INFO & INSIGHTS END USERS: THE ACHILLES HEEL OF CYBERSECURITY 5 Key Considerations When Implementing User-Based Access Controls End users, the very community of individuals chartered to preserve the integrity of your business, embody a profound vulnerability point within your network’s security infrastructure. By the year 2020, IDC expects mobile workers in the United States alone will account for nearly three-quarters of the total workforce.1 As a result, IP addresses are no longer an effective proxy for end users as they are constantly moving to different physical locations and using multiple devices, operating systems, and application versions to access the data they need. It’s now critical to an organization’s risk posture to identify who the network’s users are – beyond IP address – and the inherent risks they bring based on the device being used. To control the threat exposure unknowingly caused by the end-user community and protect your organization from breaches, leverage user-based access controls. With user-based access controls, you can allow access to sanctioned applications based on user identity information, rather than IP address, providing visibility into who is using which applications on the network and who is possibly introducing threats into your organization by transferring files. When applied correctly, user-based access controls can reduce incident-response times and strengthen your organization’s security posture. Outlined below are five key points to consider when applying user-based access controls to your next-generation firewall (NGFW) security infrastructure. 1Understand the organization’s user environment and architecture To do this, ask yourself the following questions: • In which locations does my organization operate? An organization might operate in several different locations, such as a main campus, branch offices or remote locations. U.S. Mobile Worker Forecast, 2015–2020, International Data Corporation (IDC), May 2015: http://www.idc.com/getdoc.jsp?containerId=256194 1 © 2016 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. INFO & INSIGHTS • What authentication method is used in each location? Do users log in directly to directory servers, or are they authenticated and authorized on wireless LAN (WLAN) controllers, VPN systems or network access control (NAC) devices? •What are the operating systems in each location? There could be heterogeneous environments with Windows®, Mac® and Linux® capabilities or homogeneous environments with only one OS. •How do endpoints log on to the network? Are endpoints identified and authenticated prior to logging on to the network? 2Figure out supported user-to-IP mapping strategies, and determine the ones you will use Figure out what user-to-IP mapping strategies are supported by your next- generation firewall. A number of mechanisms are typically supported to identify users – third-party proxy servers, WLAN controllers, terminal services agents, directory service logs, and more. Based on discoveries in the first step, select the user-to-IP mapping strategies that apply to your environment. 3Implement the selected user-to-IP mapping strategy for user visibility Implement the selected strategy to gain visibility into users’ behavior. Collaboration with other team members, such as IT architects, security operators and network admins, is critical here. This visibility will enable the identification of activities and usage patterns tied to users, instead of IP addresses, including insights such as top users and browsing history, top apps accessed by users in the marketing group in the last 24 hours, or software-as-a-service (SaaS) application usage broken down by user – all p roviding valuable data points around which to formulate appropriate user-based access controls. Share the visibility reports and data with other team members with whom you collaborated. 4Ensure business policies exist to justify user-based access controls Before rolling out user-based access controls, ensure supporting business policies exist that define access parameters. Typically, such policies are established by Human Resources (HR) and Legal. If such policies do not exist, collaborate with HR and Legal to establish policies, leveraging the user-based reports as your guide. © 2016 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. INFO & INSIGHTS In addition, when defining user-based access controls, it’s best to do so in terms of groups, rather than individual users. Instead of marketers Jane, John and Joe, think of the three individual users as the marketing group. This will go a long way toward simplifying policies and keeping administrative overhead to a minimum. 5Implement user-based access policy Once corresponding business policy is aligned and user groups are defined, user-based access controls can be implemented. Create a list of security rules that whitelist acceptable applications and websites and deny access to ALL else, and then implement the policy – one group at a time. The user groups impacted by the new access controls will likely have questions. Communication is key here. Let the impacted user groups know what you plan to do and when you plan to do it. Organizations can also consider forming a special incident-response team to field the higher-than-average volume of inquiries related to the implementation to ease the minds of users and drive a smooth execution. With these considerations in mind, implement user-based access controls on your NGFW security infrastructure to defend against successful cyberattacks and make the most of your security investment. For a deeper dive into the technology and benefits, check out the PAN-OS Administrator’s Guide or visit the Palo Alto Networks® Live Community. © 2016 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of our trademarks can be found at http://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
© Copyright 2026 Paperzz