SlideShare uma empresa Scribd logo
1 de 4
SOLVING




The Privileged Access Conundrum
IT managers everywhere feel overwhelmed with the rising
tide of IT security threats they have to deal with in the face of
an increasing regulatory burden and the ever expanding
vision of the IT infrastructure. It is not surprising then that they
tend to overlook one particular area of IT security, which is the
privileged access that they grant to themselves and/or their
colleagues in order to do their jobs. Not only are the
challenges of privileged access moving up and down the
stack from the hardware layer up to the business application
level, they are also moving outside those boundaries to the
cloud and virtual computing environments. Regardless of the
environment, there are administrators responsible for
managing those environments and privileged users with
access to highly sensitive information that must be managed,
monitored and controlled.



The British hacker Gary McKinnon, who the US government
wanted to extradite after he hacked Pentagon IT systems,
gained much of his access through privileged user accounts
which had been left with the default settings.
Privileged
Access Challenges
Today, organizations spend a lot of resources building an infrastructure
for securing the enterprise and assuring their business continuity and
compliance. Every typical IT environment comprises of hundreds or
thousands of servers, databases, network devices and more, all
controlled and managed by a variety of privileged and shared
identities – also known as break-glass, emergency or fire IDs – which
are the most powerful in any organization. This includes the ‘Root’
account on UNIX/Linux, ‘Administrator’ in Windows, Cisco ‘enable’,
Oracle ‘system/sys’, MSSQL ‘sa’ and many more.
                                                                          What is a Privileged
                                                                           User/Access
                                                                             Someone with IT permissions to




These identities are often neglected; it is difficult to monitor their session
activities, and passwords are rarely changed. In some cases, these
identities are required not only by the internal IT personnel, but also by
external third-party vendors and, thus, require extra care, such as
secure remote access and secure session initiation without exposing the
credentials. Powerful passwords are also often found hard-coded
inside applications, scripts and parameter files, leaving them
unsecured and rarely changed. Mismanagement of privileged access
imposes great risks to organizations. These include the following:

Insider Threat – One of the biggest concerns today is the risk of insider
threat. In many organizations, the same Root or Administrator
password is used across the organization, making it easier for a
disgruntled insider to abruptly take down core systems.
                                                                                                            ?
                                                                                 Access highly sensitive data
                                                                                 Change critical IT systems
                                                                                 Conduct high value transactions
                                                                                 Cover their tracks in the audit trail




                                                                                 Administrative Overhead – With hundreds of network devices,
                                                                                 privileged access can be extremely time-consuming to manually control
                                                                                 and report on, and more prone to human errors. Moreover,
                                                                                 inaccessibility of such a password by an on-call administrator may
                                                                                 cause hours of delay in recovering from system failure.

                                                                                 Despite often being employees of a relatively low rank, the level of
                                                                                 access to sensitive data given to Privileged users is often the highest any
                                                                                 employees have had in the history of business. Worst still, poor practice
                                                                                 can leave Privileged user accounts easily accessible to outsiders. So, the
                                                                                 Privileged access issue is first about managing the Privileged user
                                                                                 accounts and then about managing the actual Privileged users, andin
                                                                                 many cases they are not well aligned.




                                                                                 Why Privileged Access can turn
                                                                                 Catastrophic
                                                                                 There are a number of reasons a once seemingly trustworthy Privileged
                                                                                 user might go rogue; one of the most obvious reasons being for
                                                                                 financial gains.

