SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Design and Implementation
of Administrator Session Monitoring
© 2014 Hitachi ID Systems, Inc. All rights reserved.
Contents
1 Introduction 1
2 Business drivers for recording login sessions 1
3 Which login sessions should be recorded? 2
4 What data should be captured? 2
5 Data format and volume 3
6 Where to insert instrumentation 4
7 Visible or stealth surveillance 6
8 Tamper-proofing the recording process 6
9 Planning for network bandwidth and storage requirements 7
10 What to do in the event of a termination 7
11 Privacy protection and access controls 8
12 Summary 9
APPENDICES 10
A Hitachi ID Privileged Access Manager overview 11
B Session monitoring in Hitachi ID Privileged Access Manager 14
i
Design and Implementation of Administrator Session Monitoring
1 Introduction
This document introduces the business case for implementing a session monitoring system to record login
sessions to privileged accounts. It examines a series of technological design decisions that must be con-
sidered when developing a session monitoring system and offers guidance about how such a system might
be best deployed and managed in practice.
2 Business drivers for recording login sessions
There are three main business drivers for recording the activity of users as they sign into privileged ac-
counts:
1. Forensic audits:
In the event that an IT user is under suspicion or has been found to act unethically or illegally, it is
helpful to be able to play back all of that user’s activity, to see what inappropriate actions they may
have taken. This data may be required as supporting evidence if the user must be terminated and
may be needed in the course of legal proceedings thereafter. This data may also be needed to find
and reverse any harmful changes the user has made to systems or data.
2. Accountability:
The knowledge that their actions are being recorded and that they may be held accountable for them
may alter user behaviour for the better.
3. Knowledge sharing:
Recording user activity makes it possible to replay work. This can aid in knowledge sharing, under a
number of scenarios:
(a) A user records the steps taken to complete a task and shares this recording with peers, in the
context of training. This is intentional, planned knowledge sharing.
(b) One user accesses a recording of another’s actions from some time in the past, to learn how
a task was performed. This may be done with or without the original user’s active participation.
This is ad-hoc, after-the-fact knowledge sharing.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 1
Design and Implementation of Administrator Session Monitoring
3 Which login sessions should be recorded?
When deploying a session recording system, the first question is which sessions to record. There are
several possibilities:
1. All sessions, by all users.
2. All sessions to sensitive, by any user with access to those systems.
3. All sessions by high-risk users (i.e., users whose actions could cause harm).
The cost and impact of session recording technology directly affects how this question is answered. If cap-
turing more sessions is relatively inexpensive and if it does not noticeably slow down the work of the affected
users, then it makes sense to record more sessions. Conversely, as the cost of capture, transmission and
storage rise, the motivation to more carefully target what is and what is not recorded diminishes.
In the context of session recording of system administrators, Hitachi ID Systems recommends that all logins
to sensitive accounts should be recorded.
In the context of session recording of high-risk business users – for example, HR staff, financial traders, etc.
– Hitachi ID Systems recommends that all logins by those users, to any system, should be recorded.
Over time, as the cost of storage and bandwidth continue to decline, it may make sense to record all login
sessions by all users to all systems. Hitachi ID Systems does not recommend this approach at the time that
this document was prepared (mid-2011).
4 What data should be captured?
The data that can be recorded from a modern, graphical user interface is extensive. It includes:
1. Screen captures – i.e., image files of the contents of a single application or of a user’s graphical
desktop.
2. Process information, such as the names of and arguments passed to running programs.
3. User interface elements, such as window titles, labels and text from input fields.
4. Keyboard events, such as key presses and releases.
5. Pointer device (mouse) events, such as movement and button clicks.
6. The contents of the operating system copy buffer.
7. Filesystem events, such as mounting or detaching network drives or removable media.
8. File transfers, such as copying files from one filesystem to another.
9. Video or image streams from a video capture device such as a webcam.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 2
Design and Implementation of Administrator Session Monitoring
10. Network data transfers, such as e-mails or web pages.
At a minimum, when recording the login sessions of a user into an administrator-level account, it makes
sense to capture what they typed and what the system displayed. This means video capture as well as
capture of input from both the keyboard and copy buffer.
