Advantages and Disadvantages of Open Source Privileged Identity Management
|
|
|
- Vivien Simmons
- 5 years ago
- Views:
Transcription
1 White Paper How Secure is your sudo? ~ The Good, the Bad, and the Ugly of Open Source Privileged Identity Management (PIM) Abstract Though not publicized or romanticized by the Information Technology community, Unix/Linux OS users have passionately embraced either implementing open source privileged identity management solutions (i.e., sudo), commercial solutions that are more user friendly, or not implementing anything at all. Though highly disputed, the fact of the matter is that both solution-types do work and both bring high-value depending upon the IT environment that it is managing. This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. CISOs managing large IT environments, combined with the many eyes in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets. One can present this information in the negative or positive light. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company s critical assets. BeyondTrust Corporate Headquarters Agoura Road, Suite 200 Agoura Hills, CA USA Phone:
2 Table of Contents The Art of War... 3 Brief History of sudo Unix/Linux... 4 The Birth of sudo... 5 sudo The Good... 6 It is Free... 6 Additional Layer of Protection to root... 6 Additional Layer of Protection over Accidents... 6 Simplified Process for Administrators... 6 Upgrade in Auditing over Native Unix Systems... 6 Time-Ticketing System... 6 sudo The Bad... 7 Generated Data is Insecure... 7 IT Control is an Illusion... 7 There is No Official Support Available... 7 Log Security and Compliance Questionable... 7 Lacks Independent QA Testers... 7 sudo is not Designed for the Enterprise... 8 sudo The Ugly... 8 CISOs Do Not Know How Effective Their Security Controls Actually Are... 8 Real-World Example of sudo s Ugly Side... 9 The True Cost of Free BeyondTrust Solutions Privilege. Made Simple Privilege Identity Management for Desktops Privilege Identity Management for Servers Automated Password Management for Devices, OS & Applications About BeyondTrust How Secure is your sudo? BeyondTrust Software, Inc.
3 The Art of War Conflicts of opinion can present themselves in different forms. There are very serious conflicts that show themselves in wars between nations. And there are lighter, but still passionate conflicts in business, such as Coke versus Pepsi and Microsoft versus Apple, that gain market share and create a divide among consumers. Every one of us in the modern working world has developed opinions and perspectives that have led us to favor one product over another. In the Cola War, some of us prefer the bite in Coke, while others prefer the sweet cola taste of Pepsi. In the Platform Wars, loyalty to Windows or Apple transcends even these rational considerations. Some of it has to do with familiarity (i.e., which machine you learned on). But even this is not enough to explain the fierce partisanship that often typifies the computer and software industry. Now taking this perspective down to the Privileged Identity Management (PIM) space, which CISOs, IT Managers and Administrators are well aware of, the same type of battles come into play. Though not publicized or romanticized by the Information Technology community, Unix/Linux OS users have passionately embraced either implementing open source privileged identity management solutions (i.e., Coke vs. Pepsi illustrates a perfect example of the many conflicts in the business world sudo), commercial solutions that are more user friendly, or not implementing anything at all. Though highly disputed, the fact of the matter is that both solution-types do work and both bring high-value depending upon the IT environment that it is managing. This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. This white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. CISOs managing large IT environments, combined with the many eyes in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets. One can present this information in the negative or positive light. What is important is to try to look at sudo objectively. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises may learn that sudo often represents an illusion of control over access to a company s critical assets. 3 How Secure is your sudo? BeyondTrust Software, Inc.
