VARONIS WHITEPAPER Fixing the "Everyone" Problem

Similar documents
VARONIS CASE STUDY Children's Hospital of Wisconsin

VARONIS WHITEPAPER Next Generation Enterprise Search

VARONIS CASE STUDY. Heemskerk Municipality

VARONIS CASE STUDY. Matanuska Telephone Association (MTA)

VARONIS CASE STUDY. Arnold Worldwide

VARONIS CASE STUDY. Philip Morris International (PMI)

VARONIS CASE STUDY. HIT Entertainment

VARONIS CASE STUDY. Fresenius Netcare

VARONIS CASE STUDY. Greenhill & Co.

VARONIS WHITEPAPER. Mastering the Information Explosion

VARONIS CASE STUDY THE HAGADONE CORPORATION

10 Things IT Should be Doing (But Isn t)

VARONIS CASE STUDY University of Liverpool

VARONIS WHITEPAPER. 11 Things IT Should be Doing (But Isn t)

VARONIS RESEARCH PAPER. Information Entropy. Information Entropy

Managing Unstructured Data: 10 Key Requirements

Accelerating Audits with Automation: Who s Accessing Your Unstructured Data?

T E TMcDonough@AInfoSys.com W VARONIS DATA GOVERNANCE SUITE

The Business Case for Data Governance

Contents of This Paper

VARONIS WHITEPAPER. PCI DSS for IT Pros and Other Humans

Global Headquarters: 5 Speen Street Framingham, MA USA P F

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

Big Data and Infosecurity: Research Report

Best Practices for Auditing Changes in Active Directory WHITE PAPER

Being protected Using data analytics to detect fraud

Managing your accounts

Access Rights Management. Only much Smarter.

OneDrive for Business User Guide

BT Calling Features User Guide. Make more of your phone

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

SIR, IT S QUITE POSSIBLE THIS ASTEROID IS NOT ENTIRELY STABLE

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

How Varonis Can Help With Efforts Toward Sarbanes-Oxley Compliance

Setting up a basic database in Access 2003

Chapter 28: Expanding Web Studio

Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe

The Top 3 Common Mistakes Men Make That Blow All Their Chances of Getting Their Ex-Girlfriend Back Which of these mistakes are you making?

What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros

Do You Know Where Your Messages Are?

Set Up Omni-Channel. Salesforce, Winter

The problem with privileged users: What you don t know can hurt you

The Marketer s Guide To Building Multi-Channel Campaigns

Rev. 06 JAN Document Control User Guide: Using Outlook within Skandocs

VARONIS CASE STUDY. Analysys Mason. Analysys Mason

... ADDRESSING CHAOS: THE -MANAGER TM SOLUTION THE RADICATI GROUP, INC. A whitepaper by The Radicati Group, Inc.

Buying vs. Building Business Analytics. A decision resource for technology and product teams

10 Reasons Why Project Managers Need Project Portfolio Management (PPM)

Cleaning Up Your Outlook Mailbox and Keeping It That Way ;-) Mailbox Cleanup. Quicklinks >>

Managing Your Class. Managing Users

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

ADO and SQL Server Security

Securing Microsoft Office 365

Practical Jealousy Management

The beginner s guide to marketing

Credit Repair ebook. You don t have to pay money to repair your credit Our ebook will teach you: MagnifyMoney

Exchange Account (Outlook) Mail Cleanup

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

HIPAA Compliance and Varonis

A better customer experience

How To Migrate From Eroom To Sharepoint From Your Computer To Your Computer

Installing a Personal Server on your PC

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

CyberArk Privileged Threat Analytics. Solution Brief

white paper No More Spreadsheets: Top 5 Reasons to STOP using Excel for Planning and Performance Management Executive Summary

NODE4 SERVICE DESK SYSTEM

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

Alteryx Predictive Analytics for Oracle R

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Persuasive. How to Write Persuasive. Marketing Proposals

Creating and Managing Shared Folders

Meeting Workspace Alternatives

Software developer uses largeformat devices to promote secure group collaboration. Black Marble Limited

Telemarketing Services Buyer's Guide By the purchasing experts at BuyerZone

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Updating KP Learner Manager Enterprise X On Your Server

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint

Many home and small office networks exist for no

FileLocker. The Top Five Reasons Legal Professionals Must Adopt Private Cloud File Sharing

Offline Files & Sync Center

Google Docs, Sheets, and Slides: Share and collaborate

Windows XP Virtual Private Network Connection Setup Instructions

Make more of your phone

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business.

