Q&A on Employee Provisioning with Joerg Hirschmann: Part 2
This is part two in a series of questions related to employee provisioning and VPNs. Earlier this week, we addressed how enterprises can ensure that their provisioning processes benefit their overall security postures.
Question: Provisioning’s security holes become particularly apparent when remote mobile access users leave a company and enterprises try to apply a one-size-fits-all de-provisioning approach. In today’s mobile, global, 24-hour business world, what de-prov
Joerg Hirschmann: The best de-provisioning approach will be one that does not rely on a singular component to keep up with an organization's changing needs. For instance, a provisioning process should go beyond the ordinary capability of disabling an account; instead, an organization should use the scalable method of PKI (certificate based authentication), which offers an additional option to withdraw remote access permission by revoking the user’s certificate. Similar offerings are available through One-Time-Password tools, which can also disable specific tokens, for example.
At the end of the day, the quality of the automated process will dictate how effective provisioning and de-provisioning will be.
Stay tuned for more on employee provisioning and VPNs next week. If you have any questions that you would like answered, as related to VPNs, remote access, network security and the like, send them to firstname.lastname@example.org.
Joerg Hirschmann is CTO at NCP Engineering GmbH.