SlideShare uma empresa Scribd logo
1 de 18
Zero Trust
Privileged Identity and Access Management
                   Platform




               XsuiteTM
Introduction

    • Security software company providing                                       Best Overall IT
                                                                                Company 2011
       Privileged Access Control Solutions

                                                                               RSA 2011 Hot New
    • Global Fortune 1000 and Government                                        Security Product


       customer base                                                              Cool Vendor



    • Privately held - Headquartered in Herndon, VA                                  Best
                                                                                Network Security


    • Single Platform – XsuiteTM
                                                                                 Hot Company
                                                                                   to Watch



                                                                                    Top 100
                                                                                Global Company

       FIPS 140-2, Level-2   Common Criteria EAL 4+   UC/Approved Prod. List


2
Our Customers Include…

              Commercial                      Federal
     Top 5 Global Bank
     Top 3 Telecommunications Company
     Fortune 10 Financial Services Company


     Top 5 Global Retailer
     Multiple Global Stock Exchanges
     Fortune 200 Food Products Company


     Top 3 Online Broker
     Top 3 Smart Phone Provider
     Top 3 Food and Drug Retailer


3
Privileged Identity and Access
Management for Federal
                        • DOD CIO Instruction 8520.03
                           • Administrative accounts shall not be
                             accessed from an untrusted or user
                             managed environments
                           • Administrative accounts, both partner and
                             DoD must utilize level 4 credential


                        • 2011 FISMA report
                           • Privileged access identified by IG as the
                             area in most need of improvement
                           • Use of risky shared accounts and no
                             identified policy

                        • NIST 800-53
                           • Privileged users require a broad set of
                             security controls: AC, AU, CA, CM, IA, MA,
                             etc…
Evolving Credential Management
Challenge
                    • HSPD-12
                       • Presidential directive to establish trusted
                         identity for physical and logical access
                            • OMB-11-11 requires 2013 IT budget submission
                              to address logical PIV integration
                            • FICAM chaired by CIOs develops common
                              framework and maintains roadmap
                            • FY2012 Presidential IT Budget Priority
                    • NIST 800.63
                       • Electronic authentication mechanism guide
                         includes Levels 1 to 4
                    • FIPS 201-2
                       • Personal Identity Verification (PIV) of federal
                         employees and contractors
                            • X.509 based Federated PKI
                            • Revised draft addresses mobility
Setting Priority Within a
Framework
                     • ICAM roadmap guidance for Privileged Users
                        • Agencies shall use high assurance credentials for
                          administrative users
                            • Level 4 Personal Identification Verification (PIV)
                              card
                                 • Smart cards with embedded PKI Certificate
                                 • Commonly referred to in DOD as CAC (Common
                                   Access Card)

                        • Minimize use of password and tokens for all
                          administration
                            • Agencies should eliminate duplicative infrastructure
                              to reduce or eliminate the costs associated with
                              expired/forgotten passwords

                        • Eliminate application-specific password tokens
                            • Enabled application to accept the PIV card for
                              federal employees and contractors
Align with Executive Priorities

                       • IT Reform
                          • OMB mandates coordinated through the CIO
                            Council
                          • 25 Point execution plan
                          • FDCCI (Federal Data Center Consolidation Initiative)
                               • CIO counsel program aligned with OMB
                                 requirements
                               • Must report FY progress
                               • Four primary goals
                                     •   Reduce costs
                                     •   Increase security
                                     •   Increase efficiency
                                     •   Reduce energy consumption
                          • Cloud Computing Strategy “Cloud First”
                               • Efficiency, agility and innovation
                               • Accelerate FDCCI
                               • FEDRAMP
Xceedium New Enterprise
Solution
Problems We Solve…

 • Eliminate
    • Risk of privileged access through anonymous shared accounts
    • Expense of redundant administrative access solutions
    • Complication of ineffective homegrown solutions


 • Enable
    • Enterprise PIV Level 4 credential for privileged access
    • Centralized policy management and compliance reporting for privileged users
    • “New Enterprise” support for legacy IT, data center, private and public cloud


 • Move Forward
    • Rapid deployment
    • OMB Mandated compliance, DoD policy, and FISMA required security controls
    • Supports emerging Continuous Monitoring requirements
Department of Homeland Security

                                 Problem: Consolidate & grant secure access to
                                 geographically dispersed data centers
                                 •   centralize access control across agencies with
                                     distinct missions
                                 •   ensure contained and auditable access
                                 •   meet federal compliance requirements (FDCC/FISMA)