4 Brief History of sudo Unix/Linux When looking at the history of sudo, it helps to also look at the history of the Unix operating system (OS). In the 1960s, Unix was created by a multi-organizational effort to develop a dependable time-sharing operating system. The Unix system fostered a distinctive approach to software design solving a problem by inter-connecting simpler tools, rather than creating large monolithic application programs. The Unix development and evolution led to a new philosophy of computing, and it has been a never-ending source of both challenges and joy to programmers around the world. After four decades of use, the Unix OS is still regarded as one of the most powerful, versatile, and flexible operating systems in the computer world. Tux, the official mascot of Linux, was conceived from the Unix OS Its popularity is due to many factors, including its ability to run a wide variety of machines, from micros to supercomputers. IT also fell in love with its portability, all of which led to Unix s adoption by many manufacturers. Universities began using Unix for research, but over the years business embraced Unix and began using Unix to run databases and other business applications. As time went on, more and more business critical assets were being managed by Unix. Because universities used Unix to create a collaborative environment, access to highprivilege administrative accounts in Unix was based on little more than trust. While this made sense to education, it had the opposite effect on the business world where protecting access to confidential information is vital to survival. Over the last four decades, the foundation of IT systems management has been built on the concept of the administrator. Whether root on a Unix or Linux system, or a DBA or Windows administrator, the administrator role gives the user the power to configure virtually every aspect of a system. Even though the administrator role is considered to be the highest level of privilege, access to such privilege is protected by the simplest of controls, such as knowledge of a root password. The root or administrative account has historically been shared among a group of trusted individuals, making it virtually impossible to track the actions of any specific user of this group. Though this scenario was ideal for university use, the IT risk to enterprise use was obviously problematic. 4 How Secure is your sudo? BeyondTrust Software, Inc.
5 The Birth of sudo In 1994, Todd Miller released an open source Privileged Identity Management solution called sudo. sudo (superuser do) allows a system administrator to work using his own account and switch to root or other user identity available on the system only for commands that they need to perform. sudo was also designed to improve logging to see what actions were being performed by specific individuals. Many organizations have attempted to use sudo to authorize users to run commands without knowledge of the root password, and a lot of IT organizations praise sudo to their managers, CISOs and CTOs. On the flip side, other enterprises have found drawbacks with sudo because sudo was not designed for an enterprise mainly in terms of compliance. Hence, an IT-divide of passionate opinion regarding sudo has evolved over the last 15 years. Many users focus on sudo s feature set and low purchase cost as supporting factors. However, other company stakeholders such as management, compliance auditors and analysts have also raised red flags regarding sudo that larger or growing companies need to be cognizant of at the very least. Whether a stakeholder is just discovering open source or is a veteran, one will or has come across some of the gotcha s, quirks, and wow-type experiences. It can be a roller coaster ride of sorts. If one is seasoned enough to navigate and tread the enormous landscape of open source projects, it can be positive depending upon the IT environment one exists in. Generally, people have been hard-coded to think of technology in one perspective, and open source goes against all the grains in our post-modern capitalistic society. Open source yells, I want to be free for the good of mankind, and I want to unite developers and enthusiasts. Customers familiar with the usage of sudo within their company No 27% Yes 73% On the other hand, some old adages 2010 BeyondTrust Customer Survey still ring true, such as Sometimes you get what you pay for, and sometimes if it sounds too good to be true, then it usually is. The war of opinions over sudo all have valid points, and that is why it is important to look at the good, the bad and the ugly of from an objective position while you are analyzing. 5 How Secure is your sudo? BeyondTrust Software, Inc.
6 sudo The Good It is Free This is generally one of the most important factors for an enterprise evaluating sudo as a viable solution for Privileged Identity Management. If judging a book by its cover, sudo s initial cost is always appetizing to security budgets. Additional Layer of Protection to root Too often, organizations fail to achieve necessary milestones in the control of root access to the heart of IT and its critical assets. Instead, they simply assign access to a shared account where activity may be difficult if not impossible to correlate to the actions of a single user. With sudo, the root account password does not need to be shared with everyone who needs to perform tasks on Unix/Linux systems. Additional Layer of Protection over Accidents Before sudo, any mistakes, significant or minimal, were much harder to pinpoint and access to shared account was virtually impossible to audit for accountability over what was actually done in the system. Though limited in its ability, sudo does help prevent some really horrible things that happen when administrators work as root and try and complete tasks in a hurry. Simplified Process for Administrators Though this is often argued as a security and compliance risk, sudo can be configured in such a way that members of a designated group do not need additional authentication to become root, which results in higher productivity. Upgrade in Auditing over Native Unix Systems Auditing in Unix/Linux was never a priority under the original intentions of these operating systems, since its origin of use was in Academic research programs and databases. Though sudo s logging functionality has serious security and compliance red flags, it is definitely a step in the correct direction to log what actions a user performed with privileged access. Time-Ticketing System When a user invokes sudo and enters their password, they are granted a ticket for five (5) minutes (default time). This time-ticketing system give some level of protection in situations where there is a danger of leaving a root shell open where others can physically use an administrator s keyboard. 6 How Secure is your sudo? BeyondTrust Software, Inc.
