SlideShare a Scribd company logo
1 of 18
Download to read offline
www.varonis.com | Data Risk Assessment sample
DATA RISK ASSESSMENT
SAMPLE REPORT: ACME
The Data Risk Assessment gives a snapshot of your data
security to quickly ascertain the level of risk associated with
your data: exposing high risk areas and where you can
safely and swiftly pull back access, reducing your risk profile.
www.varonis.com | Data Risk Assessment sample
SCOPE
A sample of ACME’s data was assessed for risks in the following areas:
●● Overexposed and at-risk sensitive & classified data
●● Access controls and authorization processes
●● Privileged and end user access monitoring
●● Active Directory structure
●● NTFS and sharing permissions structure
●● Data retention proficiency
●● Compliance with applicable regulations
File servers and data
sources monitored
●● CIFS_FS_1
●● CIFS_FS_2
●● CIFS_FS_3
●● CIFS_FS_4
●● NFS_FS_1
●● EXCH_1
●● SP_1
Contents
●● 331,237 GB of data
●● 90,348,156 folders
●● 1,617,176,767 files
●● 701,387,576 permission
	entries
Active Directory
●● 8,580 user accounts
●● 14,427 groups
●● 9,268 computer accounts
●● 420 disabled users
●●
www.varonis.com | Data Risk Assessment sample
74%
GLOBAL ACCESS GROUPS
KEY FINDINGS:
Global Group Access
These include groups such as Everyone,
Domain Users, and Authenticated Users.
Global access groups will allow anyone
within an organization to access data with
these access controls.
Data should generally never be accessible
to global access groups like Everyone,
Domain Users, or Authenticated Users. Data
that is open to everyone is most vulnerable
and at-risk for loss, theft or misuse.
Over 66.5 million folders with
global group access
66,502,975 of 90,348,156
Distribution of global group access
CIFS_FS_2				11%
CIFS_FS_3				7%
CIFS_FS_4				20%
SP_FS_1				44%
EXCH_FS_1				18%
Sensitive files with global group access
CIFS_FS_2				2%
CIFS_FS_3				1%
CIFS_FS_4				2%
SP_FS_1				82%
EXCH_FS_1				13%
www.varonis.com | Data Risk Assessment sample
1,116,554
1,100
131,598
SAP Account # DSPC SI UK DPA
SENSITIVE DATA
KEY FINDINGS:
Sensitive Data
Many files contain critical information
about employees, customers, projects,
clients, or other business-sensitive content.
This data is often subject to industry
regulation, such as SOX, HIPAA, PCI, EU
GDPR, GLB, and more.
When global access groups grant access to
sensitive and critical data, there is significant
risk to the business.
These instances must be identified and
remediated so that only the appropriate
users retain access to this sensitive,
regulated data – keeping sensitive data
secure, and meeting regulatory compliance.
Over 150 million files contain
sensitive data (150,534,645)
9,213,456 sensitive files are
open to Global Group Access
Distribution of sensitive files
CIFS_FS_2				13%
CIFS_FS_3				12%
CIFS_FS_4				8%
SP_FS_1				54%
EXCH_FS_1				13%
*Over 50% of sensitive information resides
on one file server: SP_FS_1
Total number of hits by type
SAP Account #			 1,116,554
PCI DSS				1,100
UK DPA 				131,598
www.varonis.com | Data Risk Assessment sample
75%
STALE DATA
KEY FINDINGS:
Stale Data
Data kept beyond a pre-determined
retention period can expose an
organization to additional liability and
is expensive to maintain.
Stale data – especially sensitive
information such as PII - should be
identified and archived or defensibly
deleted, if no longer needed.
253,168 GB of Stale Data
85,377,723 folders contain
stale data
Amount of stale data
CIFS_FS_2				25%
CIFS_FS_3				22%
CIFS_FS_4				8%
SP_FS_1				29%
EXCH_FS_1				16%
Stale data with sensitive information
CIFS_FS_2				14%
CIFS_FS_3				11%
CIFS_FS_4				9%
SP_FS_1				53%
EXCH_FS_1				13%
www.varonis.com | Data Risk Assessment sample
ACCOUNTS & USERS
KEY FINDINGS:
●● 1,182 user accounts have 		
	 non-expiring passwords
●● 2,555 user accounts are 		
	 stale but enabled
●● 46% (4,635) of users
	 accounts have removal
	recommendations
●● 14% of security groups have 	
	 no users (2,034)
●● 26% of domain groups
	 are empty
●● 13,830 domain accounts are 	
	 stale but enabled
Users with Non Expiring Passwords
Non expiring passwords allow unlimited
time to brute force crack them and indefinite
access to data via the account.
Stale Enabled Users
Stale enabled accounts still retain all of the
access permissions they were granted while
active, and are a target for exploitation and
malicious use to access data.
Empty Security Groups
These can allow access to more
data by becoming a member of the group;
a common technique of lateral movement
and privilege escalation.
14% (1,182) of user accounts
have non-expiring passwords.
www.varonis.com | Data Risk Assessment sample
FOLDERS & PERMISSIONS
KEY FINDINGS:
●● 277,027 folders with
	 Unresolved SIDs
●● 58,419 folders have
	 inconsistent permissions
