Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

How Varonis Limits Organization-Wide Exposure

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...
Michael Buckbee
6 min read
Last updated June 2, 2023

If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available to all employees creates organization-wide exposure (OWE), making the likelihood of a devastating breach skyrocket.

OWE is the exact opposite of Zero Trust and, for many companies, has been an intractable risk for years. Now, due to the rapid adoption of collaboration tools for remote work, OWE is becoming even more prevalent as IT teams begin to focus on deploying new technology before fully understanding how to configure them securely.

Varonis can help you understand where OWE exists and take steps to remediate it.

Get a Free Data Risk Assessment

What is Organization-Wide Exposure?

Organization-wide exposure happens when sensitive data is made available to the entire company. This data is susceptible to a data breach, ransomware attacks, insider threats, and presents privacy and compliance issues.

The very first GDPR fine, issued to a hospital in Portugal, was due to a violation of privacy-by-design as a result of OWE. No data was stolen, but the hospital wasn’t adequately limiting access.

OWE paved the way for a brand new Tesla employee to grab the Autopilot source code and upload it to his personal Dropbox account. He’s now being sued by the company for data theft.

Sensitive data exposure can cripple an organization. Let’s explore the many ways OWE happens, how to visualize and prioritize exposure, and how to remediate the risk without disrupting the business.

Over-Permissive Folders

Over-permissive folders are some of the oldest contributors to organization-wide exposure. Networked sharing folders have existed for decades and have provided a new way for users to collaborate and share documents for work. As unstructured data propagated, IT organizations couldn’t manage user-created data growth or keep up with the number of incoming data access requests.

To deal with this problem, administrators took a few shortcuts. On Windows servers and legacy SharePoint, administrators granted ‘Full Control’ privileges to the ‘Everyone’ or ‘Domain Users’ groups. On Linux or UNIX, it’s even easier. Admins ran a ‘chmod 777’ on a network file share to grant everyone access to a folder.

Because of these shortcuts and continued data growth, a brand new employee at any organization could have access to 17 million files on their first day, according to the 2019 Varonis Data Risk Report.

These folders are not only over-permissive but also potentially contain sensitive data. In the same report, we found that 53% of organizations had 1,000 files available to all employees. Over-permissive folders facilitate lateral movement, data exfiltration, and are vulnerable to ransomware attacks.

Sharing Links

The migration to cloud-based IT infrastructure, like Microsoft 365, introduces a new kind of organization-wide exposure risk in sharing links. Sharing links are the primary method you use to collaborate on or share a file or folder with your team, and you can even use sharing links to collaborate with people outside of your organization.

One of the easiest ways to share links in M365 is to set the permissions to “Anyone in the organization with the link.” That way, you can share the link without specifying a group or list of people who can access the file. And that means the data in the file or folder is accessible by anyone with credentials on the network. Every cloud file sharing service like Google, Box, and Dropbox, provides similar functionality with the accompanying risks.

Open Teams, Chats, and Private Channels

Microsoft Teams usage grew from 32 million daily users in March 2020 to 115 million by the end of October 2020. Organizations enabled Teams to promote collaboration without understanding the impact on data security and before they could figure out best practices to protect their data.
Here’s something most organizations don’t know about sharing data in Teams. Any time you chat with a co-worker or create a new Teams channel, you create either a new OneDrive folder or SharePoint Online (SPO) site on the back end. Users can easily share data in those folders with anyone in the organization, leading to data exposure either by direct access or sharing links.

As we demonstrate in our Teams Explosion webinar, it’s possible to share sensitive data with the entire organization without realizing it, even if the M365 admins turn off external sharing. Tracking down organization-wide sharing with the native M365 tools is not trivial. Experienced administrators have to use Azure AD, Teams, and SharePoint Online tools to piecemeal together what users have access to which sensitive data, and even then, it’s not always clear.

Each system in M365 has a portion of the entire picture, but no single view contains the whole picture and correlates it to sensitive data access or organization-wide exposure.

Identifying OWE with Varonis

Varonis crawls file servers, NAS devices, and cloud storage to regularly gather a clear picture of users’ access to data. We correlate user access with our classification scans to discover where sensitive data is exposed organization-wide.

Global Access and Over-Permissive Folders

The bi-directional view in DatAdvantage highlights access by user, group, or by folder across multiple data stores at once. You can either click on a folder to see who has access to that folder or click on a user to see what resources they can access. In this same view, DatAdvantage shows you where sensitive data is exposed to prioritize remediation efforts. It’s possible to reduce OWE when you can visualize where the problems exist, and DatAdvantage simplifies that process with this unique functionality.

Everyone has access to all the folders highlighted in green.
Everyone has access to all the folders highlighted in green.