                                  Results: Control over privileged users and critical
                                  infrastructure and assets
                                 •   tight control over who gets access to what, when and for
                                     how long
                                 •   contain users from the 21 component agencies to
                                     authorized systems only
                                 •   audit quality logging for compliance

      “With Xceedium GateKeeper we have an all-in-one solution for these higher risk users
      which gives us the peace of mind that we are meeting our objectives to safeguard our
      network and the sensitive information it contains.”
                                                                    Security Expert at DHS

10
Use Case-                     DHS




                                                    -IT Admins
                                                    -Elevated Risk
                                                    -Applications




•   Single point for management and cloud entry        •   Continuous Monitoring
•   PIV-to-Shared identity resolution (OMB-11-11)      •   LDAP/AD component support
•   Security Controls (NIST 800-53)                    •   Virtual private cloud management network
Xceedium Unveils Xsuite Cloud
     For Amazon Web Services




         AWS Security Solution Provider Delivers Comprehensive
       Privileged Identity and Access Management Solution for the
                              New Enterprise



12
Privileged Identity & Access
 Management for the New
Enterprise
     Traditional Data Center     Private Cloud                Public Cloud




                               Virtual Management Console   AWS Management Console




                                   • Single Scalable Platform
                                   • Comprehensive Zero Trust Controls
                                   • Unified Policy Management

13
Two Form Factors

                                                            Public Cloud
     Traditional Data Center   Private Cloud                                           Traditional Data Center        Private Cloud




                               Virtual Management Console   AWS Management Console                                    Virtual Management Console




                                                                                                       Public Cloud




               Physical Appliance                                                    Amazon Machine Image (AMI)



14
Security Across AWS Regions
& AWS Management Console

                                        AWS Regions




                                      GOV Cloud
Admin Accounts
                              AWS Classic Cloud




                                AWS Management
                                Console

Master AWS Admin Account
Tight Integration, Public Sector Ready

Integration:
    •   Via AWS SDKs/AWS APIs
    •   Integration with AWS Management Console (via API)
    •   AWS Identity and Access Management (via API)
    •   Support for AWS VPC
    •   AMI based solution option
    •   AWS S3-based storage option for Xsuite log-files and session recordings



Public Sector Ready:
    •   FIPS compliant
    •   PIV/CAC smart card authentication across enterprise systems,
        AWS Management Console, EC2 Instances,
    •   AWS GovCloud Support
Click to watch a brief video about Xceedium




17
Contact Us

     2214 Rock Hill Road, Suite 100
          Herndon, VA 20170
         Phone: 866-636-5803
      Email: info@xceedium.com

       Twitter: @Xceedium
            Facebook:
     www.facebook.com/xceedium




18

Mais conteúdo relacionado

Destaque

La tecnología en el futuro/ monica
La tecnología en el futuro/ monicaLa tecnología en el futuro/ monica
La tecnología en el futuro/ monicalamonimanrique
 
Global malignant melanoma drug market & clinical pipeline insight
Global malignant melanoma drug market & clinical pipeline insightGlobal malignant melanoma drug market & clinical pipeline insight
Global malignant melanoma drug market & clinical pipeline insightRajesh Sarma
 
Putting the spark into your brand
Putting the spark into your brandPutting the spark into your brand
Putting the spark into your brandAndyWilkinson
 
XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...
XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...
XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...PKF Federación Panamericana de Karate
 
TDA/SAP Methodology Training Course Module 2 Section 5
TDA/SAP Methodology Training Course Module 2 Section 5TDA/SAP Methodology Training Course Module 2 Section 5
TDA/SAP Methodology Training Course Module 2 Section 5Iwl Pcu
 
Las redes sociales: ¿como pueden ayudar a mi asociación?
Las redes sociales: ¿como pueden ayudar a mi asociación?Las redes sociales: ¿como pueden ayudar a mi asociación?
Las redes sociales: ¿como pueden ayudar a mi asociación?novisline
 
Torque Management Business Performance Improvement
Torque Management Business Performance ImprovementTorque Management Business Performance Improvement
Torque Management Business Performance ImprovementDee Carri
 

Destaque (15)

Project assessment grids
Project assessment gridsProject assessment grids
Project assessment grids
 
La tecnología en el futuro/ monica
La tecnología en el futuro/ monicaLa tecnología en el futuro/ monica
La tecnología en el futuro/ monica
 
Global malignant melanoma drug market & clinical pipeline insight
Global malignant melanoma drug market & clinical pipeline insightGlobal malignant melanoma drug market & clinical pipeline insight
Global malignant melanoma drug market & clinical pipeline insight
 
Putting the spark into your brand
Putting the spark into your brandPutting the spark into your brand
Putting the spark into your brand
 
