Controlling & Managing Super User Access



Similar documents
Controlling and Managing Superuser Access

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

10.2. Auditing Cisco PIX Firewall with Quest InTrust

Go Beyond Basic Up/Down Monitoring

Taking Unix Identity and Access Management to the Next Level

Secure and Efficient Log Management with Quest OnDemand

Migrating Your Applications to the Cloud

Direct Migration from SharePoint 2003 to SharePoint 2010

Eight Best Practices for Identity and Access Management

Quest One Privileged Account Appliance

Key Methods for Managing Complex Database Environments

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

Using Stat with Custom Applications

Proactive Performance Management for Enterprise Databases

Foglight for SQL Server

Quest Management Agent for Forefront Identity Manager

Six Steps to Achieving Data Access Governance. Written By Quest Software

How Password Lifecycle Management Can Save Money and Improve Security

Toad for Oracle Compatibility with Windows 7 Revealed

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

An Innovative Approach to SOAP Monitoring. Written By Quest Software

The Active Directory Management and Security You ve Always Dreamed Of

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

The Case for Quest One Identity Manager

Top Seven Tips and Tricks for Group Policy in Windows 7

Enterprise Single Sign-On 8.0.3

Quest Application Performance Monitoring Implementation Methodology

Achieving ISO/IEC Compliance with Quest One Solutions for Privileged Access. Written By Quest Software, Inc.

Five Tips for Effective Backup and Recovery in Virtual Environments

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Quest Site Administrator 4.4

Image-Based Data Protection: Simply Better Data Protection

6.0. Planning for Capacity in Virtual Environments Reference Guide

Desktop to Cloud. Browser Migration in the Enterprise. Written By Quest Software, Inc.

SharePoint Nine Key Features

Enterprise Single Sign-On Installation and Configuration Guide

8.0. Quick Start Guide

The Active Directory Recycle Bin: The End of Third-Party Recovery Tools?

Protecting and Auditing Active Directory with Quest Solutions

Are You Spending More than You Realize on Active Directory Management?

SHAREPOINT Best Practices for Preparing for SharePoint Migrations. Colin Spence IN FOUR EASY STEPS. Written by

The Quest Cloud Automation Platform

Enterprise Single Sign-On. The Holy Grail of Computing

Exchange 2010 and Your Audit Strategy

6.5. Web Interface. User Guide

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

IT Consolidation in the Public Sector: How to Achieve IT Optimization

Top Five Reasons to Choose Toad Over SQL Developer

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer

A Governance Guide for Hybrid SharePoint Migrations. Written By Chris Beckett Information Systems Architect and SharePoint Solutions Specialist

Best Practices Guide for IT Governance & Compliance

Quest Support: vworkspace Troubleshooting Guide. Version 1.0

Moving to the Cloud : Best Practices for Migrating from Novell GroupWise to Microsoft Exchange Online Standard

Foglight Foglight Experience Viewer (FxV) Upgrade Field Guide

Unified and Intelligent Identity and Access Management

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

Best Practices for SharePoint Development and Customization

Quest Solutions for PCI Compliance

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

Foglight Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Defender Delegated Administration. User Guide

4.0. Offline Folder Wizard. User Guide

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

Desktop Virtualization: Best Bet for a Dwindling IT Budget?

Benchmark Factory for Databases 6.5. User Guide

8.6 Migrating to Exchange 2010

Solving the Security Puzzle

Desktop Authority vs. Group Policy Preferences

Choosing the Right Active Directory Bridge Solution

System Requirements and Platform Support Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

Data Center Consolidation Strategies for the Federal CIO

Ten Things to Look for in a SharePoint Recovery Tool

Quest Collaboration Services How it Works Guide

Quest ActiveRoles Server

Quest ChangeAuditor 4.8

Migrating Lotus Notes Applications to Microsoft Office 365 and SharePoint Online

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

Web Portal Installation Guide 5.0

Real-world Identity and Access Management (IAM) for Unix-based Systems

8.0. Forest Edition. Deployment Guide

Foglight. Dashboard Support Guide

Quest Site Administrator 4.4

formerly Help Desk Authority Quest Free Network Tools User Manual

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest InTrust for Active Directory. Product Overview Version 2.5

2.0. Quick Start Guide

Meeting the Challenge of Log Management for Unix and Linux Systems

Extending Native Active Directory Capabilities to Unix and Linux

Identity and Access Management for the Cloud

Eight Ways Better Software Deployment and Management Can Save You Money

FOR WINDOWS FILE SERVERS

Spotlight Management Pack for SCOM

Managing the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies

Defender 5.7. Remote Access User Guide

Authentication Services 4.1. Authentication Services Single Sign-on for SAP Integration Guide

Overcoming Active Directory Audit Log Limitations. Written by Randy Franklin Smith President Monterey Technology Group, Inc.