7 sudo The Bad Generated Data is Insecure As security is provided through the binaries and configuration files, sudo lacks the necessary tools required to protect the integrity of generated security data. IT Control is an Illusion sudo has the ability to invoke a shell that has no control over itself whatsoever. This means that an experienced user could obtain full-access over valuable systems and applications. sudo s control file delegates privileged commands based on user, group, host, command, and command arguments. Many organizations write policy files based on these filters, but that does not always make an organization compliant. To ensure proper control, many other filters should be applied to policies. There is No Official Support Available Since sudo is open source, there is no directly accountable contact to call upon if an organization encounters technical problems with sudo. However, there is a very large sudo community that collaborates over common problems and solutions, and many people work very hard to help others with issues. Still, the unpredictability of researching and retrieving a correctable solution in a timely manner translates to lower productivity and higher cost in managing privileged identities. Log Security and Compliance Questionable While sudo logs and tracks user activity over privileged accounts, it is very difficult to ensure safety of sudo s logs. sudo does not natively protect log records from alteration, and cannot provide remote logging to remote servers, which are best practices for security and compliance. Lacks Independent QA Testers When an organization is seeking to protect assets worth significant amounts of money, it would be prudent to ensure that the solution they are implementing has been tested and validated regarding the security and functional features. Though there are many contributors to issues and features, there is no dedicated group of QA testers to provide assistance and assurance that the product is enterprise ready. 7 How Secure is your sudo? BeyondTrust Software, Inc.
8 sudo is not Designed for the Enterprise Can sudo work in an enterprise? Yes. But, was sudo really designed for the enterprise? Looking at the history of sudo, it is safe to say No. Since sudo was not intended for large scale deployments, there simply is not enterprise development discipline needed in security solutions. sudo is a good stepping stone for smaller scale environments, but lacks architectural vision or general security of code that could be used to protect critical assets. When sudo is deployed with the enterprise under consideration where where the sudoers file is centralized using an LDAP server, consistency can be had and enforced. When policies are enforced based on user names, well defined security policies can be put in place most of the While sudo has value in smaller scale environments, in time. However, when policies mix the an enterprise, sudo forces organizations to choose between productivity and compliance security considerations (i.e., using usernames and group names), an organization can end up with conflicting policies and corrected by a potentially ever-growing list of constraints. This can lead to maintenance issues and a weakened security environment. sudo The Ugly CISOs Do Not Know How Effective Their Security Controls Actually Are According to Forrester s March 2010 report, The Value of Corporate Secrets, CISOs rely more on faith, rather than facts, for proof of effectiveness of their data security programs. sudo has won favor with many IT users and administrators and if CISOs are told that sudo is effectively managing privileged identities, chances are they will believe what they are told without the metrics supporting such statements. Forrester found that regardless of information asset value, spending, or number of incidents observed, nearly every company rated its security controls to be equally effective even though the number and cost of incidents varied widely. Even enterprises with a high number of incidents are still likely to imagine that their programs are very effective. Security managers need to develop a process for tracking key performance indicators that measure effectiveness of their data security programs, such as sudo, which includes metrics 8 How Secure is your sudo? BeyondTrust Software, Inc.
