SlideShare a Scribd company logo
1 of 18
Download to read offline
www.varonis.com | Data Risk Assessment sample
DATA RISK ASSESSMENT
SAMPLE REPORT: ACME
The Data Risk Assessment gives a snapshot of your data
security to quickly ascertain the level of risk associated with
your data: exposing high risk areas and where you can
safely and swiftly pull back access, reducing your risk profile.
www.varonis.com | Data Risk Assessment sample
SCOPE
A sample of ACME’s data was assessed for risks in the following areas:
●● Overexposed and at-risk sensitive & classified data
●● Access controls and authorization processes
●● Privileged and end user access monitoring
●● Active Directory structure
●● NTFS and sharing permissions structure
●● Data retention proficiency
●● Compliance with applicable regulations
File servers and data
sources monitored
●● CIFS_FS_1
●● CIFS_FS_2
●● CIFS_FS_3
●● CIFS_FS_4
●● NFS_FS_1
●● EXCH_1
●● SP_1
Contents
●● 331,237 GB of data
●● 90,348,156 folders
●● 1,617,176,767 files
●● 701,387,576 permission
	entries
Active Directory
●● 8,580 user accounts
●● 14,427 groups
●● 9,268 computer accounts
●● 420 disabled users
●●
www.varonis.com | Data Risk Assessment sample
74%
GLOBAL ACCESS GROUPS
KEY FINDINGS:
Global Group Access
These include groups such as Everyone,
Domain Users, and Authenticated Users.
Global access groups will allow anyone
within an organization to access data with
these access controls.
Data should generally never be accessible
to global access groups like Everyone,
Domain Users, or Authenticated Users. Data
that is open to everyone is most vulnerable
and at-risk for loss, theft or misuse.
Over 66.5 million folders with
global group access
66,502,975 of 90,348,156
Distribution of global group access
CIFS_FS_2				11%
CIFS_FS_3				7%
CIFS_FS_4				20%
SP_FS_1				44%
EXCH_FS_1				18%
Sensitive files with global group access
CIFS_FS_2				2%
CIFS_FS_3				1%
CIFS_FS_4				2%
SP_FS_1				82%
EXCH_FS_1				13%
www.varonis.com | Data Risk Assessment sample
1,116,554
1,100
131,598
SAP Account # DSPC SI UK DPA
SENSITIVE DATA
KEY FINDINGS:
Sensitive Data
Many files contain critical information
about employees, customers, projects,
clients, or other business-sensitive content.
This data is often subject to industry
regulation, such as SOX, HIPAA, PCI, EU
GDPR, GLB, and more.
When global access groups grant access to
sensitive and critical data, there is significant
risk to the business.
These instances must be identified and
remediated so that only the appropriate
users retain access to this sensitive,
regulated data – keeping sensitive data
secure, and meeting regulatory compliance.
Over 150 million files contain
sensitive data (150,534,645)
9,213,456 sensitive files are
open to Global Group Access
Distribution of sensitive files
CIFS_FS_2				13%
CIFS_FS_3				12%
CIFS_FS_4				8%
SP_FS_1				54%
EXCH_FS_1				13%
*Over 50% of sensitive information resides
on one file server: SP_FS_1
Total number of hits by type
SAP Account #			 1,116,554
PCI DSS				1,100
UK DPA 				131,598
www.varonis.com | Data Risk Assessment sample
75%
STALE DATA
KEY FINDINGS:
Stale Data
Data kept beyond a pre-determined
retention period can expose an
organization to additional liability and
is expensive to maintain.
Stale data – especially sensitive
information such as PII - should be
identified and archived or defensibly
deleted, if no longer needed.
253,168 GB of Stale Data
85,377,723 folders contain
stale data
Amount of stale data
CIFS_FS_2				25%
CIFS_FS_3				22%
CIFS_FS_4				8%
SP_FS_1				29%
EXCH_FS_1				16%
Stale data with sensitive information
CIFS_FS_2				14%
CIFS_FS_3				11%
CIFS_FS_4				9%
SP_FS_1				53%
EXCH_FS_1				13%
www.varonis.com | Data Risk Assessment sample
ACCOUNTS & USERS
KEY FINDINGS:
●● 1,182 user accounts have 		
	 non-expiring passwords
●● 2,555 user accounts are 		
	 stale but enabled
●● 46% (4,635) of users
	 accounts have removal
	recommendations
●● 14% of security groups have 	
	 no users (2,034)
●● 26% of domain groups
	 are empty
●● 13,830 domain accounts are 	
	 stale but enabled
Users with Non Expiring Passwords
Non expiring passwords allow unlimited
time to brute force crack them and indefinite
access to data via the account.
Stale Enabled Users
Stale enabled accounts still retain all of the
access permissions they were granted while
active, and are a target for exploitation and
malicious use to access data.
Empty Security Groups
These can allow access to more
data by becoming a member of the group;
a common technique of lateral movement
and privilege escalation.
14% (1,182) of user accounts
have non-expiring passwords.
www.varonis.com | Data Risk Assessment sample
FOLDERS & PERMISSIONS
KEY FINDINGS:
●● 277,027 folders with
	 Unresolved SIDs
●● 58,419 folders have
	 inconsistent permissions