●● 1,040,040 folders with
	 unique permissions
●● 423,872 folders were
	 detected with direct user 		
	ACEs
●● 25,551 protected folders
●● 90,348,156 folders without
	 data owners
Unresolved SIDs
Unresolved Security Identifiers occur when
a user on an access control list is deleted
from AD. They can potentially give hackers
access to data.
Inconsistent inheritance
A common by-product of inconsistent
permissions, inconsistent inheritance may
expose important data to individuals who
should not have access to that data.
While organizations make significant
investments in firewalls, IAM, IPS, DLP, and
SIEM, these systems are unable to prevent an
insider from accessing overexposed data.
277,027 unresolved SIDs
www.varonis.com | Data Risk Assessment sample
USER ACTIVITY
KEY FINDINGS:
●● 423,110 file opens
●● 182,335 file modifications
●● 65,120 file deletions
●● 22,965 permission changes User Activity & Behavior
User Activity is the actions on data performed
by users within the organization. This could
consist of file and permissions activity, email or
SharePoint activity, even activity on changes to
users and groups within the organization.
Without analyzing activity data, an organization
cannot understand the baseline behavior of
users. Varonis monitors and analyzes user and
entity behavior, giving you insight into potential
suspicious and unusual activity.
We use this analylsis to detect and alert on
behavioral deviations, highlight risk, and
discover insider threats, ransomware, and more.
These types of threats are front of mind for most
organizations: the capability to detect, mitigate,
and prevent them is a key to a strong data
security strategy.
Over 750,000 audit events
950 events on sensitive data
Distribution of sensitive files
CIFS_FS_2				13%
CIFS_FS_3				12%
CIFS_FS_4				8%
SP_FS_1				54%
EXCH_FS_1				13%
Top Alert Categories Triggered
Intrusion				5
Privilege Escalation			9
Exfiltration				2
www.varonis.com | Data Risk Assessment sample
KPIs
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
Low Risk
The more complex a file system structure, the greater risk for overexposure and
security vulnerabilities. Simplified access management procedures and standards
help lock down potential exposure of sensitive data from insider threats.
1,040,040 folders with unique permissions
Recommendation: Review permissions structure to determine if folder
uniqueness is required. If not, allow the folder to re-inherit parent permissions,
replacing unique ACEs.
277,027 folders with unresolved SIDs
Recommendation: Identify folders with unresolved SIDs and remove from ACLs
423,872 folders with direct user ACEs
Recommendation: Identify folders with direct user permissions, place users into the
appropriate group, and remove the user ACE from the ACL.
RISK SUMMARY: LOW
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
Medium Risk
Outdated data – whether files, users, or groups – quickly becomes a security
liability and unnecessary storage expense. Continued and automated upkeep
is necessary to maintain a secure environment, ensure resources are used
efficiently, and close security loopholes that might otherwise be exploited or
become vulnerable to brute-force attacks.
Stale data: 85,377,723 folders with stale data; 4,381,574 stale sensitive files
Recommendation: Identify stale data and determine what data can be moved,
archived, or deleted. Create and execute a consistent policy to manage stale data.
1,182 users with non-expiring passwords
Recommendation: Update accounts to comply with a strong password policy,
including regular password changes. Service accounts with non-expiring passwords
should be kept to a minimum.
455 looped nested groups
Recommendation: Looped nested groups can cause application crashes, consume
excessive processing resources, and behave unexpectedly since many applications
and scripts enumerate group membership recursively – to remediate, identify the
looped nested groups and remove the cyclical condition.
RISK SUMMARY: MEDIUM
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
RISK SUMMARY: HIGH
High Risk
Excessive access is one of the primary causes of data breaches: overexposed
sensitive and critical data is a debilitating security risk, and outdated user
permissions are a target for exploitation and malicious use. To achieve a least
privileged access model, it’s critical to restrict access to only those who need it:
manage users, eliminate broken inheritance and permissions inconsistencies,
and lock down sensitive data.
66,502,975 folders with global access groups
Recommendation: Remove global access group permissions to identify folders open
to global group access and their active users: place active users in a new group, and
replace the global access group with the new group on the ACL.