9 as frequency and cost of incidents. Meeting these security and compliance mandates using sudo can become very ugly for auditors and administrators and raise cost significantly, even though sudo is initially a cost-saving solution. Real-World Example of sudo s Ugly Side CETREL S.A. ( a leader in advanced electronic payment technology, expert in electronic transfers, and a trusted partner for electronic payment offers, experienced significant compliance and auditing challenges using sudo to manage their IT environment. Nicolas Debeffe, head of operational security at CETREL, is responsible for overseeing CETREL s security operations which includes their complex IT environment. For the last several years, Mr. Debeffe s security team had been using sudo to manage their critical Unix/Linux assets and trace any access from CETREL s support teams to applicative or generic users. Average Number of Unix/Linux Servers per Company Avg. # of Servers Avg. # of Servers using sudo 2010 BeyondTrust Customer Survey While sudo initially seemed to manage CETREL s IT environment, they soon discovered that there was an imminent need to find a simpler and more secure method to manage access and accountability to generic users. As we have been continually adding Unix and Linux servers to our environment, as required for our operations, it was clear sudo raised significant red flags over the adequate security over our logs required by PCI DSS mandates, said Nicolas Debeffe. Productivity was being hindered, as reviewing sudo logs required accessing every server individually. Furthermore, sudo logs were alterable by the super user and the sudo configuration time required by system engineers was simply unacceptable, added Debeffe. 9 How Secure is your sudo? BeyondTrust Software, Inc.
10 This example is a very common and real challenge for security managers globally, and the faster organizations are cognizant of such red flags, the faster preventative measures can be implemented from a strategically and compliant perspective. The True Cost of Free As stated earlier, people have generally been hard-coded to think of technology in one perspective, and open source goes against all the grains in our post-modern capitalistic society. Open source yells, I want to be free for the good of mankind, and I want to unite developers and enthusiasts. On the other hand, some old adages still ring true, such as Sometimes you get what you pay for, and sometimes if it sounds too good to be true, then it usually is. The war of opinions over open source all have valid points, and that is why it is important to look at the good, the bad and the ugly of any solution you are analyzing. Key questions that should be asked when evaluating Privileged Identity Management solutions whether open source or commercial should include: Analyzing metrics to determine accurate value within IT can be a daunting task 1. What is the cost of the solution? 2. What is the cost to implement the solution effectively in our IT environment? 3. What is the cost to manage and audit such tools, such as: a. man-hours to enforce policy changes across network b. man-hours to add new environments c. man-hours to code reports d. audit costs related to security and compliance 4. Has the solution been properly tested and vetted to meet security and compliance? Let s face it organizations are in the process of adapting to this new virtual collaborative IT environment. And during adaptation comes the enormous challenge of ensuring that privileged access to critical information is not misused. Walls like sudo that may have worked a decade ago are now practically irrelevant as users seek ways around, over, or under these obstructions because it interferes with their main job duties. As we move forward in this evolving era, it s important to develop an awareness of how to protect our resources, whatever they may be, using boundaries to guide us, not walls. Having well defined awareness of boundaries enables end users and applications to communicate freely within an IT environment without worry of intentional, accidental or indirect misuse of privilege. Boundaries allow a more productive and compliant dialogue to 10 How Secure is your sudo? BeyondTrust Software, Inc.