The neurobiology of love reviews
The neurobiology of love reviewsThe neurobiology of love reviews
The neurobiology of love reviews
 
Hacking with hhvm
Hacking with hhvmHacking with hhvm
Hacking with hhvm
 
XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...
XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...
XXX Seniors Pan American Karate Championships Rio de Janeiro 2016:Information...
 
visionworks
visionworksvisionworks
visionworks
 
W247 web
W247 webW247 web
W247 web
 
TDA/SAP Methodology Training Course Module 2 Section 5
TDA/SAP Methodology Training Course Module 2 Section 5TDA/SAP Methodology Training Course Module 2 Section 5
TDA/SAP Methodology Training Course Module 2 Section 5
 
Las redes sociales: ¿como pueden ayudar a mi asociación?
Las redes sociales: ¿como pueden ayudar a mi asociación?Las redes sociales: ¿como pueden ayudar a mi asociación?
Las redes sociales: ¿como pueden ayudar a mi asociación?
 
Torque Management Business Performance Improvement
Torque Management Business Performance ImprovementTorque Management Business Performance Improvement
Torque Management Business Performance Improvement
 
Diario de un perro
Diario de un perroDiario de un perro
Diario de un perro
 
Que significa ser pobre1
Que significa ser pobre1Que significa ser pobre1
Que significa ser pobre1
 
Prezantim harmoniadeutsch
Prezantim harmoniadeutschPrezantim harmoniadeutsch
Prezantim harmoniadeutsch
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Xceedium - Privileged User Management in the AWS Cloud

  • 1. Zero Trust Privileged Identity and Access Management Platform XsuiteTM
  • 2. Introduction • Security software company providing Best Overall IT Company 2011 Privileged Access Control Solutions RSA 2011 Hot New • Global Fortune 1000 and Government Security Product customer base Cool Vendor • Privately held - Headquartered in Herndon, VA Best Network Security • Single Platform – XsuiteTM Hot Company to Watch Top 100 Global Company FIPS 140-2, Level-2 Common Criteria EAL 4+ UC/Approved Prod. List 2
  • 3. Our Customers Include… Commercial Federal  Top 5 Global Bank  Top 3 Telecommunications Company  Fortune 10 Financial Services Company  Top 5 Global Retailer  Multiple Global Stock Exchanges  Fortune 200 Food Products Company  Top 3 Online Broker  Top 3 Smart Phone Provider  Top 3 Food and Drug Retailer 3
  • 4. Privileged Identity and Access Management for Federal • DOD CIO Instruction 8520.03 • Administrative accounts shall not be accessed from an untrusted or user managed environments • Administrative accounts, both partner and DoD must utilize level 4 credential • 2011 FISMA report • Privileged access identified by IG as the area in most need of improvement • Use of risky shared accounts and no identified policy • NIST 800-53 • Privileged users require a broad set of security controls: AC, AU, CA, CM, IA, MA, etc…
  • 5. Evolving Credential Management Challenge • HSPD-12 • Presidential directive to establish trusted identity for physical and logical access • OMB-11-11 requires 2013 IT budget submission to address logical PIV integration • FICAM chaired by CIOs develops common framework and maintains roadmap • FY2012 Presidential IT Budget Priority • NIST 800.63 • Electronic authentication mechanism guide includes Levels 1 to 4 • FIPS 201-2 • Personal Identity Verification (PIV) of federal employees and contractors • X.509 based Federated PKI • Revised draft addresses mobility
  • 6. Setting Priority Within a Framework • ICAM roadmap guidance for Privileged Users • Agencies shall use high assurance credentials for administrative users • Level 4 Personal Identification Verification (PIV) card • Smart cards with embedded PKI Certificate • Commonly referred to in DOD as CAC (Common Access Card) • Minimize use of password and tokens for all administration • Agencies should eliminate duplicative infrastructure to reduce or eliminate the costs associated with expired/forgotten passwords • Eliminate application-specific password tokens • Enabled application to accept the PIV card for federal employees and contractors