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

SENDING S & MESSAGES TO GROUPS

May

No more nuisance phone calls! Internet Control Panel & Weblink Guide

Starting Your Fee Based Financial Planning Practice From Scratch (Part 2) FEE008

Anglia IT Solutions Managed Anti-SPAM


What Is Pay Per Click Advertising?

Big Data at Cloud Scale

WHITE PAPER. Understanding Transporter Concepts

Outlook 2010 Desk Reference Guide

Used as content for outbound telesales programmes and (potentially) inbound telesales response.

Architected Blended Big Data with Pentaho

5 Key Content Marketing Challenges (and How to Solve Them) Phone : , info@marketing.

webinars creating blog posts customer quotes CONTENT MARKETING for MINISTRIES video tutorials lead strategy inform sharing A publication of

Transcription:

VARONIS WHITEPAPER Fixing the "Everyone" Problem

Contents INTRODUCTION 3 HOW THE EVERYONE PROBLEM HAPPENS 4 THE REAL ISSUE 4 PAST OPTIONS 5 A NEW OPTION: THE VARONIS Solutions 5 2

INTRODUCTION Digital collaboration is at the heart of every business process files are created, stored and shared at a rapid clip to keep pace with customers and competitors. IDC estimates that the volume of unstructured data (e.g., documents, spreadsheets, presentations, images, etc.) is growing at a pace of 50% year over year. There s so much of this unstructured information, in fact, that it accounts for more than 80% of all enterprise data in most organizations. Even with regulations, industry best-practices and the purest of intentions, it seems nearly impossible to keep track of who has and needs access to all of this information, and who doesn t. And, as news articles continue to remind us, the unfortunate truth is that employees, contractors and consultants don t always do the right thing with their access privileges.regulations concerning Personally Identifiable Information, credit card information, munitions, and health information have upped the stakes. Organizations can face hefty fines (as well as damage to reputation) when files containing this type of content are exposed or stolen. Even in the securities and financial industries, if you think your IT organization has data access permissions under control, you may want to dig a little deeper. Most IT organizations grant access readily, yet revoke it infrequently. So, don t assume that only the human resources group can see the human resources data, or that an employee who left the company last week had all her permissions revoked. The permissions to access the data on your file servers, SharePoint sites, and mailboxes are very likely too permissive. This situation is not an oversight, nor the sign of a lax IT organization. It is just that the technology to solve this in a practical, manageable way did not exist until recently. While there are many ways this situation comes to pass, built right into the operating system is a contributing factor that nearly every Administrator knows about. And, while they know about it and there s nothing they did to cause it, they cannot ix it with conventional tools and techniques. We re talking about folder permissions for the Everyone group on Windows file systems, the world-writable problem on UNIX/Linux, authenticated users on SharePoint, and anonymous on Exchange. 3

