n<li>Certificates should be revoked.<\/li>\n<li>Tokens should be surrendered and also disabled.<\/li>\n<li>Biometric signatures should be set to &#8220;deny&#8221;, or deleted if &#8220;deny access&#8221; is not possible.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dial-up modem access should be disabled.<\/strong>\u00a0 Don&#8217;t laugh&#8230; some companies still use Remote Access Service (RAS) as an out-of band admin access strategy, in case their internet connection drops.<\/li>\n<li><strong>Serial line \/ terminal access should be disabled.<\/strong>\u00a0 Again, many companies have older mainframes, storage, and other systems that are directly connected to a phone line, allowing vendor or administrative access.\u00a0 Best practice:\n<ul>\n<li>If your PBX can route an analog line, connect it to your PBX, then assign an extension.<\/li>\n<li>The analog&#8217;s DID (Direct number) will now route to the PBX, necessitating 3 or 4 additional digits (the extension) to get to the mainframe or storage device.<\/li>\n<li>The extension should be changed on a regular basis, such as monthly or quarterly.<\/li>\n<li>A\u00a0&#8220;war dialing&#8221; attacker\u00a0 (dialing each number in a block of numbers, looking for a modem) will fail to find anything, because the analog line routes to the PBX attendant.<\/li>\n<li>This is also an excellent way to prevent against Fax Spam.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Managed VPN<\/strong> &#8211; Some companies utilize a cloud-based VPN service.\u00a0 Employee access to VPN should be disabled immediately upon termination.<\/li>\n<li><strong>Internet-facing Applications<\/strong> &#8211; Access to internet-facing applications should be revoked.\u00a0 These might include:\n<ul>\n<li>E-mail<\/li>\n<li>Sharepoint or E-Room<\/li>\n<li>FTP \/ File sharing<\/li>\n<li>ERP (time sheets, expense reports)<\/li>\n<li>Corporate Intranet \/ Portal (prevent leakage of sensitive documents and information)<\/li>\n<li>CRM (customer contact \/ management tool)<\/li>\n<li>Support website (especially for software companies, you don&#8217;t want a former employee downloading full copies of your software)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Web Conferencing<\/strong> &#8211; I already mentioned this, but to emphasize, some web conferencing systems can be configured for unattended access to specific systems for the purpose of providing vendor support.\u00a0 A worst-case scenario, you don&#8217;t want a disgruntled support engineer to shut down <strong>your<\/strong> systems, nor <strong>your customers&#8217;<\/strong> systems.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"control-systems\"><\/span>Control Systems<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Everything is remotely-manageable these days.\u00a0 Where feasible, all control systems should leverage central identity and access control, and management should be restricted to an authorized management console.<\/p>\n<p>Control systems are the infrastructure to your infrastructure, and must be protected.<\/p>\n<p>Here are some control system elements to review for access upon employee termination:<\/p>\n<ul>\n<li><strong>Power control<\/strong> &#8211; you don&#8217;t want a rogue employee to shut down your servers and network gear!<\/li>\n<li><strong>UPS Systems<\/strong> &#8211; Batteries buffer line and generator power in the event of a power failure.<\/li>\n<li><strong>Air handlers<\/strong> \/ chillers \/ AC &#8211; computer equipment will rapidly overheat if the air handlers are shut off<\/li>\n<li><strong>Telecom<\/strong> \/ datacom termination &#8211; Often called a &#8220;smart jack&#8221;, some datacom \/ telecom termination blocks can be remotely administered or monitored.<\/li>\n<li><strong>Door Locks<\/strong> &#8211; You don&#8217;t want a former employee giving themselves access to your data center<\/li>\n<li><strong>Alarm Systems<\/strong> &#8211; Some alarm systems can be remotely controlled and monitored<\/li>\n<li><strong>Camera Systems<\/strong> &#8211; The epitome of hacking as depicted in TV and movies, a rogue employee can erase evidence or shut down camera systems in order to prevent leaving a trace.<\/li>\n<\/ul>\n<p>There are many other &#8220;control&#8221; systems that might be embedded within your infrastructure &#8211; you should conduct a walk-through to identify these systems, and add them to the Access Inventory.<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"a-brief-word-on-radius\"><\/span>A Brief Word on RADIUS<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Remote Authentication Dial-In User Service (RADIUS) is a protocol designed specifically to manage and broker authentication and access control for edge devices.<\/p>\n<p>LDAP authentication simply presents a user ID and password, and perhaps looks for specific group membership or other directory attributes.<\/p>\n<p>In contrast, RADIUS brokers authentication, while implementing complex access control rules based on each &#8220;edge device&#8221;, or groups of edge devices, allowing multiple criteria based on WHERE a user connects, the connection SOURCE, or specific access methods, and back-end directory attributes.