                                                                                 This can either be straight forward theft, such as the 2007 case of a “low
Audit and Accountability – Compliance regulations (such as Sarbanes-             level” database administrator at the US banking services company
Oxley, PCI and Basel II) require organizations to provide accountability         Fidelity National Information Services who was found to have stolen 2.3
about who accessed shared accounts, what was done, and whether                   million credit card records and selling them on to a data broker.
passwords are protected and updated according to policy.
                                                                                 Another reason is plain spite; a disenchanted privileged user may
Loss of Sensitive Information – Privileged accounts usually have                 choose to wreak havoc, just because they can. A former systems
unlimited access to backend systems. Compromising such accounts                  administrator of the Swiss bank UBS, RogerDuronio, was convicted in
may lead to uncontrolled access, bypassing the normal system                     2006 of sabotaging his employers IT systems in retaliation over a
operation. For instance, this can result in manipulating billing records         compensation dispute. UBS never reported the cost of lost business, but
and loss of money.                                                               did say the attack cost the company more than $3.1 million to get the
                                                                                 system back up and running.
The theft of intellectual property by employees leaving one employer          PAMS is not just about protecting the data and intellectual property
for another is also adanger. There are many examples of “normal”              assets of the business and paying regards to the privacy of employees in
users doing this, but privileged users have even greater opportunity          general; it is also about complying with the requirements of regulators
with their wide-ranging access rights.                                        that are often explicit about privileged users in their requirements.


Solution: HCL Privileged Access
Management Services (PAMS)                                                      PAMS Benefits
To bring all this under control requires that Privileged Users are given         There are many benefits not afforded by other
unique access; their individual accounts must be the only way of
gaining access to IT systems at the Privileged User level and their
                                                                                 approaches:
individual activity, whilst operating at that level, should be monitored
and audited.
                                                                                      Privileged user accounts can be scanned for and
The access granted also needs to be modular; too often Privileged                     monitored to ensure default settings are never left
Accounts are assigned broad access rights that are far more than is                   in place.
necessary for a given individual to do their job. It is much safer to
assign fine-grained access controls at the account level. Such                        Privileges can be assigned to named users at the
“appropriate role separation” ensures privileged users cannot over
step the mark, accidentally or intentionally, and, should their accounts
                                                                                      account level on a case-by-case basis, with the
be compromised, the unauthorized user is similarly restricted. This is                appropriate granularity of access, enabling the
known as the “least privilege principle”.                                             “least privilege principle”.

                                                                                      The activity of privileged users can be
                                                                                      continuously monitored and the activities
                                                                                      recorded; the system will record who requested
                                                                                      for a password, when, and what actions they
                                                                                      took.

                                                                                      Compliance with standards and regulations can
                                                                                      be audited and proven when necessary.

                                                                                      In the event of a privileged user accountbeing
                                                                                      compromised, auditors will be able research the
                                                                                      incident forensically.

This has become especially true with the increasing use of                            For particularly sensitive systems, it ispossible to
virtualization. In the past, granting a given privileged user access to a
single physical server still gave them fairly limited access rights but, if
                                                                                      assign one-time passwords.
virtualized, there may be many different systems running on the same
server to which access is possible, if unlimited rights have been                     Dual control (maker and checker) can be enabled
granted at the physical level.                                                        when required.
A further benefit of this level of control over the assignment of
privileges in virtualized environments is that it allows competing                    Around the clock support for mission-
organizations to share the same physical resources. This is                           criticalsystems by geographically distributed
increasingly likely with the move to “cloud computing”. For the                       team scan be easily and safely enabled.
outsourcers like HCL that provide these managed services, the
granular granting of privileges and the auditing system management
activity is essential.
                                                                                      The granular granting of privileges can be
                                                                                      extended to the management of virtualized
                                                                                      environments.

                                                                                      PUM tools ease the integration of IT systemswhen
                                                                                      organizations come together followinga merger
                                                                                      or acquisition.

Mais conteúdo relacionado

Destaque

SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILEGURUDAS
 
Astral Corporate Profile
Astral Corporate ProfileAstral Corporate Profile
Astral Corporate Profileguest7daa00a
 
Selecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorSelecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorControlEng
 
Global Technical Services - Company Profile
Global Technical Services - Company ProfileGlobal Technical Services - Company Profile
Global Technical Services - Company Profilesherif fathy
 
Continuous Integration, Delivery and Deployment
Continuous Integration, Delivery and DeploymentContinuous Integration, Delivery and Deployment
Continuous Integration, Delivery and DeploymentEero Laukkanen
 