Regarding video capture, it may make sense to capture the user’s entire desktop, so that in the event that
the user downloaded a file with sensitive data to his computer, the recording will show what he then did
with that file? For instance, if a sensitive file was briefly examined – as would be normal in the context
of troubleshooting – and then deleted, the action can be taken to be innocuous. On the other hand, if a
sensitive file was copied to a USB flash drive or sent to the user’s personal GMail account, the action can
be interpreted as malicious.
Regarding input capture, it makes sense to capture both keyboard events and copy buffer contents. This
is because the user may have constructed commands in advance and pasted them into the login session,
without generating any keyboard events.
Finally, it may make sense to capture webcam video. This is useful in the event of serious misconduct
leading to legal proceedings. When this happens, the user in question is likely to claim that the recorded
actions were taken by someone else – i.e., “that wasn’t me – someone must have stolen my password!”
With webcam capture, this argument won’t work, since images of the user who performed the actions in
question will accompany screen captures and input events.
5 Data format and volume
There are two broad categories of data that may be captured by a session recording system:
1. High volume, unstructured data, principally video capture from the screen and possibly web camera.
2. Low volume, structured data, principally keyboard events, copy buffer contents, process IDs, UI ele-
ments, etc.
It makes sense to store the low volume data stream in a database, so that it can be manipulated and
searched.
Modern databases do not cope well with large volume data such as video. It therefore makes sense to store
only pointers to this data set in the database and store the actual raw data either on a filesystem or in a
content archiving system.
For data stored on a filesystem, the next question is how to encode it. For efficiency, it makes sense to
capture differential data (i.e., what changed from one screen capture to the next) and to compress the
data. For screen capture, lossless compression such as PNG makes sense, since the data is normally very
uniform. For web cam capture, lossy capture makes more sense, since the input stream consists of more
“natural” lighting and scenes. For this, it makes sense to capture JPEG files.
In either case, when constructing videos for playback, it is important to use standard encoding and packag-
ing, such as MPEG4 or AVI. This ensures that popular playback programs can be used.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 3
Design and Implementation of Administrator Session Monitoring
6 Where to insert instrumentation
When a user connects to a privileged account on a server, there are three basic places where the connec-
tion can be instrumented for recording:
1. On the user’s own PC.
2. On the server to which the user connects.
3. On the network in between these two endpoints.
Each of these approaches has its own pros and cons:
Monitor user PCs
Pros Cons
• Nothing to install on servers.
• Works with every type of server – operating
systems, databases, network devices,
applications, etc.
• May require software to be installed on many
computers.
• User might be able to tamper with and disable
monitoring.
• Implies uniform types of endpoint devices, or at
least a limited set of options (e.g., all Windows,
or Windows+Mac, etc.).
Monitor managed systems
Pros Cons
• Nothing to install on user PCs.
• More difficult to bypass.
• Can monitor user sessions even if they are
made directly to the console of a server, not via
a privileged access management system at all.
• Potentially destabilizing change control on
sensitive servers, to install invasive
surveillance code.
• Only compatible with a few types of servers.
For example, this approach is not likely to work
with relatively closed systems such as network
devices or with vertical market or custom
applications.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 4
Design and Implementation of Administrator Session Monitoring
Monitor network (proxy)
Pros Cons
• Nothing to install on either user endpoint
devices or servers.
• Compatible with multiple types of endpoint
devices.
• Difficult or impossible for users to disable
monitoring.
• Since a specific proxy is required for each type
of application (e.g., SSH, RDP, etc.), only
works for some types of servers.
• Quite difficult to add support for new
applications or even new versions of old
applications (e.g., new version of RDP, SSH,
SQL clients, etc.).
• Difficult or impossible to capture everything
that happens with SSH, since users can use
that to proxy other connections, including other
SSH connections.
• Session playback is a difficult problem,
especially for complex and multi-layered
client/server protocols.
• Creates a single point of failure for system
administration (the proxy).
• May introduce performance problems in
administrator sessions.
Examples can help clarify this analysis:
• Assuming a client based approach is used, which instruments Windows PCs used by administrators.
If an administrator wishes to connect to a system from a Mac or Linux PC or using a smart phone or
tablet, then monitoring of a direct connection will not be possible. Instead, assuming that monitoring
