Privileged Account Management Mar3n Cannard, Security Solu3ons Architect



Similar documents
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Privileged Account Access Management: Why Sudo Is No Longer Enough

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

How to best protect Active Directory in your organization. Alistair Holmes. Senior Systems Consultant

Secret Server Qualys Integration Guide

ObserveIT User Activity Monitoring software meets the complex compliance and security challenges related to user activity auditing.

The 10 Pains of UNIX Security. Learn How Privileged Account Security Solutions are the Right Painkiller

How To Manage A Privileged Account Management

Edit system files. Delete file. ObserveIT Highlights. Change OS settings. Change password. See exactly what users are doing!

Trust but Verify: Best Practices for Monitoring Privileged Users

Privileged Access Control

PowerBroker for Windows Desktop and Server Use Cases February 2014

Centrify Server Suite Management Tools

Privileged Session Management Suite: Solution Overview

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT

identity management in Linux and UNIX environments

PowerBroker for Windows

PRIVILEGED IDENTITY MANAGEMENT CASE STUDY. Barak Feldman, Cyber-Ark Software Seth Fogie, Lancaster General Health

Mobile Admin Architecture

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

PCI DSS Compliance: The Importance of Privileged Management. Marco Zhang

Red Hat Enterprise ipa

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Quest One Identity Solution. Simplifying Identity and Access Management

Vistara Lifecycle Management

ADSelfService Plus Client Software Installation Guide

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Oracle Privileged Account Manager

Administration Guide NetIQ Privileged Account Manager 3.0.1

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu LTS)

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

BEST PRACTICES FOR UNIX/LINUX PRIVILEGED IDENTITY AND ACCESS MANAGEMENT. PIM, PAM and PUM WHITE PAPER

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Windows Least Privilege Management and Beyond

Virtualization Case Study

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

VMware vcenter Log Insight Security Guide

/ Preparing to Manage a VMware Environment Page 1

Security Strategies: Controlling Privileged Account Access

WHITE PAPER. BeyondTrust PowerBroker : Root Access Risk Control for the Enterprise

Why PCI DSS Compliance is Impossible without Privileged Management

Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard

Managing UNIX Generic and Service Accounts with Active Directory

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

The Pitfalls of Encrypted Networks in Banking Operations Compliance Success in two industry cases

The Centrify Vision: Unified Access Management

SmartCode. v5.0. VNC Manager. Award Winning Remote Computer Management Software. Powerful tool to control all your computers from one program

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

visionapp Remote Desktop 2010 (vrd 2010)

WHITE PAPER. Improving Efficiency in IT Administration via Automated Policy Workflows in UNIX/Linux

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

SECURITY DOCUMENT. BetterTranslationTechnology

Privileged Access Management 15.2 Available Features

Authentication in a Heterogeneous Environment

Dragonframe License Manager User Guide Version 1.2.2

Privileged Administra0on Best Prac0ces :: September 1, 2015

OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration

Advantages and Disadvantages of Open Source Privileged Identity Management

Active Directory and DirectControl

Privileged Access Management 15.3 Available Features

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

Cross-Realm Trust Interoperability, MIT Kerberos and AD

Unifying Authorization Models

Likewise Security Benefits

Firewall Builder Architecture Overview

Record and Replay All Windows and Unix User Sessions Like a security camera on your servers

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Seven Steps to Complete Privileged Account Management. August 2015

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

N02-IBM Managed File Transfer Technical Mastery Test v1

SOLUTION BRIEF CA CONTROLMINDER. Privileged Identity Management with CA ControlMinder

OnCommand Unified Manager

Self-Service Active Directory Group Management

The Power of One. A Simplified Approach to Identity and Access Management. Written by Quest Software, Inc.

Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation

Software Automated Testing

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

IBM Tivoli Netcool Configuration Manager 6.3 Administration and Implementation

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

OracleAS Identity Management Solving Real World Problems

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September :30p Hilton - Golden Gate 6/7/8 San Francisco CA

Directory-as-a-Service Primer (DaaS)

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2: Do not use vendor-supplied defaults for system passwords and other security parameters

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Security Advice for Instances in the HP Cloud

The IDG 9074 Remote Access Controller

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

Transcription:

Privileged Account Management Mar3n Cannard, Security Solu3ons Architect

Customer Use Cases - Introduc3on A US-based Natural Gas and Electric company serving multiple states Project Requirements Only grant access to shared administrative accounts with pre-approval based on established policy Need to provide firecall functionality Needed to delegate administrative access for Separation of Duty (SoD) Required logging of Windows administrator activity Needed to consolidate Unix identities into Active Directory to streamline provisioning, password management and privilege account management

Customer Use Cases - Introduc3on A global leader in payment processing Project Requirements Needed to centralize accounts and get control over passwords and user lifecycles Needed to replace NIS and provide centralized authentication Needed to restrict and audit what users could do but at the same time provide for users to carry on with their day-to-day jobs Needed to provide controls around shared administrative passwords Needed to rotate administrative account passwords regularly Needed to correlate and audit administrative activity with the actual end user

Helicopter View Automate the management of func3onal account passwords AD Bridge Delega3on Allow the user to use their AD creden3als to access Unix/Linux hosts Once the user is logged on, manage what they can do Session Management Managed list of resources the user is authorized to access. Audit of all session ac3vity

Helicopter View Automate the management of func3onal account passwords AD Bridge Delega3on Allow the user to use their AD creden3als to access Unix/Linux hosts Once the user is logged on, manage what they can do Session Management Managed list of resources the user is authorized to access. Audit of all session ac3vity