9,213,456 sensitive files are open to global group access
Recommendation: Sensitive data should be scanned, classified, and monitored so that
it remains secure across all networks.
30,000 folders with broken ACL
Recommendation: Repair inconsistent permissions by reestablishing NTFS inheritance
where the inheritance structure has become inconsistent.
2,555 stale but enabled users
Recommendation: Review stale enabled accounts to determine if they are necessary.
Delete or disable accounts as needed.
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
CAPABILITIES ASSESSMENT
GRADE 	 CAPABILITY
Full		 Track and report on Active Directory changes (group membership, GPO, etc.)
Partial 	 Track and report Access control list changes
None		 Track and report on file usage (creation, modifications, deletions, etc.)
None 		 Track and report on email usage (send, receive, send as, etc.)
None 		 Detect unusual file and email activity
Partial 	 Analyze potential access for file container objects
Partial 	 Analyze potential access for email container objects
None		 Analyze user or group potential access across file containers
None 		 Analyze user or group potential access across email stores
Partial 	 Identify sensitive or regulated content
Partial 	 Identify stale, unused content
None 		 Delegate access request approval process to data owners
www.varonis.com | Data Risk Assessment sample
IMMEDIATE RECOMMENDATIONS
STEP ONE:
•• Identify and remediate high risk areas with alerts, threat models,
	 data classification, and DatAdvantage modeling and commit functions.
•• Resolve performance issues using the DatAdvantage GUI.
•• Build out exhaustive reporting based on ACME requests
	 (full inventory on defined scope).
•• Set up a dashboard to follow up remediation effort.
STEP TWO:
•• Remove ‘Everyone’ group and implement a least privilege model across the 		
	 Windows share environment.
•• Change group based access model on base folders/shares to one read
	 and one modify group.
•• Identify and tag responsible business units and data owners for sets of data
	 across ACME.
STEP THREE:
•• Set up alerts on deviation of remediated resources.
•• Automate data retention and migration with the use of the rules, scope
	 and tiered storage in Data Transport Engine.
•• Automate the file share access provisioning process and perform regular audit
	 and recertification of permissions on data sets with DataPrivilege.
www.varonis.com | Data Risk Assessment sample
VARONIS METHODOLOGY
DETECT insider threats and
security threats by analyzing
data, account activity, and
user behavior.
PREVENT disaster by locking
down sensitive and stale
data, reducing broad access,
and simplifying permissions.
SUSTAIN a secure state by
automating authorizations,
migrations, & disposition.
www.varonis.com | Data Risk Assessment sample
GET STARTED
Live Demo
Set up Varonis in your own environment.
Fast and hassle free.
info.varonis.com/demo
Data Risk Assessment
Get a snapshot of your data security,
reduce your risk profile, and fix real
security issues.
info.varonis.com/start
Get in touch
Have more questions? Let us know.
1.877.292.8767
info@varonis.com
www.varonis.com | Data Risk Assessment sample
DEFINITIONS
Inactive / Stale Data:
Data that has not had a file system event
recorded against it for 180 days.
Open / Global Access:
Instance(s) where access to an entity is
open to groups giving access to a large or
undefined set of users.
Defined access does not necessarily indicate
that an entity is protected or secure.
Sensitive Data:
Sensitive files can include regulated data
(PCI, PII, HIPAA, etc.), intellectual property,
and confidential files.
Stale enabled users:
User accounts that retain access permissions
which are not disabled, but have not been
utilized to log in to the domain.
Users with removal recommendations:
Users that retain privileges to data
required in their previous roles, but no
longer need access.
Empty Security Groups:
Active directory groups containing no users.
Unresolved SIDs:
Unresolved security identifiers occur when a
group or user ACE is permissioned directly on
a folder, and that group or user’s associated
Active Directory account is deleted.
Folders with Unique Permissions:
A folder that inherits its ACL from a parent
folder and has additional ACEs applied to it.
Protected Folders:
NTFS folders that contain an explicitly
defined ACL, and will inherit no ACEs from
their parent folders.
Definitions
Varonis is a powerful software suite that protects your file and
email servers from cyberattacks and insider threats. We analyze
the behavior of the people and machines that access your data,
alert on misbehavior, and enforce a least privilege model.
We help thousands of customers prevent data breaches.
ABOUT VARONIS