is mandatory, the user will have to first launch a connection to a Terminal Services or Citrix server and
from there – where monitoring is available – connect to the managed system.
• Assuming that a proxy-based approach is used, users will no longer be able to sign into managed
systems directly. Instead, they must connect to the proxy, which forwards their connection to the
managed system and also records it. While any protocol can be recorded this way, conversion of
a recorded data stream to a human-legible video requires a deep understanding of the protocol in
question. This means that in practice only a handful of versions of a handful of the most popular
protocols – remote desktop (RDP), secure shell (SSH), Telnet/TN3270 and perhaps some SQL variant
– will be recorded. This strictly limits the ability of the system to monitor all administrator logins, to
all systems. This approach also does not work if a user signs directly into the console of a managed
system.
• Assuming that a proxy-based approach is used, even console logins can be recorded. On the other
hand, support for only the most common and most open types of managed systems is possible – most
likely just Windows and Linux servers. Connections to network devices, applications and databases
will simply not be possible.
In practice, multiple approaches can be combined. In particular, the client-based and server-based ap-
proaches work well together as they provide lightweight and protocol-neutral session monitoring in general
plus a hard-to-bypass solution for the most sensitive servers, with the two mechanisms sharing the same
playback technology.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 5
Design and Implementation of Administrator Session Monitoring
7 Visible or stealth surveillance
With a proxy-based monitoring solution, the fact that sessions can be recorded is self-evident. This is not
necessarily true of recording on the user’s PC or on a system to which the user connects.
When a user’s login session – on the console of his own PC or connected via an application such as RDP,
SSH or SQL Studio to another system – is recorded, the recording process itself may be evident to the user
or stealthed. Stealth recording means that there are no obvious user interface elements to indicate to the
user that recording is happening. It should be noted that a sophisticated user will always be able to tell that
monitoring is happening – by inspecting the computer’s process table, network traffic or simply by noting
that the activity indicator lights up on his web cam.
In general it seems reasonable to inform users that recording is happening:
1. This is less likely to violate privacy-protection legislation.
2. Awareness of monitoring is likely to encourage business-appropriate behaviour on the part of users.
If stealthy monitoring is chosen, the process should be reviewed by an organization’s legal counsel. More-
over, an explanation should be made ready for users who detect that their logins are being recorded despite
stealth measures.
8 Tamper-proofing the recording process
When a proxy-based solution is used, there may simply be no network path that allows users to bypass the
recording system.
When monitoring is launched from a user’s PC, it should be linked to the login session, so that any inter-
ference with the monitoring process itself or with the recording data stream sent to the monitoring server
causes (a) an alarm and (b) the login session to be automatically disconnected.
When monitoring is implemented directly on a managed system, it should likewise be configured to detect
interference and automatically sign off any logged in users in the event that surveillance is interrupted.
In some cases, it may be desirable to allow users to establish and maintain login sessions even in the
event that session recording is non-functional. This may be the case in the event of a network outage that
interrupts connectivity to the session recording server, for instance. In these cases, at least a local cache of
recorded data should be maintained. A business decision must be made to choose which is more important
– the ability to sign into and manage systems, even if session recording is not available – or the assurance
that all administrative logins are recorded. It is likely that a different choice will be made on each system,
depending on how highly available that system must be versus the sensitivity of data on that system.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 6
Design and Implementation of Administrator Session Monitoring
9 Planning for network bandwidth and storage requirements
Session recordings can generate terabytes of data, mainly due to video capture. A single user whose PC is
instrumented, generating one screen shot of his desktop per second, will generate about 10 kBytes/second
of data per monitor. In comparison to this, structured data (keystroke events, etc.) adds a negligible amount
of data.
This data stream must be transmitted from the user’s PC to a central storage server and from there perhaps
replicated to a backup location. Assuming that a user’s entire work day is subject to surveillance, this
amounts to:
1. Bandwidth from user to server: 10kBytes/sec.
2. Data on server: 290MByte/day (8 hours/day); 64GByte/year (220 work days/year).