●● 1,040,040 folders with
	 unique permissions
●● 423,872 folders were
	 detected with direct user 		
	ACEs
●● 25,551 protected folders
●● 90,348,156 folders without
	 data owners
Unresolved SIDs
Unresolved Security Identifiers occur when
a user on an access control list is deleted
from AD. They can potentially give hackers
access to data.
Inconsistent inheritance
A common by-product of inconsistent
permissions, inconsistent inheritance may
expose important data to individuals who
should not have access to that data.
While organizations make significant
investments in firewalls, IAM, IPS, DLP, and
SIEM, these systems are unable to prevent an
insider from accessing overexposed data.
277,027 unresolved SIDs
www.varonis.com | Data Risk Assessment sample
USER ACTIVITY
KEY FINDINGS:
●● 423,110 file opens
●● 182,335 file modifications
●● 65,120 file deletions
●● 22,965 permission changes User Activity & Behavior
User Activity is the actions on data performed
by users within the organization. This could
consist of file and permissions activity, email or
SharePoint activity, even activity on changes to
users and groups within the organization.
Without analyzing activity data, an organization
cannot understand the baseline behavior of
users. Varonis monitors and analyzes user and
entity behavior, giving you insight into potential
suspicious and unusual activity.
We use this analylsis to detect and alert on
behavioral deviations, highlight risk, and
discover insider threats, ransomware, and more.
These types of threats are front of mind for most
organizations: the capability to detect, mitigate,
and prevent them is a key to a strong data
security strategy.
Over 750,000 audit events
950 events on sensitive data
Distribution of sensitive files
CIFS_FS_2				13%
CIFS_FS_3				12%
CIFS_FS_4				8%
SP_FS_1				54%
EXCH_FS_1				13%
Top Alert Categories Triggered
Intrusion				5
Privilege Escalation			9
Exfiltration				2
www.varonis.com | Data Risk Assessment sample
KPIs
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
Low Risk
The more complex a file system structure, the greater risk for overexposure and
security vulnerabilities. Simplified access management procedures and standards
help lock down potential exposure of sensitive data from insider threats.
1,040,040 folders with unique permissions
Recommendation: Review permissions structure to determine if folder
uniqueness is required. If not, allow the folder to re-inherit parent permissions,
replacing unique ACEs.
277,027 folders with unresolved SIDs
Recommendation: Identify folders with unresolved SIDs and remove from ACLs
423,872 folders with direct user ACEs
Recommendation: Identify folders with direct user permissions, place users into the
appropriate group, and remove the user ACE from the ACL.
RISK SUMMARY: LOW
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
Medium Risk
Outdated data – whether files, users, or groups – quickly becomes a security
liability and unnecessary storage expense. Continued and automated upkeep
is necessary to maintain a secure environment, ensure resources are used
efficiently, and close security loopholes that might otherwise be exploited or
become vulnerable to brute-force attacks.
Stale data: 85,377,723 folders with stale data; 4,381,574 stale sensitive files
Recommendation: Identify stale data and determine what data can be moved,
archived, or deleted. Create and execute a consistent policy to manage stale data.
1,182 users with non-expiring passwords
Recommendation: Update accounts to comply with a strong password policy,
including regular password changes. Service accounts with non-expiring passwords
should be kept to a minimum.
455 looped nested groups
Recommendation: Looped nested groups can cause application crashes, consume
excessive processing resources, and behave unexpectedly since many applications
and scripts enumerate group membership recursively – to remediate, identify the
looped nested groups and remove the cyclical condition.
RISK SUMMARY: MEDIUM
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
RISK SUMMARY: HIGH
High Risk
Excessive access is one of the primary causes of data breaches: overexposed
sensitive and critical data is a debilitating security risk, and outdated user
permissions are a target for exploitation and malicious use. To achieve a least
privileged access model, it’s critical to restrict access to only those who need it:
manage users, eliminate broken inheritance and permissions inconsistencies,
and lock down sensitive data.
66,502,975 folders with global access groups
Recommendation: Remove global access group permissions to identify folders open
to global group access and their active users: place active users in a new group, and
replace the global access group with the new group on the ACL.