  • 7. Align with Executive Priorities • IT Reform • OMB mandates coordinated through the CIO Council • 25 Point execution plan • FDCCI (Federal Data Center Consolidation Initiative) • CIO counsel program aligned with OMB requirements • Must report FY progress • Four primary goals • Reduce costs • Increase security • Increase efficiency • Reduce energy consumption • Cloud Computing Strategy “Cloud First” • Efficiency, agility and innovation • Accelerate FDCCI • FEDRAMP
  • 9. Problems We Solve… • Eliminate • Risk of privileged access through anonymous shared accounts • Expense of redundant administrative access solutions • Complication of ineffective homegrown solutions • Enable • Enterprise PIV Level 4 credential for privileged access • Centralized policy management and compliance reporting for privileged users • “New Enterprise” support for legacy IT, data center, private and public cloud • Move Forward • Rapid deployment • OMB Mandated compliance, DoD policy, and FISMA required security controls • Supports emerging Continuous Monitoring requirements
  • 10. Department of Homeland Security Problem: Consolidate & grant secure access to geographically dispersed data centers • centralize access control across agencies with distinct missions • ensure contained and auditable access • meet federal compliance requirements (FDCC/FISMA) Results: Control over privileged users and critical infrastructure and assets • tight control over who gets access to what, when and for how long • contain users from the 21 component agencies to authorized systems only • audit quality logging for compliance “With Xceedium GateKeeper we have an all-in-one solution for these higher risk users which gives us the peace of mind that we are meeting our objectives to safeguard our network and the sensitive information it contains.” Security Expert at DHS 10
  • 11. Use Case- DHS -IT Admins -Elevated Risk -Applications • Single point for management and cloud entry • Continuous Monitoring • PIV-to-Shared identity resolution (OMB-11-11) • LDAP/AD component support • Security Controls (NIST 800-53) • Virtual private cloud management network
  • 12. Xceedium Unveils Xsuite Cloud For Amazon Web Services AWS Security Solution Provider Delivers Comprehensive Privileged Identity and Access Management Solution for the New Enterprise 12
  • 13. Privileged Identity & Access Management for the New Enterprise Traditional Data Center Private Cloud Public Cloud Virtual Management Console AWS Management Console • Single Scalable Platform • Comprehensive Zero Trust Controls • Unified Policy Management 13
  • 14. Two Form Factors Public Cloud Traditional Data Center Private Cloud Traditional Data Center Private Cloud Virtual Management Console AWS Management Console Virtual Management Console Public Cloud Physical Appliance Amazon Machine Image (AMI) 14
  • 15. Security Across AWS Regions & AWS Management Console AWS Regions GOV Cloud Admin Accounts AWS Classic Cloud AWS Management Console Master AWS Admin Account
  • 16. Tight Integration, Public Sector Ready Integration: • Via AWS SDKs/AWS APIs • Integration with AWS Management Console (via API) • AWS Identity and Access Management (via API) • Support for AWS VPC • AMI based solution option • AWS S3-based storage option for Xsuite log-files and session recordings Public Sector Ready: • FIPS compliant • PIV/CAC smart card authentication across enterprise systems, AWS Management Console, EC2 Instances, • AWS GovCloud Support
  • 17. Click to watch a brief video about Xceedium 17
  • 18. Contact Us 2214 Rock Hill Road, Suite 100 Herndon, VA 20170 Phone: 866-636-5803 Email: info@xceedium.com Twitter: @Xceedium Facebook: www.facebook.com/xceedium 18

