Poor Authentication and Authorization Control

Poor authentication and authorization control in Workday is a significant concern for security engineers as it can lead to unauthorized access to sensitive information and data breaches. Authentication is the process of verifying the identity of a user, while authorization is the process of determining what actions the user is allowed to perform.

Poor authentication control can occur when weak or easily guessable passwords are used, or when multi-factor authentication (MFA) is not implemented. This makes it easy for attackers to gain access to Workday accounts using a brute-force attack or a password cracking tool. Additionally, poor authentication control can also happen when users share their accounts or use the same password for multiple accounts. This increases the risk of unauthorized access if one account is compromised.

Poor authorization control can occur when access controls are not properly configured, or when there is a lack of segregation of duties. This can lead to users having access to sensitive information or systems that they should not have access to. Additionally, poor authorization control can also happen when access rights are not reviewed and revoked in a timely manner when an employee leaves the company.

To prevent poor authentication and authorization control in Workday, security engineers should implement a number of security measures such as:

Implementing multi-factor authentication (MFA) which adds an additional layer of security to Workday accounts by requiring the user to provide a second form of authentication, such as a fingerprint or text message code.

Conducting regular security awareness training for employees to educate them on the importance of strong passwords and not sharing accounts or passwords.

Regularly monitoring Workday accounts for suspicious activity, such as login attempts from unfamiliar locations or changes to account settings.

Regularly reviewing and updating the policies and procedures for managing Workday accounts, including the process for resetting passwords and revoking access for terminated employees.

Implementing access controls that are appropriate for the level of sensitive information being protected, and regularly reviewing and updating them.

Implementing segregation of duties, ensuring that users only have access to the information and systems they need to do their job.

By implementing these measures, security engineers can significantly reduce the risk of poor authentication and authorization control in Workday and protect the organization from data breaches and loss of sensitive information.

Get our Security Checklist

Keep configuration drift at bay with the ThreatKey Security Checklist.

Remediate it with ThreatKey

Manage misconfigurations easily and continuously with ThreatKey! Get started today for free.

Remediate it!

Follow along with one of our reference guides to start securing your instance

No items found.