Legacy techniques are the bane of IT execs all over the place. “Legacy” typically is outlined as outdated pc {hardware} and software program that is still stubbornly in place as a result of somebody someplace would possibly nonetheless use it. IT execs dislike these legacy techniques as a result of it is a fixed wrestle to maintain them operating and to combine them with newer applied sciences.
However productiveness points aren’t the one bother with legacy techniques — in addition they pose a severe danger to cybersecurity. Furthermore, in that house, we have to broaden our considering past the definition of “legacy” recommended above. Certainly, there are three extra areas to think about:
- Legacy identities
- Legacy knowledge
- Legacy processes
Let’s discover every of those areas, revealing the precise problems with and providing methods for mitigating the related safety dangers.
Legacy Identities
Legacy identities are accounts that exist in a company’s identification retailer (similar to Energetic Listing or Azure AD) regardless of not being wanted. Widespread examples embrace person accounts for contractors or third-party suppliers who’re not related to the group.
Safety Dangers
Legacy identities are a big danger for the group. Certainly, they’re a most well-liked method for attackers to achieve unauthorized entry to delicate techniques and knowledge. Adversaries search to compromise legacy accounts as a result of utilizing these identities is much less prone to increase alerts than creating new accounts. What’s extra, former workers whose accounts weren’t promptly eliminated can steal content material to profit their new employer or sabotage knowledge or techniques out of sick will or malice.
Legacy accounts for extremely privileged customers, together with IT execs and executives, are significantly focused as a result of they supply entry to invaluable knowledge and significant IT techniques. The mathematics is straightforward: The extra privileged accounts you’ve got, the bigger your assault floor space.
Mitigation Methods
The important thing step in mitigating the dangers from legacy identities is to conduct common opinions of the identification retailer and determine and take away inactive accounts which can be not wanted. Don’t restrict your consideration to identities related to people (i.e., person accounts) — legacy service accounts and pc accounts pose comparable safety dangers.
Ideally, this effort needs to be a part of a complete identification and entry administration (IAM) technique. One key IAM course of is enabling knowledge homeowners to recurrently overview and replace entry rights to their content material, That is essential to implement the least-privilege precept as customers change roles inside the group, initiatives are created and accomplished, the IT ecosystem evolves, and enterprise wants shift. Different vital components in an IAM technique that may scale back the danger from legacy identities embrace multifactor authentication (MFA) and privileged entry administration (PAM), particularly a zero-standing privilege (ZSP) method.
Legacy Information
Legacy knowledge is any knowledge a company shops that’s outdated or out of date — that’s, it has outlived its usefulness. Nonetheless, remember that it may be an advanced process to determine whether or not a sure knowledge set needs to be thought to be legacy, particularly in extremely regulated sectors similar to healthcare and finance. Even when a chunk of knowledge is not related or helpful, rules would possibly require you to retain it for a sure time frame.
Safety Dangers
Legacy knowledge generally is a cybersecurity danger. For instance, utilizing a 6-month-old risk intelligence feed leaves the group susceptible to newer threats, and outdated deal with knowledge would possibly end in confidential data being despatched to the fallacious recipient.
Moreover, legacy knowledge will not be encrypted or protected by different entry controls, making it extra susceptible to knowledge breaches and theft. And if the legacy knowledge is definitely protected, the work concerned is likely to be diverting the group’s restricted assets away from securing different delicate knowledge.
Mitigation Methods
Organizations want a radical understanding of what knowledge they retailer, together with the kind of knowledge, when and why it was collected or created, how usually it’s accessed, and when the final replace occurred. This data may also help decide whether or not the data is correct and nonetheless of worth to the group.
In fact, knowledge is continually being collected and created, and the relevance of a specific dataset depends upon the group’s evolving wants. Accordingly, organizations ought to conduct common opinions of their knowledge to determine areas that want enchancment and prioritize the updating of high-value datasets.
Legacy Processes
Processes and procedures that aren’t stored updated via common overview and apply needs to be deemed as legacy. Legacy processes are sometimes a results of a scarcity of assets, time, diligence, or experience.
Safety Dangers
Legacy processes are a safety danger as a result of they might fail to handle threats and different points which have arisen for the reason that course of was carried out. For instance, operating a vulnerability scan as soon as 1 / 4 might need been applicable years in the past when that course of was created, however it’s sorely insufficient in right now’s quickly evolving risk panorama. Equally, legacy processes can hamper a company’s capacity to reply shortly to cybersecurity incidents — even a well-crafted incident response plan will not be of a lot worth if it has merely been saved away in a file as an alternative of being recurrently rehearsed and revised as your IT atmosphere, enterprise priorities, organizational construction, and different realities change over time.
Mitigation Methods
To mitigate these safety dangers, organizations ought to recurrently conduct a complete overview of their processes to determine legacy processes, analyze their weaknesses, and contain all stakeholders in figuring out how finest to modernize or change them. (Sure, that may be a course of in itself to take care of!)
As well as, modernizing legacy processes can ship important value financial savings. Legacy processes could be each time-consuming and labor-intensive, and updating them can streamline operations and enhance productiveness.
Conclusion
Legacy techniques of every kind pose important cybersecurity dangers. To mitigate these dangers, begin by figuring out the legacy identities, knowledge, and processes in your IT ecosystem, and repeat this stock course of on an everyday schedule. Replace, take away, or change legacy techniques each time potential, and take steps to attenuate the danger posed by any legacy techniques it’s worthwhile to retain.