Session 3 Bss
Session 3 BssSession 3 Bss
Session 3 BssGredmill
 

Destaque (8)

C2MS
C2MSC2MS
C2MS
 
Aviosat corporate profile
Aviosat corporate profile Aviosat corporate profile
Aviosat corporate profile
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILE
 
Astral Corporate Profile
Astral Corporate ProfileAstral Corporate Profile
Astral Corporate Profile
 
Selecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorSelecting and Working with a Systems Integrator
Selecting and Working with a Systems Integrator
 
Global Technical Services - Company Profile
Global Technical Services - Company ProfileGlobal Technical Services - Company Profile
Global Technical Services - Company Profile
 
Continuous Integration, Delivery and Deployment
Continuous Integration, Delivery and DeploymentContinuous Integration, Delivery and Deployment
Continuous Integration, Delivery and Deployment
 
Session 3 Bss
Session 3 BssSession 3 Bss
Session 3 Bss
 

Mais de HCL Technologies

Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
 
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSUSING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSHCL Technologies
 
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL Technologies
 
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL Technologies
 
Noise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersNoise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersHCL Technologies
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesHCL Technologies
 
A novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraA novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraHCL Technologies
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesHCL Technologies
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimeHCL Technologies
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyHCL Technologies
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)HCL Technologies
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and DigitizationHCL Technologies
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in DigitalHCL Technologies
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...HCL Technologies
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...HCL Technologies
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...HCL Technologies
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...HCL Technologies
 

Mais de HCL Technologies (20)

Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSUSING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
 
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
 
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
 
Noise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersNoise Control of Vacuum Cleaners
Noise Control of Vacuum Cleaners
 
Comply
Comply Comply
Comply
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart Cities
 
A novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraA novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR Camera
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic Diseases
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real Time
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and Digitization
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in Digital
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
 

Último

Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 

Último (20)

Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 

HCLT Whitepaper: The Privileged Access Conundrum

  • 2. IT managers everywhere feel overwhelmed with the rising tide of IT security threats they have to deal with in the face of an increasing regulatory burden and the ever expanding vision of the IT infrastructure. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs. Not only are the challenges of privileged access moving up and down the stack from the hardware layer up to the business application level, they are also moving outside those boundaries to the cloud and virtual computing environments. Regardless of the environment, there are administrators responsible for managing those environments and privileged users with access to highly sensitive information that must be managed, monitored and controlled. The British hacker Gary McKinnon, who the US government wanted to extradite after he hacked Pentagon IT systems, gained much of his access through privileged user accounts which had been left with the default settings.
  • 3. Privileged Access Challenges Today, organizations spend a lot of resources building an infrastructure for securing the enterprise and assuring their business continuity and compliance. Every typical IT environment comprises of hundreds or thousands of servers, databases, network devices and more, all controlled and managed by a variety of privileged and shared identities – also known as break-glass, emergency or fire IDs – which are the most powerful in any organization. This includes the ‘Root’ account on UNIX/Linux, ‘Administrator’ in Windows, Cisco ‘enable’, Oracle ‘system/sys’, MSSQL ‘sa’ and many more. What is a Privileged User/Access Someone with IT permissions to These identities are often neglected; it is difficult to monitor their session activities, and passwords are rarely changed. In some cases, these identities are required not only by the internal IT personnel, but also by external third-party vendors and, thus, require extra care, such as secure remote access and secure session initiation without exposing the credentials. Powerful passwords are also often found hard-coded inside applications, scripts and parameter files, leaving them unsecured and rarely changed. Mismanagement of privileged access imposes great risks to organizations. These include the following: Insider Threat – One of the biggest concerns today is the risk of insider threat. In many organizations, the same Root or Administrator password is used across the organization, making it easier for a disgruntled insider to abruptly take down core systems. ? Access highly sensitive data Change critical IT systems Conduct high value transactions Cover their tracks in the audit trail Administrative Overhead – With hundreds of network devices, privileged access can be extremely time-consuming to manually control and report on, and more prone to human errors. Moreover, inaccessibility of such a password by an on-call administrator may cause hours of delay in recovering from system failure. Despite often being employees of a relatively low rank, the level of access to sensitive data given to Privileged users is often the highest any employees have had in the history of business. Worst still, poor practice can leave Privileged user accounts easily accessible to outsiders. So, the Privileged access issue is first about managing the Privileged user accounts and then about managing the actual Privileged users, andin many cases they are not well aligned. Why Privileged Access can turn Catastrophic There are a number of reasons a once seemingly trustworthy Privileged user might go rogue; one of the most obvious reasons being for financial gains. This can either be straight forward theft, such as the 2007 case of a “low Audit and Accountability – Compliance regulations (such as Sarbanes- level” database administrator at the US banking services company Oxley, PCI and Basel II) require organizations to provide accountability Fidelity National Information Services who was found to have stolen 2.3 about who accessed shared accounts, what was done, and whether million credit card records and selling them on to a data broker. passwords are protected and updated according to policy. Another reason is plain spite; a disenchanted privileged user may Loss of Sensitive Information – Privileged accounts usually have choose to wreak havoc, just because they can. A former systems unlimited access to backend systems. Compromising such accounts administrator of the Swiss bank UBS, RogerDuronio, was convicted in may lead to uncontrolled access, bypassing the normal system 2006 of sabotaging his employers IT systems in retaliation over a operation. For instance, this can result in manipulating billing records compensation dispute. UBS never reported the cost of lost business, but and loss of money. did say the attack cost the company more than $3.1 million to get the system back up and running.
  • 4. The theft of intellectual property by employees leaving one employer PAMS is not just about protecting the data and intellectual property for another is also adanger. There are many examples of “normal” assets of the business and paying regards to the privacy of employees in users doing this, but privileged users have even greater opportunity general; it is also about complying with the requirements of regulators with their wide-ranging access rights. that are often explicit about privileged users in their requirements. Solution: HCL Privileged Access Management Services (PAMS) PAMS Benefits To bring all this under control requires that Privileged Users are given There are many benefits not afforded by other unique access; their individual accounts must be the only way of gaining access to IT systems at the Privileged User level and their approaches: individual activity, whilst operating at that level, should be monitored and audited. Privileged user accounts can be scanned for and The access granted also needs to be modular; too often Privileged monitored to ensure default settings are never left Accounts are assigned broad access rights that are far more than is in place. necessary for a given individual to do their job. It is much safer to assign fine-grained access controls at the account level. Such Privileges can be assigned to named users at the “appropriate role separation” ensures privileged users cannot over step the mark, accidentally or intentionally, and, should their accounts account level on a case-by-case basis, with the be compromised, the unauthorized user is similarly restricted. This is appropriate granularity of access, enabling the known as the “least privilege principle”. “least privilege principle”. The activity of privileged users can be continuously monitored and the activities recorded; the system will record who requested for a password, when, and what actions they took. Compliance with standards and regulations can be audited and proven when necessary. In the event of a privileged user accountbeing compromised, auditors will be able research the incident forensically. This has become especially true with the increasing use of For particularly sensitive systems, it ispossible to virtualization. In the past, granting a given privileged user access to a single physical server still gave them fairly limited access rights but, if assign one-time passwords. virtualized, there may be many different systems running on the same server to which access is possible, if unlimited rights have been Dual control (maker and checker) can be enabled granted at the physical level. when required. A further benefit of this level of control over the assignment of privileges in virtualized environments is that it allows competing Around the clock support for mission- organizations to share the same physical resources. This is criticalsystems by geographically distributed increasingly likely with the move to “cloud computing”. For the team scan be easily and safely enabled. outsourcers like HCL that provide these managed services, the granular granting of privileges and the auditing system management activity is essential. The granular granting of privileges can be extended to the management of virtualized environments. PUM tools ease the integration of IT systemswhen organizations come together followinga merger or acquisition.