Assuming that 100 users are being monitored this scales up to:
1. Bandwidth from 100 users to a single server: 1MBytes/sec or 10MBits/sec.
2. Data on server: 29GByte/day (8 hours/day); 6.4TByte/year.
While these storage requirements are manageable with contemporary technology, if the data is replicated
this means data transfer of 29GByte/day – over a wide area network this is significant.
Assuming that 7 years of data are retained to support possible future forensic audits, this amounts to 45TB
of storage.
10 What to do in the event of a termination
Session recording is very helpful in the event that a user with access to privileged accounts has to be
terminated:
1. At the point of termination, the active communication between the user’s PC and managed systems
can be leveraged to actively disconnect any currently logged-in sessions.
2. Post termination, recent user activity can be reviewed to see if the user has taken any inappropriate
actions.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 7
Design and Implementation of Administrator Session Monitoring
11 Privacy protection and access controls
In most jurisdiction, it is reasonable for employers to monitor the activity of their employees and contractors,
so long as:
1. The surveillance takes place at the workplace.
2. The surveillance takes place on employer-owned equipment.
In some jurisdictions, there may be a third requirement, which is to make sure that users are aware of the
surveillance.
These criteria create some boundary cases which organizations should consider carefully and avoid wher-
ever possible:
1. Regarding video capture (i.e., web cam surveillance) – it is important to only enable it on corporate
computers and only when those computers are known to be physically in an employer-owned location
/ facility and perhaps even only in a location that is closed to outsiders.
2. It should be understood that if a user who can legitimately be monitored uses a corporate computer
for some private activity while at work – even where this is perfectly legitimate and reasonable – that
activity will be captured. For example, if a system administrator takes a break and does some on-line
banking, his bank account number and password may be captured along with his work.
To mitigate the risks of inappropriate compromise of employee or contractor privacy, it is essential to imple-
ment security measures to ensure that access to recordings is legitimate and authorized in all cases. Since
the simple act of performing a search on the database of recordings may yield privacy-related information, it
makes sense to authorize access to recordings in two steps: First, request and approve the right to perform
a specific search. Second, request and approve the right to retrieve the recording from a specific session.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 8
Design and Implementation of Administrator Session Monitoring
12 Summary
Session recording is a powerful technology that enables organizations to create accountability, generate
forensic audit trails and support knowledge sharing. The advent of inexpensive broadband networks and
large storage systems makes it feasible to record and archive large numbers of login sessions in detail.
When designing a session monitoring system, it is important to take into consideration compatibility with
both end user devices and back-end systems. Other parameters, such as tamper-proofing the system,
making users aware of its operation, protecting the privacy of users by controlling when recordings happen
and who can retrieve them are also all very important.
A session recording system can generate large volumes of data. Because of this, it is important to plan in
advance for the network bandwidth and storage requirements of the system.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 9
Design and Implementation of Administrator Session Monitoring
APPENDICES
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 10
Design and Implementation of Administrator Session Monitoring
A Privileged Access Manager overview
Overview:
Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts. It works by
regularly randomizing privileged passwords on workstations, servers, network devices and applications.
Random passwords are encrypted and stored on at least two replicated credential vaults. Access to privi-
leged accounts may be disclosed:
• To IT staff, after they have authenticated and their requests have been authorized.
• To applications, replacing embedded passwords.
• To Windows workstations and servers, which need them to start services.
Password changes and access disclosure are closely controlled and audited, to satisfy policy and regulatory
requirements.
Features:
Privileged Access Manager secures privileged accounts with:
• Random passwords:
Privileged Access Manager is designed to change as many as 2,000,000 passwords per day to new,
random values. This minimizes the window of opportunity that hackers and former users have to
compromise systems and applications.
• Encrypted, replicated vault:
Privileged Access Manager stores randomized passwords in an encrypted and replicated vault. This
protects against unauthorized access to passwords and against loss of access to data because of a
hardware failure or physical disaster.
• Many built-in connectors:
Privileged Access Manager ships with built-in integrations for over 110 systems and applications. That
means that it can secure access to sensitive accounts on most servers, directories, network devices,
databases and applications without customization.
• Laptop support with a local service:
Privileged Access Manager also ships with software that can be installed on laptops running Windows
or Linux. This allows it to secure access to computers that are sometimes turned off, unplugged from
the network, change IP addresses or physically removed from the premises.
• Access control policy engine:
Security officers set policy on Privileged Access Manager to control who can access which accounts.
For example, Windows administrators can be granted access to local Administrator accounts, Unix
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 11
Design and Implementation of Administrator Session Monitoring
administrators can be allowed to login as root, etc. The policy engine is very flexible, as it connects
groups of administrators to named accounts on groups of systems.
• Workflow for one-time access requests:
Privileged Access Manager includes a powerful workflow engine that allows users to request one-time
access to privileged accounts. Requests are subject to policy (who can ask, who must approve).
The workflow engine leverages e-mail to invite authorizers to act and a secure web form for approvals.
Timely response is assured by inviting multiple authorizers, sending automated reminders, escalating
requests from non-responsive authorizers to alternates and more.
• Flexible access disclosure options:
Rather than displaying passwords to users, Privileged Access Manager can:
– Launch RDP, SSH, SQL Studio, VMWare vSphere and similar sessions, injecting passwords
without displaying them.
– Temporarily attach the authorized user’s Active Directory account to a local security group on the
target Windows server.
– Temporarily attach the authorized user’s SSH public key to the authorized_users key ring on the
target Unix or Linux server.
• Session recording:
Privileged Access Manager can be configured to record screen, keyboard and other data while users
are connected to privileged accounts. The recording may be of just the window launched to connect
a user to a privileged account or of the user’s entire desktop.
The session recording system is tamper resistant – if users attempt to interrupt recording, their login
sessions to privileged accounts are disconnected and an alarm is raised.
Session recordings may be archived indefinitely and may serve a variety of purposes, ranging from
knowledge sharing and training to forensic audits. Access to recorded sessions is secured through a
combination of access control policies and workflow approvals, designed to safeguard user privacy.
The Privileged Access Manager session monitoring infrastructure is included at no extra cost. It works
using ActiveX components and does not require software to be permanently installed on user PCs.
There is no footprint on managed systems and no proxy servers are used.
Session monitoring is compatible with all administration programs and protocols, as it instruments the
administrator’s PC, rather than network traffic. Recordings can be made of SSH, RDP, vSphere, SQL
Studio and any other administrative sessions launched via Privileged Access Manager. Recordings
can include key-logging, video, webcam, copy buffer and more, based on policy settings and without
regard to the type of session (protocol, client tool) that was launched.
• Infrastructure to secure Windows service account passwords:
In addition to managing access to administrator accounts, Privileged Access Manager can randomize
passwords used to run services, scheduled jobs and other unattended processes on Windows com-
puters. It can then notify the Windows Service Control Manager, Scheduler, IIS and other components
of the new password, so that tasks can be successfully started in the future.
• An API to replace static, embedded passwords:
Privileged Access Manager exposes an API that allows one application to securely acquire a password
that will then be used to connect to another application. This mechanism is used to eliminate plaintext
passwords in application source code or text files.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 12
Design and Implementation of Administrator Session Monitoring
• Auto-discovery:
Privileged Access Manager includes an advanced infrastructure auto-discovery system, designed to
minimize both initial and ongoing configuration. This system can:
1. Extract a list of systems from AD, LDAP or other sources.
2. Apply rules to decide whether a given system should be managed.
3. Apply rules to choose a security policy to apply to each managed system.
4. Probe systems in a massively parallel fashion, to get a list of accounts, groups and services on
each one.
5. Apply rules to decide which accounts on each system should be managed.
• Reports:
Privileged Access Manager includes a variety of built-in reports, that are used to answer questions
such as:
– What computers are on the network?
– Which computers have been unresponsive during the past 30 days?
– Which administrators have signed into this computer?
– Which systems has this administrator managed?
– Who has made a large number of requests for one-off access?
Benefits:
Privileged Access Manager improves the security of privileged accounts by:
• Eliminating static, shared, well-known passwords.
• Ensuring that former IT staff cannot access sensitive infrastructure.
• Requiring strong, personal authentication of users prior to accessing privileged accounts.
• Enforcing robust policy over who can access privileged accounts.
• Recording a detailed audit trail of privileged login sessions.
Privileged Access Manager reduces the cost of managing passwords on privileged accounts by automating
the password change, storage and disclosure process.
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 13
Design and Implementation of Administrator Session Monitoring
B Session monitoring in Privileged Access Manager
Hitachi ID Privileged Access Manager session recording technology consists of:
ActiveX Recording Architecture
Session monitoring in Privileged Access Manager works by launching an ActiveX component when a login
session is established to a privileged account.
The ActiveX component, in turn, launches the administration tool the user wishes to use – terminal services
client (TSC), PuTTY or similar for SSH sessions, SQL Studio, vSphere, etc. and passes a target system
address, login ID and password into that client.
While the user is connected, the ActiveX component can capture session data – video, key-log, etc. and
stream that back to an Privileged Access Manager server. The ActiveX component also checks with the
server, to find out whether the user’s session should be terminated, for example if the allotted time has run
out or if the user’s access is being terminated intentionally.
Using an ActiveX component means that the installation footprint of Privileged Access Manager session
monitoring is minimized – there is no software to install on user PCs and no proxy server for users to
connect through.
Types of Recorded Data
The session monitoring infrastructure in Privileged Access Manager is designed to capture any combination
of the following data types:
1. Video capture: either the display window of the program launched on behalf of the authorized user
(e.g., RDP, SSH, vSphere, etc.) or that user’s entire desktop (could span multiple monitors).
2. Keystrokes – either just those entered when the launched window has focus, or all keystrokes for the
duration of the login session.
3. Snapshots from the user’s web cam (of the user, presumably).
4. Contents of the user’s copy buffer – useful if the user pastes text into an input field, such that the text
would not appear in key-log data.
5. Meta data about processes running on the user’s PC, including process name and ID, window title,
etc.
6. Meta data about user interface elements on the user’s screen, such as text prompts and the content
of input fields.
Indefinite Retention
Session recordings may be archived indefinitely and may serve a variety of purposes, ranging from knowl-
edge sharing and training to forensic audits of administrator actions. Access to recorded sessions is secured
through a combination of access control rules and workflow processes, to protect user privacy.
Tamper Proofing
© 2014 Hitachi ID Systems, Inc.. All rights reserved. 14
Design and Implementation of Administrator Session Monitoring
The session recording system is tamper resistant – if users attempt to interrupt recording, their login ses-
sions to privileged accounts are disconnected and an alarm is raised.
Privileged Access Manager can be configured to make a recording of a user’s PC for the duration of a
login session to a privileged account. This includes either video capture of either the full screen or just the
login window, key logging, recording of the contents of the copy buffer and even snapshots from the user’s
webcam.
Full screen and web cam capture
Capturing the full screen gives context for administrator actions. For example, if a user downloads a file
from a privileged account to his PC, a recording of just his login window will not show what happens next,
but a full screen recording may show the file being copied to a USB drive or uploaded to a web site.
Capturing web cam snapshots reliably links the session to the user in question. In the event of a forensic
audit, if the user claims that actions recorded and associated with his profile were performed by someone
else, perhaps after stealing his password, there will be clear evidence that it was the user in question who
performed.
Network and storage impact
The session monitor ActiveX component can generate up to about 10 kBytes/second of data, most of which
is video. On a modern PC, it will consume no more than 2% to 3% of the user’s CPU and only a very small
amount of memory.
A single Privileged Access Manager server can collect about 100 concurrent session recording data streams.
This means that a load balanced arrangement of 3 Privileged Access Manager nodes can capture sessions
from 300 IT workers simultaneously, and probably more than 500 users total, 24x7.
The data volume from a single administrator session, assuming a constant stream of data for 8 hours/day,
220 days/year, amounts to about 60GB/year. 100 concurrently active administrators whose every action is
recorded will generate about 6TB/year of data.
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
File: / pub/ wp/ documents/ sessmon-howto/ sessmon-howto-1.tex
Date: 2011-04-29