9,213,456 sensitive files are open to global group access
Recommendation: Sensitive data should be scanned, classified, and monitored so that
it remains secure across all networks.
30,000 folders with broken ACL
Recommendation: Repair inconsistent permissions by reestablishing NTFS inheritance
where the inheritance structure has become inconsistent.
2,555 stale but enabled users
Recommendation: Review stale enabled accounts to determine if they are necessary.
Delete or disable accounts as needed.
KEY FINDINGS:
www.varonis.com | Data Risk Assessment sample
CAPABILITIES ASSESSMENT
GRADE 	 CAPABILITY
Full		 Track and report on Active Directory changes (group membership, GPO, etc.)
Partial 	 Track and report Access control list changes
None		 Track and report on file usage (creation, modifications, deletions, etc.)
None 		 Track and report on email usage (send, receive, send as, etc.)
None 		 Detect unusual file and email activity
Partial 	 Analyze potential access for file container objects
Partial 	 Analyze potential access for email container objects
None		 Analyze user or group potential access across file containers
None 		 Analyze user or group potential access across email stores
Partial 	 Identify sensitive or regulated content
Partial 	 Identify stale, unused content
None 		 Delegate access request approval process to data owners
www.varonis.com | Data Risk Assessment sample
IMMEDIATE RECOMMENDATIONS
STEP ONE:
•• Identify and remediate high risk areas with alerts, threat models,
	 data classification, and DatAdvantage modeling and commit functions.
•• Resolve performance issues using the DatAdvantage GUI.
•• Build out exhaustive reporting based on ACME requests
	 (full inventory on defined scope).
•• Set up a dashboard to follow up remediation effort.
STEP TWO:
•• Remove ‘Everyone’ group and implement a least privilege model across the 		
	 Windows share environment.
•• Change group based access model on base folders/shares to one read
	 and one modify group.
•• Identify and tag responsible business units and data owners for sets of data
	 across ACME.
STEP THREE:
•• Set up alerts on deviation of remediated resources.
•• Automate data retention and migration with the use of the rules, scope
	 and tiered storage in Data Transport Engine.
•• Automate the file share access provisioning process and perform regular audit
	 and recertification of permissions on data sets with DataPrivilege.
www.varonis.com | Data Risk Assessment sample
VARONIS METHODOLOGY
DETECT insider threats and
security threats by analyzing
data, account activity, and
user behavior.
PREVENT disaster by locking
down sensitive and stale
data, reducing broad access,
and simplifying permissions.
SUSTAIN a secure state by
automating authorizations,
migrations, & disposition.
www.varonis.com | Data Risk Assessment sample
GET STARTED
Live Demo
Set up Varonis in your own environment.
Fast and hassle free.
info.varonis.com/demo
Data Risk Assessment
Get a snapshot of your data security,
reduce your risk profile, and fix real
security issues.
info.varonis.com/start
Get in touch
Have more questions? Let us know.
1.877.292.8767
info@varonis.com
www.varonis.com | Data Risk Assessment sample
DEFINITIONS
Inactive / Stale Data:
Data that has not had a file system event
recorded against it for 180 days.
Open / Global Access:
Instance(s) where access to an entity is
open to groups giving access to a large or
undefined set of users.
Defined access does not necessarily indicate
that an entity is protected or secure.
Sensitive Data:
Sensitive files can include regulated data
(PCI, PII, HIPAA, etc.), intellectual property,
and confidential files.
Stale enabled users:
User accounts that retain access permissions
which are not disabled, but have not been
utilized to log in to the domain.
Users with removal recommendations:
Users that retain privileges to data
required in their previous roles, but no
longer need access.
Empty Security Groups:
Active directory groups containing no users.
Unresolved SIDs:
Unresolved security identifiers occur when a
group or user ACE is permissioned directly on
a folder, and that group or user’s associated
Active Directory account is deleted.
Folders with Unique Permissions:
A folder that inherits its ACL from a parent
folder and has additional ACEs applied to it.
Protected Folders:
NTFS folders that contain an explicitly
defined ACL, and will inherit no ACEs from
their parent folders.
Definitions
Varonis is a powerful software suite that protects your file and
email servers from cyberattacks and insider threats. We analyze
the behavior of the people and machines that access your data,
alert on misbehavior, and enforce a least privilege model.
We help thousands of customers prevent data breaches.
ABOUT VARONIS