Transcription:

Controlling & Managing Super User Access A Primer on Privileged Account Management Written by Kris Zupan Chief Architect Quest Software WHITE PAPER

2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the written permission of Quest Software, Inc. ( Quest ). The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software, Inc. Attn: Legal Department 5 Polaris Way Aliso Viejo, CA 92656 www.quest.com email: legal@quest.com Refer to our Web site for regional and international office information. Trademarks Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure, Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight, ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer, DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile, InTrust, Invirtus, itoken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats, Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!, PowerGUI, Quest Central, Quest vtoolkit, Quest vworkspace, ReportADmin, RestoreADmin, ScriptLogic, Security Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab, Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vautomator, vcontrol, vconverter, vfoglight, voptimizer, vranger, Vintela, Virtual DBA, VizionCore, Vizioncore vautomation Suite, Vizioncore vbackup, Vizioncore vessentials, Vizioncore vmigrator, Vizioncore vreplicator, WebDefender, Webthority, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. Other trademarks and registered trademarks used in this guide are property of their respective owners. White Paper: Controlling & Managing Super User Access 1

Contents Abstract... 3 The Challenges of Privileged Accounts... 4 Privileged Accounts: Necessary but Risky... 4 Privileged Account Management Challenges... 4 Establishing Checks and Balances... 4 Managing Privileged Accounts... 5 Safeguarding Sensitive Information and Ensuring Compliance... 6 Controlling Third-party Vendor and Consultant Access... 6 When Things Go Wrong... 6 Requirements for a Privileged Account Management Solution... 7 Introduction... 7 Traditional Approaches... 7 Basic, Yet Essential Precautions... 8 Convenience Factors... 8 Granular Access... 9 Regulatory Compliance... 9 The Sudo Project... 9 Native Sudo... 9 Quest s Plug-ins... 9 Securing Super User Access with Quest Solutions... 11 Overview... 11 Ease of Use... 11 Password Vault... 12 Session Management... 12 Command Control Options and Privilege Delegation... 12 Appliance-based, Host-based and Agent-based Options... 13 Conclusion... 14 About the Author... 15 White Paper: Controlling & Managing Super User Access 2

Abstract Effectively managing privileged accounts (sometimes called super user accounts) is becoming more and more critical as security and compliance emerge as the driving force behind most IT initiatives. Unfortunately, native tools and manual practices for privileged account management are proving to be inadequate for today s complex heterogeneous enterprise. This white paper explores the risks associated with privileged accounts, and explains how Quest s solutions mitigate those risks by enabling granular access control and accountability while preserving necessary access and ease of use. This paper is intended for CIOs, IT directors and managers, security and compliance officers and administrators in enterprises of all sizes, especially those who have not established firm control over all of their organization s privileged user accounts. White Paper: Controlling & Managing Super User Access 3

The Challenges of Privileged Accounts Privileged Accounts: Necessary but Risky Privileged accounts (known as root access in the Unix world) are necessary from an administrative perspective. Administrators need easy access to certain areas, and sometimes the only way to conveniently gain that access is to have privileged accounts that is simply how some operating systems work. While operating systems have become significantly more powerful in recent years, privileged access has not evolved as quickly, so a single, all-powerful level of access still exists in many enterprises. For instance, many Unix administrative tasks can't be carried out without root access, and many of those tasks are quite routine. While a small business may have only a single trusted person with privileged access, most midsize to large businesses have multiple privileged administrators. The problem is that operating systems do not natively offer a way to discriminate more granular privileged access: it's an all-or-nothing proposition. Therefore, a surprisingly large number of people can often wield incredible power within the native OS much of which is unnecessary for each individual to fulfill his or her role. Privileged accounts can be used to bypass standard controls and authorization levels. A person with a privileged account often has unlimited access and may be able to inflict significant damage to networks, servers, applications and data. To make matters worse, not only can too many administrators inflict damage, they may be able to work outside the network's identity management system and hide their actions. Most organizations face serious challenges in analysis and discovery of security breaches, both in real time and after the fact. They have problems finding out what went wrong, who did what and when they did it. This opens up a level of risk that has no place in a secure IT environment. The solution lies in a combination of policy, checks and balances and automated oversight that can enable more granular access. Privileged Account Management Challenges Establishing Checks and Balances In the United States system of government, constitutional checks and balances assign separate powers to the judicial branch, legislative branch and executive branch. Think of the executive branch (Office of the President) as the privileged account holder; the president wields the ultimate access rights and decision-making authority, but that is mitigated by the oversight of the other two branches. In an enterprise environment, a similar system of checks and balances can be established to limit the power, authority and access rights of privileged users. In most cases, granting the keys to the kingdom to a single person is not really necessary the operating system's privileged account system does not have to be used as is. A more granular delegation of authority, policy-based control and automated workflows can impose an added layer of security over an inherently insecure designation while still getting the job done efficiently and effectively. White Paper: Controlling & Managing Super User Access 4