11 take place between users and the IT department and proactively deters attempts of misuse. If boundaries are respected, then IT remains in control of security, compliance and productivity, and has the authority to take proactive steps in which to protect the enterprise. Privileged identity management is critical business systems, and if not managed correctly, can introduce significant compliance, security and productivity risks as shown in this white paper. It is always good to ask, What is the true cost of this solution? BeyondTrust Solutions Privilege. Made Simple BeyondTrust empowers IT to eliminate the risk BeyondTrust Privilege.Made Simple of intentional, accidental and indirect misuse of privileges on desktops and servers with globally proven solutions that increase security and compliance without impacting productivity. A system administrator s productivity increases by 25% by using PowerBroker to centrally maintain Unix/Linux security policies and to produce auditfriendly logs necessary for compliance. In today s collaborative environments, organizations need to provide the extended enterprise with necessary privileges to do their jobs. However, in order to increase security, compliance and productivity, organizations must not distribute root passwords or admin rights. BeyondTrust transparently brokers server and desktop permissions, providing a globally proven solution to privilege authorization that enables users to access the IT resources they need when they need it and for organizations to remain secure and compliant. Privilege Identity Management for Desktops Privilege Manager enables organizations to remove administrator rights and allow endusers to run all required Windows applications, processes and ActiveX controls. Privilege Identity Management for Servers PowerBroker allows system administrators the ability to delegate privileges and authorization without disclosing the root password on Unix, Linux, Mac OS X servers. Centrally managed via a web-based console, auditing includes event and keystroke logging of privileged access. Automated Password Management for Devices, OS & Applications PowerKeeper is an Automated Password Management (APM) solution for access control, manageability and audit of all types of privileged accounts. 11 How Secure is your sudo? BeyondTrust Software, Inc.
12 About BeyondTrust BeyondTrust is the global leader in privilege authorization management, access control and security solutions for virtualization and cloud computing environments. BeyondTrust empowers IT governance to strengthen security, improve productivity, drive compliance and reduce expense. The company s products eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers in heterogeneous IT systems. With more than 25 years of global success, BeyondTrust is the pioneer of Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, seven of the world's 10 largest aerospace and defense firms, and six of the 10 largest U.S. pharmaceutical companies, as well as renowned universities. The company is privately held, and headquartered in Carlsbad, California with offices in Los Angeles, the Greater Boston area, Washington DC, as well as EMEA offices in London, UK. For more information, visit 12 How Secure is your sudo? BeyondTrust Software, Inc.
WHITE PAPER. BeyondTrust PowerBroker : Root Access Risk Control for the Enterprise
WHITE PAPER BeyondTrust PowerBroker : Root Access Risk Control for the Enterprise Table of Contents Abstract 3 Poor Controls on Privileged Access: IT Risk at its Most Fundamental 3 Commodity Controls are
Retina CS: Using Strong Certificates
Documentation Retina CS: Using Strong Certificates November 2012 www.beyondtrust.com BeyondTrust 2173 Salk Avenue Carlsbad, California 92008 Phone: +1 818-575-4000 2012 Beyond Trust. All Rights Reserved.
Legacy Applications and Least Privilege Access Management
BeyondTrust Report ` Legacy Applications and Least Privilege Access Management ~ Legacy applications reveal desktop security Wild West January 2011 Abstract In an enterprise Windows desktop environment,
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
WHITE PAPER. Take Back Control of Your Active Directory Auditing
WHITE PAPER Take Back Control of Your Active Directory Auditing Table of Contents An Intro to Active Directory 3 Needs for Auditing and Reporting in Today s Active Directory Environment 3 Up Time 3 Speed
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
Understanding BeyondTrust Patch Management
Best Practices WHITE PAPER Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and
WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
WHITE PAPER Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Table of Contents Overview 3 HIPAA & Retina Enterprise Edition 3 Six Steps of Vulnerability Assessment & Remediation
Privileged Account Management Mar3n Cannard, Security Solu3ons Architect
Privileged Account Management Mar3n Cannard, Security Solu3ons Architect Customer Use Cases - Introduc3on A US-based Natural Gas and Electric company serving multiple states Project Requirements Only grant
WHITE PAPER. Improving Efficiency in IT Administration via Automated Policy Workflows in UNIX/Linux
WHITE PAPER Improving Efficiency in IT Administration via Automated Policy Workflows in UNIX/Linux Table of Contents Executive Summary 3 Efficiency is the Driving Catalyst 3 Key Advantages in Automating
Intrusive vs. Non-Intrusive Vulnerability Scanning Technology
WHITE PAPER Intrusive vs. Non-Intrusive Vulnerability Scanning Technology Retina Network Security Scanner Table of Contents The Smash-and-Grab: Taking the Low Road 3 The Smooth Caper: Taking the High Road
Three Ways to Secure Virtual Applications
WHITE PAPER Detect, Scan, Prioritize, and Remediate Vulnerabilities Table of Contents Subtitle 1 Headline 3 Headline 3 Sub-Headline 3 ConcIusion 3 About BeyondTrust 4 2 2013. BeyondTrust Software, Inc.
