What should you expect a privileged access management solution to do?



Similar documents
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Centrify Cloud Connector Deployment Guide

IT/ITES - hosting & managed services

Secret Server Qualys Integration Guide

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Compliance Guide: PCI DSS

How to Achieve Operational Assurance in Your Private Cloud

PREVENTING DATA LOSS THROUGH PRIVILEGED ACCESS CHANNELS

Software that provides secure access to technology, everywhere.

How to Audit the 5 Most Important Active Directory Changes

Basics of Internet Security

Caretower s SIEM Managed Security Services

Drawbacks to Traditional Approaches When Securing Cloud Environments

BOMGAR FOR VENDOR ACCESS SECURE REMOTE ACCESS FOR THIRD-PARTIES

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

managing SSO with shared credentials

PCI Compliance. Top 10 Questions & Answers

Securing Remote Vendor Access with Privileged Account Security

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

1 Introduction Product Description Strengths and Challenges Copyright... 5

IBM Security Privileged Identity Manager helps prevent insider threats

PCI Compliance Top 10 Questions and Answers

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

IBM QRadar as a Service

ObserveIT User Activity Monitoring

Privileged Session Management Suite: Solution Overview

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

QRadar SIEM 6.3 Datasheet

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Firewall Managed Service. I.T. Security Specialists. Firewall Managed Service 1

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Case Study: Financial Credit Union

Securing and protecting the organization s most sensitive data

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

The SIEM Evaluator s Guide

IT Security. Securing Your Business Investments

With Great Power comes Great Responsibility: Managing Privileged Users

How To Manage A Privileged Account Management

SECURE, MANAGE & CONTROL PRIVILEGED ACCOUNTS & SESSIONS

Continuous Network Monitoring

Cloud Computing Security Considerations

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

How To Buy Nitro Security

VARONIS WHITEPAPER Next Generation Enterprise Search

The Education Fellowship Finance Centralisation IT Security Strategy

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

Feature. Log Management: A Pragmatic Approach to PCI DSS

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

The Benefits of an Integrated Approach to Security in the Cloud

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

ISO COMPLIANCE WITH OBSERVEIT

Table of Contents. Introduction. Audience. At Course Completion

Safeguarding the cloud with IBM Dynamic Cloud Security

Configuration Information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

IBM QRadar Security Intelligence April 2013

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Seven Things To Consider When Evaluating Privileged Account Security Solutions

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Solving the Security Puzzle

CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO

BeyondInsight Version 5.6 New and Updated Features

How to Choose the Right Security Information and Event Management (SIEM) Solution

PCI Requirements Coverage Summary Table

Risk & Hazard Management

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 2.1, Issue Date: 05/02/201405/02/2014. Classification: Open

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Assuria from ZeroDayLab

Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

2013 AWS Worldwide Public Sector Summit Washington, D.C.

IBM Security QRadar Risk Manager

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

The Cloud App Visibility Blindspot

Cloud Security Who do you trust?

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Information Technology Policy

The Sophos Security Heartbeat:

Trust but Verify: Best Practices for Monitoring Privileged Users

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Egnyte Cloud File Server. White Paper

The Sumo Logic Solution: Security and Compliance

THE GLOBAL EVENT MANAGER

Global Privileged Identity Management Market

MTP. MTP AirWatch Integration Guide. Release 1.0

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

Transcription:

What should you expect a privileged access management solution to do? BY CHRIS PACE Head of Product Marketing WALLIX I 2016

What should you expect a privileged access management solution to do? Traditionally privileged access to systems has been a right of those who need to maintain or support IT infrastructure. In some companies, the principle I trust my admins remains. But today privileged accounts remain a weakness from both insider threats (errors, malicious employees, third party or contractors etc) as well as a target for external attackers with increasing frequency and complexity. With more systems and data in businesses there are more privileged users than ever. As these systems may contain sensitive or personal information, better security and auditing of this kind of activity is absolutely essential. There are two significant challenges you most likely have in addressing how you work with privileged users accessing the resources on your network: CONTROL & VISIBILITY Control Being able to successfully manage users accessing the right resources at the right time will dramatically reduce the risk of a breach. Visibility You may know that you have a set of privileged users who log in to critical infrastructure or systems with sensitive data but how can you know when, for how long or what they re doing during those sessions? 2

What should you expect a privileged access management solution to do? WALLIX 2016 In meeting these two challenges head on, an efficient privileged access management (PAM) strategy is built on four pillars: Authentication Monitoring Recording Auditing THE FOUR PILLARS OF PAM : Authentication, Monitoring, Recording, Auditing These capabilities are crucial to begin to effectively secure how privileged users work in your infrastructure whether your own internal teams or third parties. Covering these bases will also meet some significant compliance and regulatory requirements. Let s explore in some more detail how each of these pillars can help you address the challenges that your own business may face. Authentication You ll be able to define access for privileged users, including which systems and protocols are available to them. Adding this kind of control to a single console centralises management for security, but also makes it easier for users who can create a session with a single click. The PAM solution will also integrate with your existing directory services for individual users. The advantages for security here are clear, you can remove the need for shared passwords to be visible to end users by storing them in a secured vault. A PAM solution should also create simple workflows for users to request and be granted access to systems on a one-off, time-limited or permanent basis and give the ability define password policies. Monitoring You need effective monitoring of privileged user activity. With a PAM solution you ll be able to view this activity in real-time, quickly identifying who is connected to which resources and monitoring their actions during that session. And because you re able to assign access to an actual identity you can ensure that users are accountable for their behaviour. The advantages of a system that works in real-time is that alerts are also in real-time and can be quickly responded to. 3