An optimal approach to privileged account management should include the following checks and balances: Password vault Command control and granular delegation Keystroke logging and session audit Through a policy-driven implementation of these areas, an organization can protect its data, prevent security breaches and ensure compliance with an ever-widening array of rules. This is the realm of privileged account management: a combination of processes, policies and technologies that ensure that privileged users and super users who share administrative credentials are doing the right things, that access is delegated on an as-needed basis and that an audit trail is kept in place at all times. In short, privileged account management adds accountability back into what is otherwise a free-wheeling and overly broad system of administrative access. Managing Privileged Accounts The fundamental challenge of account management is that the IT department is usually delegated the role of managing access, authentication and authorization but often no one imposes that control over the IT department. Those who have privileged access may have a common ethos for sharing information (including passwords), self-policing their actions and keeping that enhanced level of access to themselves. But who guards the guards? It's all too common for enterprises to lack any coherent strategy for privileged access. Most large organizations have multiple administrators, including Windows, Unix and other administrators, each with his or her own tasks to complete. IT administrators have a particular culture of trust between themselves, and it's not unusual for multiple administrators to share a single super user password. This is a friendly way to do business, but an unnecessarily risky one. IT people don't always appreciate what management sees as essential: the need to impose strict controls over themselves. As a result, something exceedingly powerful the unlimited access that can be gained from privileged accounts receives little oversight and is too often protected by just a cobbled-together, ad hoc, informal and frequently ignored set of administrative protocols. As a result, in any enterprise with more than a handful of IT staff, a number of people will have privileged access, which allows them to do just about anything they wish. The basic challenges companies face with regard to privileged access include: No accountability whatsoever, since there is (amazingly) no oversight or management system to control privileged access Too many people with access to super user or root accounts, including admins with limited responsibilities gaining unnecessary access to functions they don't need Lack of control over the privileged access password, which is frequently shared White Paper: Controlling & Managing Super User Access 5

Safeguarding Sensitive Information and Ensuring Compliance Protecting sensitive data and applications is a growing concern for CIOs and senior IT management. Faced with a rapid growth in traffic and data volume, both small and large organizations have a need for privileged users with broad access to servers. This naturally makes it difficult to protect data and comply with regulatory mandates. Controlling Third-party Vendor and Consultant Access Technologies such as cloud computing, along with globalization and the economic recession, have transformed the ways that enterprises conduct business. In particular, more organizations are using third-party vendors and consultants to acquire specialized solutions without the burden of adding full-time IT staff. While this new business model brings many benefits, it also creates challenges, the greatest of which is secure access. Third-party specialists require access to the corporate network, and in many cases, this must include a level of privileged access. Granting privileged access to people inside the company brings enough problems providing privileged access to outside consultants, who are running computers that your organization has not provisioned and that may not be firewalled or protected from malware, is a disaster in waiting. Even a conservative security policy would prohibit such access, but a strict prohibition would make it too difficult for contractors to get the job done. The only good solution is to enable remote vendors with a controlled version of privileged access, so that they can gain entry to those areas they truly need to access without being able to snoop around the entire network looking at confidential corporate data assets. When Things Go Wrong The risks of privileged accounts are not just theoretical. Disgruntled and terminated super users have been known to steal or sabotage data on their way out the door, and industrial espionage occurs on a regular basis. Identity theft and theft of corporate secrets takes place more frequently than many people are aware, and it's often an insider who is the culprit. Such was the case at a Fannie Mae facility in Urbana, Maryland on October 24, 2008, when a contract administrator was terminated and decided to take revenge by planting an electronic time bomb designed to propagate throughout the Fannie Mae network of computers and destroy all data. According to a federal indictment, 1 five days after the contractor had been dismissed, an engineer discovered a malicious script embedded in a routine program. The disaster was averted, but the situation could just as easily have gone the other way. The vulnerability was that the agency lacked a procedure for disabling privileged access immediately upon a person s separation. The rogue employee still had access until later the same evening, giving him enough time to sow seeds of destruction. 1 Department of Justice, U.S. Attorney s Office for the District of Maryland, January 27, 2009, Former Fannie Mae Contractor Employee Indicted for Computer Intrusion. White Paper: Controlling & Managing Super User Access 6