Privileged Access Life-Cycle Management: How PALM Enables Security, Compliance, and Efficiency for Enterprise IT
I D C V E N D O R S P O T L I G H T Privileged Access Life-Cycle Management: How PALM Enables Security, Compliance, and Efficiency for Enterprise IT September 2009 Adapted from Worldwide Identity and Access
Privileged Account Access Management: Why Sudo Is No Longer Enough
Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Finally: Achieve True Principle of Least Privilege for Server Administration in Microsoft Environments
WHITE PAPER Finally: Achieve True Principle of Least Privilege for Server Administration in Microsoft Environments by Don Jones, Senior Partner and Principal Technologist, Concentrated Technology Table
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
Administration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller
Learn How Privileged Account Security Solutions are the Right Painkiller Table of Contents Introduction: Control Access, Empower Team 3 The 10 Pains of UNIX Security 4 Pain No.1: Protecting the Keys to
Simplifying the Challenges of Mobile Device Security
WHITE PAPER Three Steps to Reduce Mobile Device Security Risks Table of Contents Executive Overview 3 Mobile Device Security: 3 Just as Critical as Security for Desktops, Servers, and Networks 3 Find the
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
PowerBroker for Windows
PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 5 Sample Regulatory Requirements...
BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT
WHITE PAPER PIM, PAM and PUM BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT Fox Technologies, Inc. www.foxt.com [email protected] 616.438.0840 PIM, PAM and PUM: Best Practices for
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background
Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background What is a privileged user? A privileged user is an individual who, by virtue of function,
Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
PowerBroker for Windows Desktop and Server Use Cases February 2014
Whitepaper PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 4 Sample Regulatory
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett
OBSERVEIT 6.0 WHAT S NEW
OBSERVEIT 6.0 WHAT S NEW ObserveIT 6.0 extends ObserveIT s industry leading session recording solution to a complete Insider Threat Platform that detects and mitigates the risk of insider threats across
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
Red Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
IT ACCESS CONTROL POLICY
Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Windows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
SECURELINK.COM REMOTE SUPPORT NETWORK
REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise software vendors strive to maximize support efficiency log on to the customer system,
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
The ROI of Automated Agentless Endpoint Management
V The ROI of Automated Agentless Endpoint Management A Frost & Sullivan White Paper Prepared by Ariel Avitan, Industry Analyst 2 TABLE OF CONTENTS The Impact of Endpoint Monitoring and Control Solutions
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT. PIM, PAM and PUM WHITE PAPER
WHITE PAPER PIM, PAM and PUM BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT Fox Technologies, Inc. www.foxt.com [email protected] 877.818.3698 PIM, PAM and PUM: Best Practices for
Cloud Data Security. Sol Cates CSO @solcates [email protected]
Cloud Data Security Sol Cates CSO @solcates [email protected] Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric
VMWARE Introduction ESX Server Architecture and the design of Virtual Machines
Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................