HOW THE EVERYONE PROBLEM HAPPENS With all of the expertise and technology safeguards in place, how is it possible that a major risk to unstructured data on shared file systems cannot be easily reversed? Well it goes something like this. As an administrator, you or maybe your predecessor set up a couple of file systems or shared drives. Some of the folders on those file shares were left wide open, and you relied on data owners to define the access permissions. On other folders, you locked things down by assigning access permissions only to certain groups. Over time, though, even the locked-down folders opened up. That s because Windows Server is designed to facilitate access. When a new folder is created, the Microsoft Windows (up until very recently) default is to assign the Everyone group access permission to this folder, meaning that the folder is wide open to all users in the organization. That is not a problem as long as the folder creator goes back and reassigns the permissions or if you, as an administrator, become aware of the new folder in time and restrict access permissions. But, that s not a practical reality given the pace of information creation and the dynamic nature of projects and teams in most organizations. So, chances are very good that you won t know about this new folder. And, because they are not Windows experts, the users that create these folders know nothing about the Everyone group. It s similar on SharePoint end users often set SharePoint permissions on their own, and are often under pressure to set them quickly. Unfortunately, end users often push the tempting button to grant access to all authenticated users, giving access to everyone in the domain. All UNIX administrators have at one time or another run chmod 777 [dir] in an effort to get something working. Exchange administrators know (and worry) that the more senior the executive in the company, the more accessible their mailbox is likely to be to their supporting staff and other employees. THE REAL ISSUE What s the result of Everyone, World, and Authenticated Users access? Over time, sensitive data including intellectual property, client information or other sensitive data makes its way into folders open to way too many people. Not only is this valuable data, it is also critical to the business, so it is accessed a lot. As part of your quarterly file clean-up, or in preparation for a data entitlement audit review, you d love to get rid of the Everyone problem. But, you ve spoken with everyone you know and there is no good way to do it. 4

PAST OPTIONS Remove the Everyone group from the folders and wait for calls from angry users to pour in as they try to access the data they need. At least that will tell you who within Everyone is accessing this stuff! Turn on Windows Server Auditing (which Microsoft warns against because of the performance impact), SharePoint auditing, UNIX/Linux auditing (bsm, etc.), Exchange Journaling, and comb through reams of logs to find out who is accessing the data, see if they have access to the folder some other way (e.g. through a different domain group), and if not, grant them access via a new group, or an existing one that (hopefully) doesn t grant them access to something else they shouldn t have. There is another option and most administrators (no, you are not alone) take this unspoken option 3 : do nothing and hope that business proceeds without incident. After all, nothing has happened yet, right? The first two options are just not realistic. There would be business disruption with either choice, not to mention weeks or months of work that no one has planned for, let-alone asked you to do. But you know that this situation should not persist, especially in an environment where securities and financial data are potentially at risk. And, of course, when it comes to audit time, this will all be highlighted. A NEW OPTION: THE VARONIS SOLUTION There is a solution to the Everyone problem that has emerged and is gaining traction. It s a software solution based on metadata that can take care of the problem not in weeks or months, but in mouse clicks. It s by Varonis, and it can quickly: List all of the folders/sites in your file systems, SharePoint, and Exchange open to global access groups like everyone Prioritize the folders that need remediating based on the amount of sensitive data, activity and exposure Show you the names of the users accessing those folders/sites that have no other way to access them Let you simulate and fix the permissions on all platforms through a single interface. The folders most at risk get fixed first, the rest get fixed in order of priority, and there is no disruption to the business, and no panicked or angry phone calls. In addition to solving the historical problem, Varonis Solutions also help keep your environment cleaned-up in an ongoing way. If new folders are created with the Everyone group assignment, it lets you know so you can deal with it swiftly. And, fixing the Everyone problem is just one of the myriad of features you get out-of-the-box with Varonis. 5

About Varonis Varonis is the leader in unstructured and semi-structured data governance software. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged. Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily with whom they must, and organizations can be confident their content is protected and managed efficiently. Free 30-day assessment: Within hours of installation You can instantly conduct a permissions audit: File and folder access permissions and how those map to specific users and groups. You can even generate reports. Within a day of installation Varonis DatAdvantage will begin to show you which users are accessing the data, and how. Within 3 weeks of installation Varonis DatAdvantage will actually make highly reliable recommendations about how to limit access to files and folders to just those users who need it for their jobs. Worldwide Headquarters 1250 Broadway, 31st Floor, New York, NY 10001 T 877-292-8767 E sales@varonis.com United Kingdom and Ireland Varonis UK Ltd. Warnford Court 29 Throgmorton Street London, UK EC2N 2AT T 020 3402 6044 E sales-uk@varonis.com Western Europe Varonis France SAS 4, rue Villaret de Joyeuse 75017 Paris France T +33 (0)1.82.88.90.96 E sales-france@varonis.com Germany, Austria and Switzerland Varonis Deutschland GmbH Robert Bosch Strasse 7 64293 Darmstadt T + 49-0-6257 9639728 E sales-germany@varonis.com 6