PAM Sub- Categories PRIVILEGES AD Bridge Use Case Utility Company Needed to consolidate Unix identities into Active Directory to streamline provisioning, password management and privilege account management PLATFORMS Opera3ng Systems Privilege Sessions Delegation Use Case - Payment Processing Needed to centralize accounts and get control over passwords and user lifecycles Needed to replace NIS and provide centralized authentication

Helicopter View Automate the management of func3onal account passwords AD Bridge Delega3on Allow the user to use their AD creden3als to access Unix/Linux hosts Once the user is logged on, manage what they can do Session Management Managed list of resources the user is authorized to access. Audit of all session ac3vity

PAM Sub- Categories PRIVILEGES AD Bridge Use Case Utility Company Only grant access to shared administrative accounts with pre-approval based on established policy Need to provide firecall functionality PLATFORMS Opera3ng Systems Network Devices Privilege Sessions Delegation Use Case - Payment Processing Needed to provide controls around shared administrative accounts Needed to rotate administrative account passwords regularly Databases Applica3ons

Password Management root administrator root administrator

Password Management password request password release password reset root

PAM Sub- Categories PRIVILEGES AD Bridge Privilege Sessions Delegation

Helicopter View Automate the management of func3onal account passwords AD Bridge Delega3on Allow the user to use their AD creden3als to access Unix/Linux hosts Once the user is logged on, manage what they can do Session Management Managed list of resources the user is authorized to access. Audit of all session ac3vity

PAM Sub- Categories PRIVILEGES PROTOCOLS AD Bridge Use Case Utility Company RDP VNC Required logging of Windows administrator activity SSH TELNET Privilege Sessions HTTP HTTPS Delegation 3270 4690 5250

Privileged Session Management - Windows Request session Retrieve password RDP

Privileged Session Management - Unix Request Unix session Retrieve password shell

Privileged Session Management Network Enclaves X1 Request RDP session to X1 Privileged Session Manager Retrieve password RDP SSH Session details passed to Proxy Session goes straight back to the user Proxy SSH PCI Network Enclave

Helicopter View Automate the management of func3onal account passwords AD Bridge Delega3on Allow the user to use their AD creden3als to access Unix/Linux hosts Once the user is logged on, manage what they can do Session Management Managed list of resources the user is authorized to access. Audit of all session ac3vity

PAM Sub- Categories PRIVILEGES PLATFORMS Use Case Utility Company Opera3ng Systems AD Bridge Needed to provide find-grained delegation of administrative (root) access for Separation of Duty (Sod) Use Case - Payment Processing Privilege Sessions Delegation Needed to restrict and audit what users could but at the same time provide for users to carry on with their day-to-day jobs Needed to correlate and audit administrative activity with the actual enduser

PRIVILEGES Unix Delega3on: Problem Statement AD Bridge How do I allow users to perform elevated tasks on Unix without losing control of the root password? Pair a password vault with a delegation solution Privilege Sessions Delegation Common delegation solutions Native OS solutions (RBAC implementations) The open source Sudo project The Commercial Unix Security space

PRIVILEGES AD Bridge What did we discover? Na7ve OS op7ons Commercial 3 rd party solu7ons ~3,000 customers sudo Linux: 7.5M servers Unix: 2.8M servers Mac: 2.0M servers No focus on this segment! Privilege Sessions Delegation Result? Companies would: Purchase a PAM sol n only for their highest risk machines Hate having to re- train admins & help desk staff on a new syntax Bend sudo in crazy ways

Sudo v1.7 and earlier PRIVILEGES AD Bridge Privilege Sessions Delegation

PRIVILEGES Field Feedback: Common Pain and Trends AD Bridge How do I easily provide access control reports? How do I deal with sudoers? How to manage it, distribute it, etc How do I enable central keystroke logging? Privilege Sessions How do I know what is going on across lots of systems? Delegation How do I provide more fine-grain control in the policy?

Sudo v1.8 and the new plug- in API PRIVILEGES AD Bridge Privilege Sessions Delegation

PRIVILEGES Example architecture using plug- in API AD Bridge Privilege Sessions Delegation

Example pain points that the plug- in API can assist with PRIVILEGES AD Bridge Privilege Sessions Delegation Sudo Reporting Access Control Report Event Activity Commands run Policy changes Deployment Preflight and sudo plug-in installation Policy Management Editor, Versioning, Rollback Keystroke Logging Search, Playback Separation of Duty

SUDO v2.0: Design Phase PRIVILEGES AD Bridge Privilege Sessions http://www.sudo.ws/sudo/sudo-rbac.html (April 12, 2012) New security policy format Designed for the needs of the enterprise Include an API to support analysis and reporting tools Support grouping of commands and options in logical units Facility management of sudoers by multiple stake-holders Time based policy rules Data source plug-ins Delegation

SUDO v2.0: Design Phase PRIVILEGES AD Bridge Privilege Sessions Delegation

Complete Identity & Access Management Manage Access to Business Critical Information Access Governance Access Governance Privileged Privileged Account Management Account Management Understand & Control Administrator Activity Simplify Account Management Identity Administration User Activity Monitoring Audit User Activity 28 2011 Quest Software, Inc. All rights reserved..

Thank You

Centrally view sudo event ac3vity

Search and filter sudo event logs

Manage local accounts

Replay sudo sessions

Detailed Sudo access control repor3ng

Separa3on of Duty