More Related Content

What's hot

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security ChecklistDruva
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoJonathan Eubanks
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsVictor Oluwajuwon Badejo
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesUlf Mattsson
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingTroy Kitch
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyAlienVault
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingAlienVault
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity ManagementDon Lovett
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment Gazzang
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSSKimberly Simon MBA
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source DatabasesGazzang
 

What's hot (20)

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
 
CIO Cloud Security Checklist
CIO Cloud Security ChecklistCIO Cloud Security Checklist
CIO Cloud Security Checklist
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Content Aware SIEM™ defined
Content Aware SIEM™ definedContent Aware SIEM™ defined
Content Aware SIEM™ defined
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
GDPR
GDPRGDPR
GDPR
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity Management
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
 
Essentials of PCI Assessment
Essentials of PCI AssessmentEssentials of PCI Assessment
Essentials of PCI Assessment
 
Card Data Discovery and PCI DSS
Card Data Discovery and PCI DSSCard Data Discovery and PCI DSS
Card Data Discovery and PCI DSS
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source Databases
 

Similar to Sample of The Varonis Data Risk Assessment

Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big dataUlf Mattsson
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Bezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSATBezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSATMarketingArrowECS_CZ
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 

Similar to Sample of The Varonis Data Risk Assessment (20)

Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Five steps to secure big data
Five steps to secure big dataFive steps to secure big data
Five steps to secure big data
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Bezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSATBezpečná databáze a jak využít volně dostupný nástroj DBSAT
Bezpečná databáze a jak využít volně dostupný nástroj DBSAT
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 

Recently uploaded

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Sample of The Varonis Data Risk Assessment