More Related Content

What's hot

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoJonathan Eubanks
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsVictor Oluwajuwon Badejo
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesUlf Mattsson
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingTroy Kitch
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyAlienVault
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingAlienVault
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity ManagementDon Lovett
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment Gazzang
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source DatabasesGazzang
 

What's hot (20)

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Content Aware SIEM™ defined
Content Aware SIEM™ definedContent Aware SIEM™ defined
Content Aware SIEM™ defined
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
GDPR
GDPRGDPR
GDPR
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity Management
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source Databases
 

Similar to Sample of The Varonis Data Risk Assessment

Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big dataUlf Mattsson
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Bezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSATBezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSATMarketingArrowECS_CZ
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 

Similar to Sample of The Varonis Data Risk Assessment (20)

Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Bezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSATBezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSAT
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 

Recently uploaded

Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excelysmaelreyes
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一F sss
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 

Recently uploaded (20)

Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excel
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
办理学位证加利福尼亚大学洛杉矶分校毕业证,UCLA成绩单原版一比一
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 

Sample of The Varonis Data Risk Assessment

  • 1. www.varonis.com | Data Risk Assessment sample DATA RISK ASSESSMENT SAMPLE REPORT: ACME The Data Risk Assessment gives a snapshot of your data security to quickly ascertain the level of risk associated with your data: exposing high risk areas and where you can safely and swiftly pull back access, reducing your risk profile.
  • 2. www.varonis.com | Data Risk Assessment sample SCOPE A sample of ACME’s data was assessed for risks in the following areas: ●● Overexposed and at-risk sensitive & classified data ●● Access controls and authorization processes ●● Privileged and end user access monitoring ●● Active Directory structure ●● NTFS and sharing permissions structure ●● Data retention proficiency ●● Compliance with applicable regulations File servers and data sources monitored ●● CIFS_FS_1 ●● CIFS_FS_2 ●● CIFS_FS_3 ●● CIFS_FS_4 ●● NFS_FS_1 ●● EXCH_1 ●● SP_1 Contents ●● 331,237 GB of data ●● 90,348,156 folders ●● 1,617,176,767 files ●● 701,387,576 permission entries Active Directory ●● 8,580 user accounts ●● 14,427 groups ●● 9,268 computer accounts ●● 420 disabled users ●●
  • 3. www.varonis.com | Data Risk Assessment sample 74% GLOBAL ACCESS GROUPS KEY FINDINGS: Global Group Access These include groups such as Everyone, Domain Users, and Authenticated Users. Global access groups will allow anyone within an organization to access data with these access controls. Data should generally never be accessible to global access groups like Everyone, Domain Users, or Authenticated Users. Data that is open to everyone is most vulnerable and at-risk for loss, theft or misuse. Over 66.5 million folders with global group access 66,502,975 of 90,348,156 Distribution of global group access CIFS_FS_2 11% CIFS_FS_3 7% CIFS_FS_4 20% SP_FS_1 44% EXCH_FS_1 18% Sensitive files with global group access CIFS_FS_2 2% CIFS_FS_3 1% CIFS_FS_4 2% SP_FS_1 82% EXCH_FS_1 13%