What should you expect a privileged access management solution to do? WALLIX 2016 Recording An important aspect of tracing activity is the ability to record user sessions. This helps to analyse and understand a possible incident or breach. This is also useful for forensic analysis or the training of new users. These captured sessions also add power to your existing logging capabilities. These recordings move you beyond event logging to recreate a complete picture of user session activity on any network resource. Auditing Finally the ability to audit privileged session activity. This audit trail will help you towards regulatory compliance. These reports can also be outputted to SIEM or other log analysis tools in your business. This improvement in auditing and internal control will contribute to better control of IT operations and management of risk. PRIVILEGED ACCESS MANAGEMENT IN THE REAL WORLD Deployment It s likely that you ll have concerns about implementing software that will work at the very heart of your enterprise. This apprehension is completely valid. When identifying a PAM product look for the maximum security capabilities balanced with an unobtrusive and straightforward method for deployment. It should fit in with all your existing infrastructure and support as wide a range of operating systems, applications and network devices as possible. The ability to meet all the requirements we ve already outlined from a single console delivered from a single platform will enable you to deploy your PAM solution in the fastest possible time. Usability Whilst your clear focus will be securing and managing privileged user access, you need to ensure that these users will still be able to be effective and productive in their roles. The PAM solution needs to be usable and change as little as possible about how these admins or third parties access the systems they need. 4

What should you expect a privileged access management solution to do? WALLIX 2016 Conclusion An effective privileged access management solution will ultimately result in significantly increased security for privileged accounts which will undoubtedly help in reducing your attack surface. Where regulatory compliance must be met successful control and auditing of privileged users forms a significant part of that effort. About the Author Chris Pace is Head of Product Marketing at Wallix UK. Based at the company s City of London office (in Fetter Lane), he works to engage and educate audiences on privileged user management, using his extensive experience delivering security solutions to all kinds of organizations. Before beginning a career in information security Chris trained as a Broadcast Journalist and also has worked in IT departments in the public and private sectors. Twitter: @achrispace Email: cpace@wallix.com 5

WALLIX is a software company offering privileged access management solutions for large and medium sized enterprises, public organizations and cloud service providers, helping their many customers to protect their critical IT assets including data, servers, terminals and connected devices. Wallix AdminBastion Suite (or WAB Suite) gives the most effective route to security and compliance by reducing its users biggest security risk privileged access to IT in the shortest possible time. Customers report that deploying WAB Suite requires only 40% of the time needed for a similar deployment of a leading competitor. This led a leading analyst to conclude WALLIX offers the fastest route to compliance". With an unobtrusive architecture, full multi-tenancy, and virtual appliance packaging, WAB Suite is the easiest solution in its category to implement, use and manage. Its best of breed features which include password management, web access portal, access control and comprehensive session monitoring and recording can be deployed easily and securely on premise or in a hybrid cloud environment. WALLIX is a public company listed on Alternext, with a strong customer presence in EMEA. WALLIX has offices in Paris, London and Munich. Over 300 companies trust WALLIX to secure their IT systems, including Alain Afflelou, Danagas, Dassault Aviation, Gulf Air, Maroc Telecom, McDonald s, Michelin, PSA Peugeot-Citroën and Quick. Twitter: @wallixuk More information on: www.wallix.com WALLIX FRANCE (HQ) http://www.wallix.fr Email : sales@wallix.com 118, rue de Tocqueville - 75017 Paris Tél. : +33 (0)1 53 42 12 90 Fax : +33 (0)1 43 87 68 38 WALLIX UK http://www.wallix.com Email: ukinfo@wallix.com 1 Fetter Lane, London, EC4A 1BR - UK Office: +44 (0) 2034 405696 Fax: +44 (0) 2034 405401 WALLIX DEUTSCHLAND http://www.wallix.com Email: deinfo@wallix.com Landsberger Str. 398 81241 München Phone: +49 89 716771910 WALLIX RUSSIA & CIS http://www.wallix.com/ru Email: wallix@it-bastion.com ООО «ИТ БАСТИОН» 107023, Россия, Москва, ул. Большая Семеновская, 45 Тел.: +7 (495) 225-48-10 WALLIX ASIA PACIFIC (Bizsecure Asia Pacific Pte Ltd) Email: contact@bizsecure-apac.com 8 Ubi Road 2, Zervex 07-10 Singapore 408538 Tel: +65-6333 9077 - Fax: +65-6339 8836 CSPN Certified www.wallix.com