Loading
Access Manager
  • Solution
    • Join the orange side of life – Solution
      • Freedom for IT-Administrators
      • Permanent compliance with Data Protection Provisions
      • Greater Efficiency in IT Infrastructure
      • Who, What, How? Auditors Review Your Permission Situation
      • It’s all about the money!
    • Explore the Orange Side of Life
      • Ondal Medical Systems GmbH – Time and Cost Savings
      • ETECTURE GmbH – Higher Transparency in Access Management
      • University of Leipzig Medical Center – no Chance for Hackers
      • University Hospital Tübingen – Password Resets 24/7
      • Federal City of Bonn – efficient user account management
      • City of Cologne – optimised user management
      • Paris Lodron University Salzburg – Information security for thousands of users
      • Reiser Simulation and Training GmbH – efficient access management
      • Oberaigner Group – Access Rights Management and Documentation at the Push of a Button
      • Jörg Vogelsang GmbH & Co. KG – Self Service Access Management
      • Stadtwerke Wolfenbüttel GmbH – no longer an authorisation jungle
  • Modules & Features
    • Modules
      • Fileserver Management
      • SharePoint Management
      • 3rd Party Management
      • Fileserver Accounting
      • REST API
      • Password Reset
      • Identity Management
      • Easy Desktop
      • NTFS Permission Analyzer
    • Features
      • Automated Access Management
      • Autocorrect of Permissions
      • Self Service for End Users
      • Profile Management
      • Reapproval Process
      • GDPR Compliant
      • Transparency by Reporting
      • User Provisioning
      • Audit-proof Documentation
  • Services
    • Services
      • Individual Services
      • Permission Audit
      • Starter Package for Automated Access Management
      • Premium-Support
      • Licensing Model
      • System Requirements
    • Contact Us
      • Get your Trial
      • Request your Product Presentation
  • Company
    • BAYOOSOFT
      • About us
      • We think proactively
    • Get Our Partners
      • Get to know our Partners
      • Become a Partner
  • Events
  • TRIAL
  • Customer Center
  • Search
  • Menu Menu

Need-to-know vs. scattergun approach: the right choice for authorisation management

Operational resources are scarce in many companies. This makes it all the more important to use the available capacities sensibly. For example, authorisation management for file servers, SharePoint, Active Directory and objects in third-party systems is a permanent task for those responsible. This is because personnel and structural changes in the company require constant maintenance. Above all, this ties up a large number of operational resources.

By automating authorisation management, efforts can be reduced, while at the same time data security and transparency are increased.

But first: How does authorisation management succeed in the face of personnel and structural changes? What exactly is meant by the scattergun approach. And what does the need-to-know principle have to do with it? We present it to you.

IT administrators are regularly faced with the task of adjusting personnel and structural changes within the company. Authorisation situations are readjusted on a fine-granular level. Research, coordination and adjustment work tie up considerable resources in the decision-making process by those responsible for data and the implementation in the operational area.

The scattergun approach is often applied. This means the generous allocation of authorisations within the company. System access is granted, for example, at the departmental level or through the use of comparative users with similar areas of responsibility. In this way, the new authorisation set is roughly determined.

Example: If an employee changes the area of responsibility, in theory numerous permissions in the file system, SharePoint or on applications are withdrawn, granted or changed. This is the only way to comply with the need-to-know principle.

The technical implementation is usually done by the IT administration, which manually manages the corresponding Active Directory groups. Instead of the need-to-know principle, the scattergun approach is often used as the basis for assigning new authorisations.

Problems of scattergun approach

  • Necessity brings it: Unclear authorisation situations force the IT administration to use comparison users when granting access
  • Individual authorisations are often unintentionally taken over from comparison users
  • Internal departmental and task changes, which, for example, require new authorisations but make existing ones superfluous, are not taken into account
  • An organisation-wide restriction of individual access rights leads users to unconventional (usually insecure) forms of data exchange

Which existing permissions can be removed? In practice, this decision is often difficult for those responsible. The result can be that permissions that are no longer needed are not removed because of the time-consuming distinction.

Need-to-know-principle

Who needs to be able to access which data? And who does not need the knowledge that can be gained from this data? The need-to-know principle simply asks these questions. After all, data protection is also necessary within a company to protect against sabotage, among other things. In the case of highly sensitive data, it should also be checked whether there is a protection instruction.

Automated authorisation management: advantages for data controllers

An efficient solution offers the automation of authorisation management in order to establish the need-to-know principle in an uncomplicated way.