<\/p>\n<p>RADIUS also provides information back to the edge device, to manage the connection, such as IP address information, VLAN information, or other parameters.<\/p>\n<p>Where LDAP provides a simple &#8220;YES \/ NO&#8221;, RADIUS provides &#8220;yes\/no&#8221; based on conditional parameters, and also returns connection-specific information that the edge device should use to manage the user.<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"infrastructure-devices-%e2%80%93-best-practices\"><\/span>Infrastructure Devices &#8211; Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>YOUR INTERNET ROUTER<\/strong> &#8211; That one goes in all caps, because it&#8217;s the MOST LIKELY to have unaudited, unauthorized-but-active user accounts.\u00a0 Typically, your company&#8217;s internet router is accessible by your ISP or your own staff, or both!\u00a0 Because it sits outside the firewall, you definitely don&#8217;t m,want your internet router to have access to the internal network for the purpose of authentication!\u00a0 The best strategy is to define a very few system-level accounts, with extremely complex passwords, that are changed monthly or quarterly.\u00a0 If an administrative user is terminated, the internet router passwords should be changed immediately.\u00a0 Management access to your internet router should be limited to a few specified IP addresses.<\/li>\n<li><strong>Firewalls<\/strong> &#8211; Firewalls should leverage RADIUS authentication.\u00a0 Secondary authentication should exist for emergencies, using a local account that&#8217;s changed quarterly or more frequently.\u00a0 Any employee with local access to a firewall should have their access removed upon termination.<\/li>\n<li><strong>Secure Management Access<\/strong> &#8211; Routers, Switches, Firewalls, and other network devices should not have management points that are accessible from outside the company&#8217;s network, and ideally, there should be a &#8220;secure VLAN&#8221; with specified access for only a few IP addresses.<\/li>\n<li><strong>Switches and Routers<\/strong> &#8211; Switches, Routers, and other network devices should be configured to leverage RADIUS authentication, which in turn, leverages a central directory-based identity.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"list-of-infrastructure-devices\"><\/span>List of Infrastructure Devices<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Internet Router<\/strong> &#8211; Change passwords for well-known accounts;\u00a0 Remove local access<\/li>\n<li><strong>Firewalls<\/strong> &#8211; Review \/ Remove access<\/li>\n<li><strong>Routers<\/strong> &#8211; Review \/ Remove access<\/li>\n<li><strong>Switches<\/strong> &#8211; Review \/ Remove access<\/li>\n<li><strong>Intrusion Detection<\/strong> \/ Prevention Systems &#8211; Review \/ Remove access<\/li>\n<li><strong>Network Tap \/ Bypass<\/strong> &#8211; Review \/ Remove access<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"central-directory-%e2%80%93-best-practices\"><\/span>Central Directory &#8211; Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>Before removing a user from the directory, or modifying a user object, it&#8217;s helpful to make a backup copy of the object, including all attributes (specifically, group membership and other entitlements) for three reasons.\n<ul>\n<li>First, assume that the person leaving will be replaced.\u00a0 If &#8220;Bob&#8221; leaves or gets terminated, &#8220;Bob&#8217;s&#8221; boss might hire &#8220;Frank&#8221; a couple of weeks later, and ask for the same permissions and entitlements for &#8220;Frank&#8221;, that &#8220;Bob&#8221; had.\u00a0 Having a complete record of &#8220;Bob&#8217;s&#8221; account makes that request a very simple one.<\/li>\n<li>Second, &#8220;Bob&#8221; might come back.\u00a0 It happens more often than you might think &#8211; contractors come and go (and often come back!), and sometimes, employees that leave or retire come back as contractors or consultants.<\/li>\n<li>Third, &#8220;Bob&#8217;s&#8221; account might get accidentally corrupted or deleted.<\/li>\n<\/ul>\n<\/li>\n<li>In addition to a basic LDAP command line query, there are many tools that will import and export either a single object or the entire directory to LDIF (LDAP file format), CSV (text), or XML.\u00a0 Having the ability to rapidly back up or restore a single user, group, or the entire directory, quickly, will pay for itself, the first time someone accidentally deletes a user, or worse, deletes a group object.<\/li>\n<li>Recovering a corrupt directory, especially in Microsoft Active Directory, can be a long and complicated process, and depending on the situation (for example, in a disaster recovery event), starting with a blank directory and importing all of the objects might be faster.<\/li>\n<li>Using these tools, it&#8217;s a good idea to perform a &#8220;full export&#8221; on a nightly or weekly basis, to an administrative (locked down) share.