Seven Steps to Complete Privileged Account Management. August 2015
Seven Steps to Complete Privileged Account Management August 2015 2015. Beyond Trust. All Rights Reserved. Warranty This document is supplied on an "as is" basis with no warranty and no support. This document
Controlling Remote Access to IBM i
Controlling Remote Access to IBM i White Paper from Safestone Technologies Contents IBM i and Remote Access...2 An Historical Perspective...2 So, what is an Exit Point?...2 Hands on with Exit Points...3
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
October 2014. Application Control: The PowerBroker for Windows Difference
Application Control: The PowerBroker for Windows Difference October 2014 1 Table of Contents Introduction... 4 The Default-Deny Approach to Application Control... 4 Application Control s Dependence on
Managing Special Authorities. for PCI Compliance. on the. System i
Managing Special Authorities for PCI Compliance on the System i Introduction What is a Powerful User? On IBM s System i platform, it is someone who can change objects, files and/or data, they can access
SecureIIS Web Server Protection Guarding Microsoft Web Servers
WHITE PAPER SecureIIS Web Server Protection Guarding Microsoft Web Servers When Bad Things Happen to Good Web Servers Table of Contents Overview 3 SecureIIS Summary 3 The SecureIIS Difference 4 Installation
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
White Paper. Central Administration of Data Archiving
White Paper Central Administration of Data Archiving Archiving and Securing Corporate Data... 1 The Growing Need for Data Archive Solutions... 1 Determining Data Archiving Policy... 2 Establishing the
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
Protecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang [email protected]
PCI DSS Compliance: The Importance of Privileged Management Marco Zhang [email protected] What is a privileged account? 2 Lots of privileged accounts Network Devices Databases Servers Mainframes Applications
Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)
Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning
BeyondInsight Version 5.6 New and Updated Features
BeyondInsight Version 5.6 New and Updated Features BeyondInsight 5.6 Expands Risk Visibility Across New Endpoint, Cloud and Firewall Environments; Adds Proactive Threat Alerts The BeyondInsight IT Risk
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
Best Practices for Information Security and IT Governance. A Management Perspective
Best Practices for Information Security and IT Governance A Management Perspective Best Practices for Information Security and IT Governance Strengthen Your Security Posture The leading information security
Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES
HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES The Office of the Government Chief Information Officer of The Government of the Hong Kong Special Administrative Region issued its IT Security
Ubisecure. White Paper Series. e-service Maturity Model
Ubisecure White Paper Series e-service Maturity Model 2 e-service Maturity Model What we ve seen when we ve been dealing with the extranets and e-services, where companies can offer always available, easy-to-use
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS BeyondTrust Solution Overview October 2014 Table of Contents Introduction... 3 BeyondTrust Solutions... 6 The BeyondInsight
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
How to Audit the 5 Most Important Active Directory Changes
How to Audit the 5 Most Important Active Directory Changes www.netwrix.com Toll-free: 888.638.9749 Table of Contents Introduction #1 Group Membership Changes #2 Group Policy Changes #3 AD Permission Changes
Media and Information Provider Unifies Development Processes
Microsoft Visual Studio Customer Solution Case Study Media and Information Provider Unifies Development Processes Overview Country or Region: United States Industry: Media Customer Profile With operations
Best Practices. Understanding BeyondTrust Patch Management
Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...
7 Tips for Achieving Active Directory Compliance. By Darren Mar-Elia
7 Tips for Achieving Active Directory Compliance By Darren Mar-Elia Contents 7 Tips for Achieving Active Directory Compliance...2 Introduction...2 The Ups and Downs of Native AD Auditing...2 The Ups!...3
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
MITEL. Enterprise Management Solutions
MITEL Enterprise Management Solutions Results-driven Enterprise Wide Management Solutions As business requirements evolve, today s intelligent IP-voice networks are responding by delivering more targeted
Privileged Access Control
Privileged Access Control Ramsey Hajj MS CISSP Director APAC edmz Security [email protected] Governmentware 2010 Booth A-13 Slide 1 Agenda What is Privileged Access? Examples of Privileged Access Common
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
Site24x7: Key Mistakes in Data Center Operations
Site24x7: Key Mistakes in Data Center Operations Introduction In today s connected society, the demands placed on data center professionals is at an all-time high due to the need for modern devices to
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
privileged identities management best practices
privileged identities management best practices abstract The threat landscape today requires continuous monitoring of risks be it industrial espionage, cybercrime, cyber-attacks, Advanced Persistent Threat