The technical implementation of approved authorisations is taken over completely by the system through a software solution – and without further involvement of the IT administration. Continuous monitoring of the existing authorisation structures in Active Directory, the file system and SharePoint ensures that only deliberately created, audited authorisations exist in the IT systems.

Thanks to the complete automation of the technical implementation, authorisation management lies directly with those responsible for the data.

  • Overview

    A clear and easy-to-understand presentation facilitates the process

  • Comprehensibility

    They receive necessary information without technical background knowledge

  • Independence

    The IT administrators do not need to be involved

  • Transparency and auditability

    The management of responsible resources can be carried out in a transparent and audit-proof manner

Our solution: The BAYOOSOFT Access Manager

Profile-based permissions

How can you deal with personnel changes? The profile management in BAYOOSOFT Access Manager supports you with the possibility of mapping organisational structures (e.g. department and activity assignments) as user profiles in the system.

In case of a change of the employment area, only an adjustment of the profile by responsible persons is necessary. This is because a profile is created for users and authorisations on resources.

Good to know

Employees can also apply for individual rights via the integrated self-service portal. When new staff members start in a department, they receive the team’s profile membership and thus all the necessary rights.

Comparison users are not used. This prevents the transfer of individual profile assignments to other people.

With the possibility of creating start and end dates for the authorisations, a slow transition can be made possible if the profile memberships overlap at times. When the set key date arrives, the system automatically implements the desired change.

It is ensured that users only receive the authorisations they really need. It is documented in an audit-proof manner when and by whom authorisation was granted and changes were made.

test now

Authorisation for third party systems

Serverraum

In addition to permissions on directories in the file system or SharePoint objects, the 3rd party management module of the BAYOOSOFT Access Manager also structures permissions based on Active Directory groups in profiles. Whether required printer shares, drive mapping or application rights – in case of changes, access rights can be combined or requested and approved as individual rights.

This development towards an automated access management solution makes it possible to organise all necessary Active Directory-based authorisations directly by the departments.

Comprehensive reporting presents the current access rights in a clear and comprehensible way, even for people without IT background knowledge. Historical reports can also be used to trace the authorisation status on a key date in the past.

Connection to HR systems

Which employee is joining the company, changing departments or leaving? HR relevant information from existing software systems can be used to automatically adjust profile memberships. This results in

  • Relief

    Reduction of efforts and support activities for IT administration

  • Focus

    Reduce the manual efforts of data managers and focus on individual user authorisations

  • Transparency

    Increase transparency about the entitlement situation

  • Data security

    Strengthening awareness for data security in the departments

You would like to get to know the BAYOOSOFT Access Manager directly?

The automated and secure self-service solution supports you in authorisation management and offers you the right tool for NTFS analysis.

Sign up for a 30-day TRIAL.

test now
Sounds interesting? Share our post
  • Share on Facebook
  • Share on WhatsApp
  • Share on LinkedIn
  • Share by Mail

Interesting links

Here are some interesting links for you! Enjoy your stay :)

Pages

  • Access Manager auf dem Bechtle IT-Forum Rhein Main Neckar
  • Automate Access Management Successfully
  • Automate your Access & Identity Journey
  • BAYOOSOFT
  • BAYOOSOFT Berechtigungsaudit (EN)
  • Blog
  • Calendar 2020
  • Connector Matrix42
  • Contact support
  • Customer Center AM & AMPR
  • Customer Center AM Member
  • Customer Center AMPR Member
  • Customer Voices
  • Data Protection Compliance
  • Digital Flyer
  • Edit profile
  • Events
  • Exklusives Wechselangebot für 8MAN Kunden
  • Exklusives Wechselangebot für 8MAN Partner
  • Explore the Orange Side of Life
  • Features
  • Forum
  • Home
  • Interface documentation
  • Join the orange side of life
  • Legal
  • Login
  • Modules
  • Modules & Features
  • Newsletter Unsubscribe
  • NTFS Permission Analyzer
  • Password Reset
  • Password Reset Webinar 08th Dezember 2020
  • Privacy & Compliance
  • Privacy Policy
  • Privacy policy
  • Product Presentation Inquiry
  • Reset password
  • Sensitive data with peace of mind
  • Services
  • SharePoint Management
  • The Access Manager at the secIT 2021
  • The BAYOOSOFT Access Manager – Your way out of the KRITIS crux
  • TRIAL request
  • Upcoming events
  • Whitepaper: Managing authorisations securely and sustainably – Best Practice

Categories

  • Editorial
  • Events
  • General
  • News
  • Releases
  • Whitepaper
  • Privacy Policy
  • Legal
BAYOOSOFT @DMEA 2022Our new Whitepaper: Best Practices
Scroll to top