\u00a0 In addition to being able to quickly reference or restore an object, this is a good way to go back in time to look for changes, and can also be used as a baseline to audit for unauthorized changes, such as users who have been recently granted admin access.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"servers-and-applications\"><\/span>Servers and Applications<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li><strong>Central Directory User Object \/ Primary Identity<\/strong>\n<ul>\n<li>Make a backup of the user object &#8211; Useful as a point of reference<\/li>\n<li>Disable the user object &#8211; Prevent authentication<\/li>\n<li>Remove all entitlements and privileges (for example, group membership) &#8211; Prevent someone from enabling and using the user object<\/li>\n<\/ul>\n<\/li>\n<li><strong>Servers<\/strong> &#8211; Audit all servers that leverage local users\n<ul>\n<li>Document user access<\/li>\n<li>Disable local user accounts<\/li>\n<li>Revoke user privileges and entitlements<\/li>\n<\/ul>\n<\/li>\n<li><strong>Databases<\/strong> &#8211; For each database instance, document, disable the account, and remove access<\/li>\n<li><strong>Applications<\/strong> &#8211; For each internal application, document, disable the account, and remove access<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"task-specific-servers\"><\/span>Task-specific Servers<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Review, document, and revoke access to all of the following:<\/p>\n<ul>\n<li><strong>SCADA Servers<\/strong><\/li>\n<li><strong>Task Servers<\/strong><\/li>\n<li><strong>Controller Servers<\/strong><\/li>\n<li><strong>Tape \/ Media Controllers<\/strong><\/li>\n<li><strong>PBX<\/strong> (Phone System)<\/li>\n<li><strong>Time Clock System<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"home-office-equipment\"><\/span>Home Office Equipment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Home office assets should be shipped back to the company:<\/p>\n<ul>\n<li><strong>Monitor<\/strong><\/li>\n<li><strong>Docking Station<\/strong><\/li>\n<li><strong>VoIP Phone<\/strong><\/li>\n<li><strong>Router<\/strong><\/li>\n<li><strong>Printer<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"termination-checklist-template\"><\/span>Termination Checklist Template<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Download the termination checklist template in ODF (Open Document Format) XLS (Microsoft Excel) or PDF (Portable Document Format):<\/p>\n<p>ODF:\u00a0 <a href=\"\/JustinParr-Tech\/wp-content\/uploads\/SampleTerminationChecklist.ods\">SampleTerminationChecklist.ods<\/a>\u00a0\u00a0\u00a0 (Opens in LibreOffice)<\/p>\n<p>XLS:\u00a0 <a href=\"\/JustinParr-Tech\/wp-content\/uploads\/SampleTerminationChecklist.xls\">SampleTerminationChecklist.xls<\/a>\u00a0\u00a0 (Opens in Microsoft Excel)<\/p>\n<p>PDF:\u00a0 <a href=\"\/JustinParr-Tech\/wp-content\/uploads\/SampleTerminationChecklist.pdf\">SampleTerminationChecklist.pdf<\/a>\u00a0\u00a0 (Printable Version)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"summary\"><\/span>Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Maintain an Access Inventory, and make sure to keep a current, corresponding Termination Checklist<\/li>\n<li>Failure to appropriately identify and maintain access to company-owned systems can result in unintended consequences, especially if a terminated employee still has access!<\/li>\n<li>Think outside the box, and make sure you identify internal, external, hosted, and physical forms of access.<\/li>\n<li>Manage contractors and contractor access in order to minimize risk to your business<\/li>\n<li>Use the provided template as a starting point for your own inventory \/ termination checklist.<\/li>\n<\/ul>\n<p>If you think I&#8217;ve missed anything, or if you have an amusing story to share, please do so in the comments.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When an employee or contractor leaves the company, it&#8217;s best practice to immediately disable their access to company resources. In the digital and online world, it&#8217;s easy to miss some forms of access, and remember off-hand every single system where the employee&#8217;s access should be revoked. The level of risk increases when the employee separation [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-1762","post","type-post","status-publish","format-standard","hentry","category-analyses-and-responses"],"_links":{"self":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts\/1762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/comments?post=1762"}],"version-history":[{"count":10,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts\/1762\/revisions"}],"predecessor-version":[{"id":2311,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/posts\/1762\/revisions\/2311"}],"wp:attachment":[{"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/media?parent=1762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/categories?post=1762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/justinparrtech.com\/JustinParr-Tech\/wp-json\/wp\/v2\/tags?post=1762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}