Requirements for a Privileged Account Management Solution Introduction Clearly, administrators need to have access to do their jobs, but the all or nothing approach native to the OS is inadequate and outdated. Most admins who have privileged access do indeed need privileged access to one or more areas of the network, but it is unlikely that they need privileged access to everything. A method to allow easy, unfettered access to what is needed, when it is needed, mitigated by restricted access to what is not needed, would solve the problem. Such a system would: Delegate specific privileges to administrators based on role. Include a policy engine that impartially delegates access based on need. Provide a complete audit record with full details of access and specific actions taken. Traditional Approaches Motivating a group of IT people to adhere to a new management policy is a little like trying to herd cats. Upper management often has a hard time trying to impose its point of view over the IT department. It sometimes just can't be done; IT people are an independent-minded fraternity. Managing IT from outside the department is difficult because management doesn't really understand everything that IT people do. When the operations manager, or any manager from outside IT, steps in and announces, We need to restrict your access, that outside person had better be armed with a very compelling argument and a firm resolve. Basic conflicts occur when management views privileged or unlimited access as a problem while admins see it as standard operating procedure. As a result, organizations tend to adopt one of three solutions: 1. Issue a memo, which everybody understands will be uniformly ignored, but management has been placated. 2. Implement a manual solution (often called a firecall ID ) that involves writing the privileged access password on paper, sealing it in an envelope and storing it in a secure, physical location (such as a safe) controlled by an outside trusted employee or manager. That outside individual is tasked with changing the password each time it has been used. 3. Create individual solutions and policies that lack unification, solving only one problem at a time. The first approach above is clearly inadequate. The second solution attempts to address the issue, but because it is primarily human-controlled, it is still subject to error, loss and intentional misuse. In addition, this approach breaks down when there are dozens or hundreds of accounts at hand. The third solution may be adequate in smaller company environments. The open source solution Sudo, for example, solves a lot of problems and may be all that is needed if there are only a handful of Unix and Linux servers involved. But for larger installations, Sudo offers no centralized management function to control multiple servers from a single management console, nor does it provide an audit trail. (For more on Sudo, see the section The Sudo Project below.) White Paper: Controlling & Managing Super User Access 7

Basic, Yet Essential Precautions Preventing disasters like the Fannie Mae incident described above is not rocket science, but most companies simply don't do it. That rogue administrator was able to plant his malicious software script because his privileged access was not revoked immediately upon his termination. An enforced policy of swiftly revoking the access of terminated individuals should be a standard policy of every company and it's not that hard to implement. Fannie Mae simply got bogged down in bureaucracy and unnecessary procedures, delaying pulling the plug on the administrator's access until it was too late. The Fannie Mae episode could have been easily averted had the organization created and enforced three simple policies: Limit the rights of administrators. Native Unix takes an all access approach to administrator permissions, violating the basic premise that every security manager knows: Trust no one. Granting administrators everything they need to do their jobs, but nothing beyond that, brings a new level of order and common sense. Shut down access quickly when necessary. Some companies physically escort terminated employees and contractors off the premises, and while being walked off the property by a security guard is decidedly embarrassing, it is an unfortunate necessity. A single employee with a grudge can cause a lot of damage if left alone for even a few minutes, especially if they have access and knowledge of the IT system. Sound policy must allow HR to terminate all computer access just prior to the employee receiving notice. Track administrator activity. Many organizations have a system to track what employees are doing, but that tracking often doesn't extend to the super users. Existing technology can record keystrokes and observe actions in real time, create an audit trail and alert upper management that something is amiss before the damage is done. And many solutions can also save the session for forensics analysis and playback later. Of course, a comprehensive answer to the problems of privileged access goes beyond a single solution; it involves a combination of enforceable policy and the right mix of broad enterprise solutions and specific technology solutions designed to satisfy compliance requirements and close the potential security holes created by the existence of multiple privileged access accounts. Convenience Factors Admins are overworked, which is why they tend to take shortcuts like writing privileged access passwords on paper and sharing them with one another. The idea of imposing a whole new protocol for privileged access will never get buy-in if it also imposes too many requirements that take extra time. For instance, the largely manual and labor-intensive firecall ID scenario can break down very quickly, and basic Sudo doesn't work beyond just a few servers. It's too much extra work for a group of people that are already trying to pack 12 hours of work into a 10-hour day. Instead, management of privileged accounts must be automated, role based, easy to use and centralized across all systems with policies uniformly applied. White Paper: Controlling & Managing Super User Access 8