  • 4. www.varonis.com | Data Risk Assessment sample 1,116,554 1,100 131,598 SAP Account # DSPC SI UK DPA SENSITIVE DATA KEY FINDINGS: Sensitive Data Many files contain critical information about employees, customers, projects, clients, or other business-sensitive content. This data is often subject to industry regulation, such as SOX, HIPAA, PCI, EU GDPR, GLB, and more. When global access groups grant access to sensitive and critical data, there is significant risk to the business. These instances must be identified and remediated so that only the appropriate users retain access to this sensitive, regulated data – keeping sensitive data secure, and meeting regulatory compliance. Over 150 million files contain sensitive data (150,534,645) 9,213,456 sensitive files are open to Global Group Access Distribution of sensitive files CIFS_FS_2 13% CIFS_FS_3 12% CIFS_FS_4 8% SP_FS_1 54% EXCH_FS_1 13% *Over 50% of sensitive information resides on one file server: SP_FS_1 Total number of hits by type SAP Account # 1,116,554 PCI DSS 1,100 UK DPA 131,598
  • 5. www.varonis.com | Data Risk Assessment sample 75% STALE DATA KEY FINDINGS: Stale Data Data kept beyond a pre-determined retention period can expose an organization to additional liability and is expensive to maintain. Stale data – especially sensitive information such as PII - should be identified and archived or defensibly deleted, if no longer needed. 253,168 GB of Stale Data 85,377,723 folders contain stale data Amount of stale data CIFS_FS_2 25% CIFS_FS_3 22% CIFS_FS_4 8% SP_FS_1 29% EXCH_FS_1 16% Stale data with sensitive information CIFS_FS_2 14% CIFS_FS_3 11% CIFS_FS_4 9% SP_FS_1 53% EXCH_FS_1 13%
  • 6. www.varonis.com | Data Risk Assessment sample ACCOUNTS & USERS KEY FINDINGS: ●● 1,182 user accounts have non-expiring passwords ●● 2,555 user accounts are stale but enabled ●● 46% (4,635) of users accounts have removal recommendations ●● 14% of security groups have no users (2,034) ●● 26% of domain groups are empty ●● 13,830 domain accounts are stale but enabled Users with Non Expiring Passwords Non expiring passwords allow unlimited time to brute force crack them and indefinite access to data via the account. Stale Enabled Users Stale enabled accounts still retain all of the access permissions they were granted while active, and are a target for exploitation and malicious use to access data. Empty Security Groups These can allow access to more data by becoming a member of the group; a common technique of lateral movement and privilege escalation. 14% (1,182) of user accounts have non-expiring passwords.
  • 7. www.varonis.com | Data Risk Assessment sample FOLDERS & PERMISSIONS KEY FINDINGS: ●● 277,027 folders with Unresolved SIDs ●● 58,419 folders have inconsistent permissions ●● 1,040,040 folders with unique permissions ●● 423,872 folders were detected with direct user ACEs ●● 25,551 protected folders ●● 90,348,156 folders without data owners Unresolved SIDs Unresolved Security Identifiers occur when a user on an access control list is deleted from AD. They can potentially give hackers access to data. Inconsistent inheritance A common by-product of inconsistent permissions, inconsistent inheritance may expose important data to individuals who should not have access to that data. While organizations make significant investments in firewalls, IAM, IPS, DLP, and SIEM, these systems are unable to prevent an insider from accessing overexposed data. 277,027 unresolved SIDs
  • 8. www.varonis.com | Data Risk Assessment sample USER ACTIVITY KEY FINDINGS: ●● 423,110 file opens ●● 182,335 file modifications ●● 65,120 file deletions ●● 22,965 permission changes User Activity & Behavior User Activity is the actions on data performed by users within the organization. This could consist of file and permissions activity, email or SharePoint activity, even activity on changes to users and groups within the organization. Without analyzing activity data, an organization cannot understand the baseline behavior of users. Varonis monitors and analyzes user and entity behavior, giving you insight into potential suspicious and unusual activity. We use this analylsis to detect and alert on behavioral deviations, highlight risk, and discover insider threats, ransomware, and more. These types of threats are front of mind for most organizations: the capability to detect, mitigate, and prevent them is a key to a strong data security strategy. Over 750,000 audit events 950 events on sensitive data Distribution of sensitive files CIFS_FS_2 13% CIFS_FS_3 12% CIFS_FS_4 8% SP_FS_1 54% EXCH_FS_1 13% Top Alert Categories Triggered Intrusion 5 Privilege Escalation 9 Exfiltration 2