Sharing Links in OneDrive and SharePoint Online

Also in DatAdvantage, you can see where you have user-generated sharing links in M365 that allow for organizational-wide exposure so you can quickly visualize where sensitive data is at risk.

Everyone in the organization has access to the sites in green.
Everyone in the organization has access to the sites in green.

The WebUI provides a different way to visualize user-generated sharing links that allow you to drill into and view the details of what files are shared.

WebUI widget shows user generated sharing links

From the Analytics tab, you can see exactly which files are exposed to organization-wide sharing and whether or not they are sensitive. You can even filter results based on total hits of sensitive information so that you can prioritize risk reduction efforts around links that expose high concentrations of sensitive data.

WebUI search for sharing links

You can easily customize this search for deeper investigation and save it for future use, and these reports live in DatAdvantage as well.

Varonis makes it easy to track down where you have OWE, both on-premises and in M365. Once you can visualize and know where the organization-wide risk exists, you can start to remediate and remove that risk.

Reports and APIs

If you prefer to review the data Varonis gathers about OWE offline or need to share this information with other teams, there are several reports to choose from.

For example, the 4.c.01 Global Group Access Analysis report shows which users access data with global access so organizations can investigate and remove permissions where possible.

Benjamin used his Global Access to read HR and Legal folders.
Benjamin used his Global Access to read HR and Legal folders.

There are dozens of pre-built reports that provide information that organizations can use to reduce organization-wide exposure. Security teams can even subscribe to and schedule reports for regular reviews. There is an API to the reporting engine so you can integrate Varonis data with any other system’s data. And if you still need to see the data differently, Varonis Professional Services will work with you to create a custom process.

How Varonis Remediates OWE

Not only can Varonis help organizations pinpoint where they have OWE, but we also help remediate excessive access.

How Varonis Remediates Global Access

DatAdvantage provides the visibility and functionality to achieve least-privilege access. The bi-directional permissions view highlights where sensitive data is overexposed. You can make changes to folder permissions in the UI and then model those changes to verify you will not remove access to data that users need. DatAdvantage audits all of the changes so you can revert or report on your progress towards a more secure position.

DatAdvantage Commit dialog with pending changes

The DatAdvantage approach is a more precise way to reduce sensitive data exposure. Sometimes, the problem requires a giant hammer, which is where Automation Engine comes in.

Automation Engine can remove OWE at a massive scale. By monitoring how users interact with data, Varonis knows who actually uses data. With Automation Engine, you can automatically remove open access and replace those permissions with single-purpose groups of those who actually access that data. This allows you to remove OWE from folders without interrupting day-to-day work.

Report of Open Access before and after Automation Engine remediation

Once the major issues with OWE of sensitive data get resolved, DataPrivilege steps in to help you maintain your secure position. DataPrivilege implements a process for data owners to manage access to their folders that enables organizations to maintain least-privileged access. Data owners complete regular entitlement reviews to certify that access to their data is up to date.

DataPrivilege data access request dialog

How Varonis Detects Abnormal Access to Sensitive Data

Visibility and awareness of OWE are vital to maintaining data security. However, real-time alerts when users create new risk with sharing links to sensitive data is arguably better.

DatAlert provides hundreds of pre-built threat models that detect abnormal behaviors and indicators of compromise that point towards insider threats or cyberattacks. There are specific alerts for new sharing links to sensitive data and public sharing links so your team can respond, investigate, and remediate OWE as quickly as possible.

Varonis alert showing that GDPR data was shared publicly with a link

Varonis helps organizations reduce OWE and detects threats to sensitive data across multiple data stores. Our customers can maintain a low attack surface area even as users create new data and introduce new risk.

Sign up for a demo and see how Varonis can manage your data security.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

data-protection-guide:-how-to-secure-google-drive-for-your-business
Data Protection Guide: How To Secure Google Drive for Your Business
Does your company store, handle, or transmit confidential data in Google Drive? Learn about security, encryption, and data protection in Google Workspace.
6-prompts-you-don't-want-employees-putting-in-copilot
6 Prompts You Don't Want Employees Putting in Copilot
Discover what simple prompts could expose your company’s sensitive data in Microsoft Copilot.
a-guide-on-the-data-lifecycle:-identifying-where-your-data-is-vulnerable
A Guide on the Data Lifecycle: Identifying Where Your Data is Vulnerable
Data is a company’s most valuable asset. To maintain data’s value, it’s vital to identify where that data is vulnerable. According to data and ethics expert Dr. Gemma Galdon Clavell,...
hacker-motives:-red-flags-and-prevention
Hacker Motives: Red Flags and Prevention
Hacker are motivated by different things to compromise your data. See what patterns hackers have been following and how you can keep your company safe.