Granular Access Instead of the universal access granted by privileged accounts, organizations need to be able to provide access on an as-needed basis, based on each individual's specific role. This is the principle of least privilege: provide access to only what is needed, when it is needed. This is not available in the operating system, but must be implemented with added privileged account technology and supported by policy. Regulatory Compliance Compliance issues have impacted even the smallest businesses hard. Regulatory compliance requires businesses across all industries to implement a secure environment that safeguards personal information and proves compliance with auditable records. Regardless of the particular piece of legislation with which a business needs to comply, privileged access is at the forefront of the compliance paradigm. Most compliance issues can be addressed, however, through separation of duties within the privileged access domain, along with audit capabilities. The Sudo Project Native Sudo The open source Sudo Project has gone a long way towards resolving privileged account challenges that many enterprises face. Sudo solves the immediate problem of admins accessing more than what they really need; it delegates authority and restricts access based on each person's role. The free Sudo project may be adequate in some circumstances. But for a larger enterprise with serious security requirements, it might not go far enough. The biggest limitation of Sudo is that it is not possible to natively create a single policy and apply and manage it universally across all servers and networks. Another limitation of Sudo is that there is no audit trail and no visibility. There is no centralized policy control, so management of the Sudo environment is cumbersome and not standardized between servers. Sudo is widely used and a very common solution, but not a complete one for enterprise environments. Quest s Plug-ins Beginning with version 1.8 (February 2011), Sudo architecture allows anybody to write plug-ins and add functionality to Sudo. Quest Software is committed to improving the Sudo platform, first by employing Todd Miller, the maintainer of Sudo, to help keep the project alive and move it forward, and by offering a series of commercial enhancements available from Quest. Quest's commercial solutions pick up where Sudo leaves off, providing more granular control over policy, enhanced monitoring and an ability to manage delegation across multiple servers. White Paper: Controlling & Managing Super User Access 9

Quest s first commercially released Sudo plug-in is a central policy server. In the past, one of Sudo's limitations was that it had to be managed individually on every server on which Sudo was installed, and there was no integration between servers. This led to a lot of redundancy and the need to rewrite identical policies for each server. Now, users can create policies from a single policy engine and push them out to everywhere they are needed. The second Sudo plug-in from Quest is a keystroke-logging module, which adds an extra layer of visibility, accountability and auditability. White Paper: Controlling & Managing Super User Access 10

Securing Super User Access with Quest Solutions Overview Quest Software's approach to privileged account and identity management is a set of independent products, recently enhanced with the acquisition by Quest of edmz's flagship suite of identity solutions. These solutions work together to solve the vexing problems associated with privileged accounts. Figure 1. The Quest One Identity Solution includes comprehensive offerings to cover the privileged account management needs for the most diverse and demanding enterprises. Ease of Use Quest solutions deliver the advantages of a common standards-based approach, without the heavy requirements and administrative burden required by an all-encompassing, big box approach. The Quest suite allows companies to use only what they need, keeping costs down and eliminating unnecessary layers of administration. White Paper: Controlling & Managing Super User Access 11