  • 9. www.varonis.com | Data Risk Assessment sample KPIs KEY FINDINGS:
  • 10. www.varonis.com | Data Risk Assessment sample Low Risk The more complex a file system structure, the greater risk for overexposure and security vulnerabilities. Simplified access management procedures and standards help lock down potential exposure of sensitive data from insider threats. 1,040,040 folders with unique permissions Recommendation: Review permissions structure to determine if folder uniqueness is required. If not, allow the folder to re-inherit parent permissions, replacing unique ACEs. 277,027 folders with unresolved SIDs Recommendation: Identify folders with unresolved SIDs and remove from ACLs 423,872 folders with direct user ACEs Recommendation: Identify folders with direct user permissions, place users into the appropriate group, and remove the user ACE from the ACL. RISK SUMMARY: LOW KEY FINDINGS:
  • 11. www.varonis.com | Data Risk Assessment sample Medium Risk Outdated data – whether files, users, or groups – quickly becomes a security liability and unnecessary storage expense. Continued and automated upkeep is necessary to maintain a secure environment, ensure resources are used efficiently, and close security loopholes that might otherwise be exploited or become vulnerable to brute-force attacks. Stale data: 85,377,723 folders with stale data; 4,381,574 stale sensitive files Recommendation: Identify stale data and determine what data can be moved, archived, or deleted. Create and execute a consistent policy to manage stale data. 1,182 users with non-expiring passwords Recommendation: Update accounts to comply with a strong password policy, including regular password changes. Service accounts with non-expiring passwords should be kept to a minimum. 455 looped nested groups Recommendation: Looped nested groups can cause application crashes, consume excessive processing resources, and behave unexpectedly since many applications and scripts enumerate group membership recursively – to remediate, identify the looped nested groups and remove the cyclical condition. RISK SUMMARY: MEDIUM KEY FINDINGS:
  • 12. www.varonis.com | Data Risk Assessment sample RISK SUMMARY: HIGH High Risk Excessive access is one of the primary causes of data breaches: overexposed sensitive and critical data is a debilitating security risk, and outdated user permissions are a target for exploitation and malicious use. To achieve a least privileged access model, it’s critical to restrict access to only those who need it: manage users, eliminate broken inheritance and permissions inconsistencies, and lock down sensitive data. 66,502,975 folders with global access groups Recommendation: Remove global access group permissions to identify folders open to global group access and their active users: place active users in a new group, and replace the global access group with the new group on the ACL. 9,213,456 sensitive files are open to global group access Recommendation: Sensitive data should be scanned, classified, and monitored so that it remains secure across all networks. 30,000 folders with broken ACL Recommendation: Repair inconsistent permissions by reestablishing NTFS inheritance where the inheritance structure has become inconsistent. 2,555 stale but enabled users Recommendation: Review stale enabled accounts to determine if they are necessary. Delete or disable accounts as needed. KEY FINDINGS:
  • 13. www.varonis.com | Data Risk Assessment sample CAPABILITIES ASSESSMENT GRADE CAPABILITY Full Track and report on Active Directory changes (group membership, GPO, etc.) Partial Track and report Access control list changes None Track and report on file usage (creation, modifications, deletions, etc.) None Track and report on email usage (send, receive, send as, etc.) None Detect unusual file and email activity Partial Analyze potential access for file container objects Partial Analyze potential access for email container objects None Analyze user or group potential access across file containers None Analyze user or group potential access across email stores Partial Identify sensitive or regulated content Partial Identify stale, unused content None Delegate access request approval process to data owners
  • 14. www.varonis.com | Data Risk Assessment sample IMMEDIATE RECOMMENDATIONS STEP ONE: •• Identify and remediate high risk areas with alerts, threat models, data classification, and DatAdvantage modeling and commit functions. •• Resolve performance issues using the DatAdvantage GUI. •• Build out exhaustive reporting based on ACME requests (full inventory on defined scope). •• Set up a dashboard to follow up remediation effort. STEP TWO: •• Remove ‘Everyone’ group and implement a least privilege model across the Windows share environment. •• Change group based access model on base folders/shares to one read and one modify group. •• Identify and tag responsible business units and data owners for sets of data across ACME. STEP THREE: •• Set up alerts on deviation of remediated resources. •• Automate data retention and migration with the use of the rules, scope and tiered storage in Data Transport Engine. •• Automate the file share access provisioning process and perform regular audit and recertification of permissions on data sets with DataPrivilege.
  • 15. www.varonis.com | Data Risk Assessment sample VARONIS METHODOLOGY DETECT insider threats and security threats by analyzing data, account activity, and user behavior. PREVENT disaster by locking down sensitive and stale data, reducing broad access, and simplifying permissions. SUSTAIN a secure state by automating authorizations, migrations, & disposition.
  • 16. www.varonis.com | Data Risk Assessment sample GET STARTED Live Demo Set up Varonis in your own environment. Fast and hassle free. info.varonis.com/demo Data Risk Assessment Get a snapshot of your data security, reduce your risk profile, and fix real security issues. info.varonis.com/start Get in touch Have more questions? Let us know. 1.877.292.8767 info@varonis.com
  • 17. www.varonis.com | Data Risk Assessment sample DEFINITIONS Inactive / Stale Data: Data that has not had a file system event recorded against it for 180 days. Open / Global Access: Instance(s) where access to an entity is open to groups giving access to a large or undefined set of users. Defined access does not necessarily indicate that an entity is protected or secure. Sensitive Data: Sensitive files can include regulated data (PCI, PII, HIPAA, etc.), intellectual property, and confidential files. Stale enabled users: User accounts that retain access permissions which are not disabled, but have not been utilized to log in to the domain. Users with removal recommendations: Users that retain privileges to data required in their previous roles, but no longer need access. Empty Security Groups: Active directory groups containing no users. Unresolved SIDs: Unresolved security identifiers occur when a group or user ACE is permissioned directly on a folder, and that group or user’s associated Active Directory account is deleted. Folders with Unique Permissions: A folder that inherits its ACL from a parent folder and has additional ACEs applied to it. Protected Folders: NTFS folders that contain an explicitly defined ACL, and will inherit no ACEs from their parent folders. Definitions
  • 18. Varonis is a powerful software suite that protects your file and email servers from cyberattacks and insider threats. We analyze the behavior of the people and machines that access your data, alert on misbehavior, and enforce a least privilege model. We help thousands of customers prevent data breaches. ABOUT VARONIS