  • 1. www.varonis.com | Data Risk Assessment sample DATA RISK ASSESSMENT SAMPLE REPORT: ACME The Data Risk Assessment gives a snapshot of your data security to quickly ascertain the level of risk associated with your data: exposing high risk areas and where you can safely and swiftly pull back access, reducing your risk profile.
  • 2. www.varonis.com | Data Risk Assessment sample SCOPE A sample of ACME’s data was assessed for risks in the following areas: ●● Overexposed and at-risk sensitive & classified data ●● Access controls and authorization processes ●● Privileged and end user access monitoring ●● Active Directory structure ●● NTFS and sharing permissions structure ●● Data retention proficiency ●● Compliance with applicable regulations File servers and data sources monitored ●● CIFS_FS_1 ●● CIFS_FS_2 ●● CIFS_FS_3 ●● CIFS_FS_4 ●● NFS_FS_1 ●● EXCH_1 ●● SP_1 Contents ●● 331,237 GB of data ●● 90,348,156 folders ●● 1,617,176,767 files ●● 701,387,576 permission entries Active Directory ●● 8,580 user accounts ●● 14,427 groups ●● 9,268 computer accounts ●● 420 disabled users ●●
  • 3. www.varonis.com | Data Risk Assessment sample 74% GLOBAL ACCESS GROUPS KEY FINDINGS: Global Group Access These include groups such as Everyone, Domain Users, and Authenticated Users. Global access groups will allow anyone within an organization to access data with these access controls. Data should generally never be accessible to global access groups like Everyone, Domain Users, or Authenticated Users. Data that is open to everyone is most vulnerable and at-risk for loss, theft or misuse. Over 66.5 million folders with global group access 66,502,975 of 90,348,156 Distribution of global group access CIFS_FS_2 11% CIFS_FS_3 7% CIFS_FS_4 20% SP_FS_1 44% EXCH_FS_1 18% Sensitive files with global group access CIFS_FS_2 2% CIFS_FS_3 1% CIFS_FS_4 2% SP_FS_1 82% EXCH_FS_1 13%
  • 4. www.varonis.com | Data Risk Assessment sample 1,116,554 1,100 131,598 SAP Account # DSPC SI UK DPA SENSITIVE DATA KEY FINDINGS: Sensitive Data Many files contain critical information about employees, customers, projects, clients, or other business-sensitive content. This data is often subject to industry regulation, such as SOX, HIPAA, PCI, EU GDPR, GLB, and more. When global access groups grant access to sensitive and critical data, there is significant risk to the business. These instances must be identified and remediated so that only the appropriate users retain access to this sensitive, regulated data – keeping sensitive data secure, and meeting regulatory compliance. Over 150 million files contain sensitive data (150,534,645) 9,213,456 sensitive files are open to Global Group Access Distribution of sensitive files CIFS_FS_2 13% CIFS_FS_3 12% CIFS_FS_4 8% SP_FS_1 54% EXCH_FS_1 13% *Over 50% of sensitive information resides on one file server: SP_FS_1 Total number of hits by type SAP Account # 1,116,554 PCI DSS 1,100 UK DPA 131,598
  • 5. www.varonis.com | Data Risk Assessment sample 75% STALE DATA KEY FINDINGS: Stale Data Data kept beyond a pre-determined retention period can expose an organization to additional liability and is expensive to maintain. Stale data – especially sensitive information such as PII - should be identified and archived or defensibly deleted, if no longer needed. 253,168 GB of Stale Data 85,377,723 folders contain stale data Amount of stale data CIFS_FS_2 25% CIFS_FS_3 22% CIFS_FS_4 8% SP_FS_1 29% EXCH_FS_1 16% Stale data with sensitive information CIFS_FS_2 14% CIFS_FS_3 11% CIFS_FS_4 9% SP_FS_1 53% EXCH_FS_1 13%
  • 6. www.varonis.com | Data Risk Assessment sample ACCOUNTS & USERS KEY FINDINGS: ●● 1,182 user accounts have non-expiring passwords ●● 2,555 user accounts are stale but enabled ●● 46% (4,635) of users accounts have removal recommendations ●● 14% of security groups have no users (2,034) ●● 26% of domain groups are empty ●● 13,830 domain accounts are stale but enabled Users with Non Expiring Passwords Non expiring passwords allow unlimited time to brute force crack them and indefinite access to data via the account. Stale Enabled Users Stale enabled accounts still retain all of the access permissions they were granted while active, and are a target for exploitation and malicious use to access data. Empty Security Groups These can allow access to more data by becoming a member of the group; a common technique of lateral movement and privilege escalation. 14% (1,182) of user accounts have non-expiring passwords.