Password Vault One key function of Quest's advanced approach to account management is the password vault, which allows for centralized and policy-based release of privileged account credentials, without limitations from platforms, servers or devices the password vault works across the board on everything. The password vault replaces the laborious, manual process of the firecall ID with an appliance, making the process of password management automated, centralized and policy driven. Possession of the password can be set for a specific time or for a specific task, after which it is automatically revoked and changed. The same solution is designed to deal with the passwords that are typically hard-coded into applications. There may be dozens or hundreds of administrators who have, over time, learned those hard-coded passwords an obvious security risk. Quest eliminates the need for hard-coded passwords; instead applications and databases are configured to make runtime calls to the password vault. With this approach, nobody knows the application passwords, and the passwords can be changed rather than being locked into scripts, which is the real security and compliance concern. Session Management The ability to watch what people are doing is important to any system of checks and balances. Quest's privileged account management suite includes full keystroke logging with search capability. In addition to logging keystrokes and specific commands, the session management solution give managers the ability to watch over things as they happen on the screen and play back recorded sessions after the fact, whether the session was on Unix, Windows, Active Directory, Web applications, databases, devices or mainframes. Session management provides for an extra layer of accountability and visibility, providing a tool for remotely killing a session or revoking access if needed. In addition, the chore of proving compliance or discovering the cause of trouble is bolstered by forensics-ready recording and playback of privileged access sessions. Command Control Options and Privilege Delegation Privileged account management uses a system of delegation and control to limit what privileged users can and cannot do. Quest's command control option, delivered through the Quest appliance in conjunction with the session audit solution, provides a highly secure proxy with whitelist capabilities that can specifically govern what any user can do. This ultra-secure approach enables a granular delegation of tasks and authority, giving each administrator the tools necessary to do his or her job, but nothing more. The command control option works across many environments, including Unix, Linux, Windows and Web applications. Another option available within Unix and Linux environments is a real-time, agent-based granular delegation solution that runs on a server, providing both whitelist and blacklist capabilities and almost infinite control over policies and policy enforcement. Either option provides absolute control over policy creation and enforcement. Not only can responsibility be delegated, it can be delegated based on role and time. For example, an administrator may be delegated specific privileges during the week, but if they have different tasks on the weekend, they can be assigned root access for that specific period of time or under very specific circumstances. White Paper: Controlling & Managing Super User Access 12

Appliance-based, Host-based and Agent-based Options A variety of delivery options are available to match every type of deployment need. Appliance-based solutions are extremely secure, easy to implement and easy to manage; just plug in the appliance and it s hacker proof. Host-based solutions are super secure, controllable and granular but slightly more expensive. Agent-based options deliver highly targeted, highly granular delegation for Unix, Linux and Active Directory. White Paper: Controlling & Managing Super User Access 13

Conclusion The problems that arise from uncontrolled access to privileged accounts can result in multi-million dollar losses, but powerful, cost-effective solutions are readily available to protect your business. Quest Software's suite of privileged account management solutions give you the comprehensive accountability and granular access control that are missing from native operating systems, delivering a framework of least privilege so that administrators have access to what they need, but only what they need at the time they need it. White Paper: Controlling & Managing Super User Access 14

About the Author Kris Zupan, Quest chief architect, is the founder of e-dmz Security, which was acquired by Quest Software in 2011. He previously managed distributed security for a large financial company. Leveraging this experience, Zupan pioneered the privileged account management space with the introduction of the Password Auto Repository in 2003. This was the first commercial product created specifically to address what Gartner now defines as SAPM (Shared Account Password Management). Zupan has published various articles on privileged account management and is a frequent speaker on the topic. He continued to expand the privileged access management space with innovative products like eguardpost, the first product to provide privileged session management and recording. Released in 2005, this product was the first in a growing field of offerings helping to solve privileged account management. White Paper: Controlling & Managing Super User Access 15

WHITE PAPER About Quest Software, Inc. Quest Software (Nasdaq: QSFT) simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest solutions for application management, database management, Windows management, virtualization management and IT management, go to www.quest.com. Contacting Quest Software PHONE 800.306.9329 (United States and Canada) If you are located outside North America, you can find your local office information on our Web site. EMAIL MAIL sales@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around-the-clock coverage with SupportLink, our Web self-service. Visit SupportLink at https://support.quest.com. SupportLink gives users of Quest Software products the ability to: Search Quest s online Knowledgebase Download the latest releases, documentation and patches for Quest products Log support cases Manage existing support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information and policies and procedures. 5 Polaris Way, Aliso Viejo, CA 92656 PHONE 800.306.9329 WEB www.quest.com EMAIL sales@quest.com If you are located outside North America, you can find local office information on our Web site. 2011 Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. WPW_ControlManageUserAccess_US_EC_20110503