Notas do Editor

  1. Ken Ammon Chief Strategy Officer for XceediumBLACKHAT Joke
  2. Security software company providing Privilege Access Control Solution. Later in the presentation I’ll provide additional color Privileged Identity and access and zero trust.Our product is named Xsuite…now offering Xsuite cloud.We support both Commercial and Government customers  We have Headquarters in Herndon VAand development in New Jersey and Ottawa Canada.We maintain FIPS 140-2, Common criteria EAL4+, and Status on the DISA UC-APL
  3. Our customers include some of the most notable commercial brands in the world and important US and International Government agencies.
  4. Start off with an explanation of Privileged Identity and Access Management's application within the federal market.   Privileged users are classified into three groups,IT Administrators, Users with elevated risk access such as Foreign NationalsApplications which operate with elevated privilege and require embedded credentialsControls, policy and risk management guidance is addressed in documents such as DoD Policy,  the 2011 FISMA report where use of shared accounts is listed as critical area of most need of improvementNIST 800-53 requires a broad set of controls to manage the risk of privileged users and
  5. In order to gain access these privileged users require credentials such as passwords, tokens, certificates.Proper management of these credentials is essential and pressure continues to mount to fully deploy HSPD-12compliant credentials.  NIST defines four levels of credential and provides guidelines for applying them based upon risk The recent revised draft of FIPS 201-2 provides details for compliant PIV credentials.  These credentials are necessary for contractors and government employees.
  6. Given the elevated risk posed by privileged users and the credentials which enable them we have excellent alignment with ICAM guidance and framework to enable level 4 PIV access for privileged users while eliminating flawed password management implementations.  In addition, we support the securing of credentials at rest within privileged applications.
  7. IT executive priorities demand the adoption of new computing models IT reform aligns with austerity and Federal Data Center consolidation, virtualization, and Cloud first strategy have become the poster child for reducing spend.Implementation requires not sacrificing on security or introducing additional cost and complexity. Flexibility, simplicity, cost and scale.
  8. Xceedium provides Xsuite and Xsuite cloud to meet the New enterprise challenge
  9. We eliminate anonymous shared accounts, expensive, redundant, and non-compliant  token based systems and Complicated and ineffective homegrown solutions such as jump-box solutionsWe enable Level 4 PIV credentials for privileged access through our centrally managed and highly scalable system all the while enabling ease of management in the new enterprise.Move forward byEmpoweringour customers to move forward with rapid deployment of private and public cloud solutions while meetingkey mandates, policies, and NIST controls.
  10. We have been fortunate to develop our core product alongside the evolution of customer such as the Department of Security.  Within DHS our privileged user level 4 PIV integration was largely driven by FDCCI requirements which led to the development of an enterprise wide private cloud. Our system to provide a single point of policy management platform within the privatecloud and component systems.  Our DVR like monitoring and audit enable rapid response to violations of policy and reporting for continuous monitoring compliance
  11. Xceedium's experience working with DHS was instrumental in preparing us to extend our offering into the public cloudand we have been fortunate enough to work with Amazon Web Services Cloud solution architect along the way.  Xceedium now extends flexibility to our customers with choices of on prem or off-prem credential management and privileged access level 4 PIV card access.  Xceedium in combination with FEDRAMP controls enable a zero-trust modelwhere all privileged access is monitored and recorded.
  12. AWS team over 9months and we took advantage of the great API’s toenabled our solution.
  13. New enterprise and zero trustXsuite Cloud provides a single, unified policy management capability across protected nodes regardless of where these nodes live.Zero Trust Controls Include:Vault Passwords – The first step is to change and vault critical passwords (so they don’t show up in spreadsheets) and so privileged users no longer have direct and uncontrolled access to devices through the network or by walking up to the system. This also keeps passwords and credentials off end devices and away from malware & APT that is looking to steal them.Positively ID and Authenticate User – The user logs onto the system forcing a positive user identification. The system supports integration with directories, single-sign-on and two factor ID/Authentication systems.Control Access (White List) – the user is presented a list of ONLY the servers and network devices they are explicitly authorized to access and the methods they can use to access the devices. They don’t see others.Monitor/Record – all activities are logged and the policy can be set to record the session.Filter Commands – the commands the user is enabled to perform can be constrained as required via a white list (allowed) or blacklist (disallowed)Prevent Leapfrogging – “Contain the user” -- prevent the user from jumping from an authorized device to unauthorized devices – for example using “RDP Hopping” or SSH.Attributed Identity When using Shared Accounts – even thought the user may be logged into a shared account – for example as “root” -- Xsuite knows exactly which user is logged in and using the account and what they are doing (no anonymous activity permitted).Log Everything - all of this activity is logged in a tamper proof log files. Session recordings can be reviewed through DVR or Tivo replay capability with skip ahead to tags indication where a policy violation occurred.Alert on Policy Violations – ensure the Security Operations Center and other key people are alerted to policy violations or attempted policy violations – e.g., via email, SIEM/log file integration, SNMP trap.
  14. Xsuite Cloud is a superset of Xceedium’s Xsuite product and will be delivered in two form factors: 1) A Physical Appliance -- with all hardware/software installed and supported2) An Amazon Machine Interface – the entire software stack (Operating System, Xsuite Cloud Platform) on an AMI that can be run on and Amazon EC2 InstanceExisting Xsuite customers can upgrade current Xsuite appliance to Xsuite Cloud.
  15. Xsuite Cloud protects nodes in all key AWS Regions – AWS Public Cloud, AWS GovCloud and AWS Virtual Private CloudXsuite also provides security and separation of Duties for the AWS Management Console. The AWS Management Console is “superuser” account for AWS that enables customers to make changes that can have a financial or operational impact across the full compliment of AWS services (e.g., EC2, S3 Storage, VPC, etc.):Adding/Deleting EC2 InstancesPerform actions on running EC2 InstancesAdding S3 Storage CapacityConfigure Elastic Beanstalk to auto deploy/load balance resourcesEtc.
  16. Xceedium has worked over 9 months with the AWS team.  Our experience working with AWS APIs was an exceptional and all of the necessary functionality was intuitive and well documented.  All of which enabled us to release a public sector ready GovCloudsolution.The following movie provides an overview of our product and features available to support public sector adoption of the Amazon Web Services Public cloud.