  • 7. www.varonis.com | Data Risk Assessment sample FOLDERS & PERMISSIONS KEY FINDINGS: ●● 277,027 folders with Unresolved SIDs ●● 58,419 folders have inconsistent permissions ●● 1,040,040 folders with unique permissions ●● 423,872 folders were detected with direct user ACEs ●● 25,551 protected folders ●● 90,348,156 folders without data owners Unresolved SIDs Unresolved Security Identifiers occur when a user on an access control list is deleted from AD. They can potentially give hackers access to data. Inconsistent inheritance A common by-product of inconsistent permissions, inconsistent inheritance may expose important data to individuals who should not have access to that data. While organizations make significant investments in firewalls, IAM, IPS, DLP, and SIEM, these systems are unable to prevent an insider from accessing overexposed data. 277,027 unresolved SIDs
  • 8. www.varonis.com | Data Risk Assessment sample USER ACTIVITY KEY FINDINGS: ●● 423,110 file opens ●● 182,335 file modifications ●● 65,120 file deletions ●● 22,965 permission changes User Activity & Behavior User Activity is the actions on data performed by users within the organization. This could consist of file and permissions activity, email or SharePoint activity, even activity on changes to users and groups within the organization. Without analyzing activity data, an organization cannot understand the baseline behavior of users. Varonis monitors and analyzes user and entity behavior, giving you insight into potential suspicious and unusual activity. We use this analylsis to detect and alert on behavioral deviations, highlight risk, and discover insider threats, ransomware, and more. These types of threats are front of mind for most organizations: the capability to detect, mitigate, and prevent them is a key to a strong data security strategy. Over 750,000 audit events 950 events on sensitive data Distribution of sensitive files CIFS_FS_2 13% CIFS_FS_3 12% CIFS_FS_4 8% SP_FS_1 54% EXCH_FS_1 13% Top Alert Categories Triggered Intrusion 5 Privilege Escalation 9 Exfiltration 2
  • 9. www.varonis.com | Data Risk Assessment sample KPIs KEY FINDINGS:
  • 10. www.varonis.com | Data Risk Assessment sample Low Risk The more complex a file system structure, the greater risk for overexposure and security vulnerabilities. Simplified access management procedures and standards help lock down potential exposure of sensitive data from insider threats. 1,040,040 folders with unique permissions Recommendation: Review permissions structure to determine if folder uniqueness is required. If not, allow the folder to re-inherit parent permissions, replacing unique ACEs. 277,027 folders with unresolved SIDs Recommendation: Identify folders with unresolved SIDs and remove from ACLs 423,872 folders with direct user ACEs Recommendation: Identify folders with direct user permissions, place users into the appropriate group, and remove the user ACE from the ACL. RISK SUMMARY: LOW KEY FINDINGS:
  • 11. www.varonis.com | Data Risk Assessment sample Medium Risk Outdated data – whether files, users, or groups – quickly becomes a security liability and unnecessary storage expense. Continued and automated upkeep is necessary to maintain a secure environment, ensure resources are used efficiently, and close security loopholes that might otherwise be exploited or become vulnerable to brute-force attacks. Stale data: 85,377,723 folders with stale data; 4,381,574 stale sensitive files Recommendation: Identify stale data and determine what data can be moved, archived, or deleted. Create and execute a consistent policy to manage stale data. 1,182 users with non-expiring passwords Recommendation: Update accounts to comply with a strong password policy, including regular password changes. Service accounts with non-expiring passwords should be kept to a minimum. 455 looped nested groups Recommendation: Looped nested groups can cause application crashes, consume excessive processing resources, and behave unexpectedly since many applications and scripts enumerate group membership recursively – to remediate, identify the looped nested groups and remove the cyclical condition. RISK SUMMARY: MEDIUM KEY FINDINGS:
  • 12. www.varonis.com | Data Risk Assessment sample RISK SUMMARY: HIGH High Risk Excessive access is one of the primary causes of data breaches: overexposed sensitive and critical data is a debilitating security risk, and outdated user permissions are a target for exploitation and malicious use. To achieve a least privileged access model, it’s critical to restrict access to only those who need it: manage users, eliminate broken inheritance and permissions inconsistencies, and lock down sensitive data. 66,502,975 folders with global access groups Recommendation: Remove global access group permissions to identify folders open to global group access and their active users: place active users in a new group, and replace the global access group with the new group on the ACL. 9,213,456 sensitive files are open to global group access Recommendation: Sensitive data should be scanned, classified, and monitored so that it remains secure across all networks. 30,000 folders with broken ACL Recommendation: Repair inconsistent permissions by reestablishing NTFS inheritance where the inheritance structure has become inconsistent. 2,555 stale but enabled users Recommendation: Review stale enabled accounts to determine if they are necessary. Delete or disable accounts as needed. KEY FINDINGS:
  • 13. www.varonis.com | Data Risk Assessment sample CAPABILITIES ASSESSMENT GRADE CAPABILITY Full Track and report on Active Directory changes (group membership, GPO, etc.) Partial Track and report Access control list changes None Track and report on file usage (creation, modifications, deletions, etc.) None Track and report on email usage (send, receive, send as, etc.) None Detect unusual file and email activity Partial Analyze potential access for file container objects Partial Analyze potential access for email container objects None Analyze user or group potential access across file containers None Analyze user or group potential access across email stores Partial Identify sensitive or regulated content Partial Identify stale, unused content None Delegate access request approval process to data owners
  • 14. www.varonis.com | Data Risk Assessment sample IMMEDIATE RECOMMENDATIONS STEP ONE: •• Identify and remediate high risk areas with alerts, threat models, data classification, and DatAdvantage modeling and commit functions. •• Resolve performance issues using the DatAdvantage GUI. •• Build out exhaustive reporting based on ACME requests (full inventory on defined scope). •• Set up a dashboard to follow up remediation effort. STEP TWO: •• Remove ‘Everyone’ group and implement a least privilege model across the Windows share environment. •• Change group based access model on base folders/shares to one read and one modify group. •• Identify and tag responsible business units and data owners for sets of data across ACME. STEP THREE: •• Set up alerts on deviation of remediated resources. •• Automate data retention and migration with the use of the rules, scope and tiered storage in Data Transport Engine. •• Automate the file share access provisioning process and perform regular audit and recertification of permissions on data sets with DataPrivilege.
  • 15. www.varonis.com | Data Risk Assessment sample VARONIS METHODOLOGY DETECT insider threats and security threats by analyzing data, account activity, and user behavior. PREVENT disaster by locking down sensitive and stale data, reducing broad access, and simplifying permissions. SUSTAIN a secure state by automating authorizations, migrations, & disposition.
  • 16. www.varonis.com | Data Risk Assessment sample GET STARTED Live Demo Set up Varonis in your own environment. Fast and hassle free. info.varonis.com/demo Data Risk Assessment Get a snapshot of your data security, reduce your risk profile, and fix real security issues. info.varonis.com/start Get in touch Have more questions? Let us know. 1.877.292.8767 info@varonis.com
  • 17. www.varonis.com | Data Risk Assessment sample DEFINITIONS Inactive / Stale Data: Data that has not had a file system event recorded against it for 180 days. Open / Global Access: Instance(s) where access to an entity is open to groups giving access to a large or undefined set of users. Defined access does not necessarily indicate that an entity is protected or secure. Sensitive Data: Sensitive files can include regulated data (PCI, PII, HIPAA, etc.), intellectual property, and confidential files. Stale enabled users: User accounts that retain access permissions which are not disabled, but have not been utilized to log in to the domain. Users with removal recommendations: Users that retain privileges to data required in their previous roles, but no longer need access. Empty Security Groups: Active directory groups containing no users. Unresolved SIDs: Unresolved security identifiers occur when a group or user ACE is permissioned directly on a folder, and that group or user’s associated Active Directory account is deleted. Folders with Unique Permissions: A folder that inherits its ACL from a parent folder and has additional ACEs applied to it. Protected Folders: NTFS folders that contain an explicitly defined ACL, and will inherit no ACEs from their parent folders. Definitions
  • 18. Varonis is a powerful software suite that protects your file and email servers from cyberattacks and insider threats. We analyze the behavior of the people and machines that access your data, alert on misbehavior, and enforce a least privilege model. We help thousands of customers prevent data breaches. ABOUT VARONIS