Contenu connexe

En vedette

Ejercicio tecnica vocal
Ejercicio tecnica vocalEjercicio tecnica vocal
Ejercicio tecnica vocalANAIS TIPAN
 
Проектная деятельность учащихся на уроках информатики
Проектная деятельность учащихся на уроках информатики Проектная деятельность учащихся на уроках информатики
Проектная деятельность учащихся на уроках информатики Diana Der
 
BelalOssamaAbuLabanResume2016 - Copy
BelalOssamaAbuLabanResume2016 - CopyBelalOssamaAbuLabanResume2016 - Copy
BelalOssamaAbuLabanResume2016 - Copybelal abulaban
 
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...Global Business Events
 
Value Proposition Of Thomas Jackson
Value Proposition Of Thomas JacksonValue Proposition Of Thomas Jackson
Value Proposition Of Thomas JacksonThomas Jackson
 
现代化敏捷测试工作者
现代化敏捷测试工作者现代化敏捷测试工作者
现代化敏捷测试工作者Yi Xu
 
Strategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwalStrategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwalNavin Agarwal
 
Using Social Media for Ministry
Using Social Media for MinistryUsing Social Media for Ministry
Using Social Media for MinistryJason Caston
 

En vedette (10)

Ejercicio tecnica vocal
Ejercicio tecnica vocalEjercicio tecnica vocal
Ejercicio tecnica vocal
 
Проектная деятельность учащихся на уроках информатики
Проектная деятельность учащихся на уроках информатики Проектная деятельность учащихся на уроках информатики
Проектная деятельность учащихся на уроках информатики
 
BelalOssamaAbuLabanResume2016 - Copy
BelalOssamaAbuLabanResume2016 - CopyBelalOssamaAbuLabanResume2016 - Copy
BelalOssamaAbuLabanResume2016 - Copy
 
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
 
Teleconferencias
TeleconferenciasTeleconferencias
Teleconferencias
 
Value Proposition Of Thomas Jackson
Value Proposition Of Thomas JacksonValue Proposition Of Thomas Jackson
Value Proposition Of Thomas Jackson
 
现代化敏捷测试工作者
现代化敏捷测试工作者现代化敏捷测试工作者
现代化敏捷测试工作者
 
Strategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwalStrategic consulting sm_es_green_water_navin_agarwal
Strategic consulting sm_es_green_water_navin_agarwal
 
Using Social Media for Ministry
Using Social Media for MinistryUsing Social Media for Ministry
Using Social Media for Ministry
 
Backlink service
Backlink serviceBacklink service
Backlink service
 

Plus de Hitachi ID Systems, Inc.

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 

Plus de Hitachi ID Systems, Inc. (20)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 

Dernier

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Design and Implementation of Administrator Session Monitoring

  • 1. Design and Implementation of Administrator Session Monitoring © 2014 Hitachi ID Systems, Inc. All rights reserved.
  • 2. Contents 1 Introduction 1 2 Business drivers for recording login sessions 1 3 Which login sessions should be recorded? 2 4 What data should be captured? 2 5 Data format and volume 3 6 Where to insert instrumentation 4 7 Visible or stealth surveillance 6 8 Tamper-proofing the recording process 6 9 Planning for network bandwidth and storage requirements 7 10 What to do in the event of a termination 7 11 Privacy protection and access controls 8 12 Summary 9 APPENDICES 10 A Hitachi ID Privileged Access Manager overview 11 B Session monitoring in Hitachi ID Privileged Access Manager 14 i
  • 3. Design and Implementation of Administrator Session Monitoring 1 Introduction This document introduces the business case for implementing a session monitoring system to record login sessions to privileged accounts. It examines a series of technological design decisions that must be con- sidered when developing a session monitoring system and offers guidance about how such a system might be best deployed and managed in practice. 2 Business drivers for recording login sessions There are three main business drivers for recording the activity of users as they sign into privileged ac- counts: 1. Forensic audits: In the event that an IT user is under suspicion or has been found to act unethically or illegally, it is helpful to be able to play back all of that user’s activity, to see what inappropriate actions they may have taken. This data may be required as supporting evidence if the user must be terminated and may be needed in the course of legal proceedings thereafter. This data may also be needed to find and reverse any harmful changes the user has made to systems or data. 2. Accountability: The knowledge that their actions are being recorded and that they may be held accountable for them may alter user behaviour for the better. 3. Knowledge sharing: Recording user activity makes it possible to replay work. This can aid in knowledge sharing, under a number of scenarios: (a) A user records the steps taken to complete a task and shares this recording with peers, in the context of training. This is intentional, planned knowledge sharing. (b) One user accesses a recording of another’s actions from some time in the past, to learn how a task was performed. This may be done with or without the original user’s active participation. This is ad-hoc, after-the-fact knowledge sharing. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 1
  • 4. Design and Implementation of Administrator Session Monitoring 3 Which login sessions should be recorded? When deploying a session recording system, the first question is which sessions to record. There are several possibilities: 1. All sessions, by all users. 2. All sessions to sensitive, by any user with access to those systems. 3. All sessions by high-risk users (i.e., users whose actions could cause harm). The cost and impact of session recording technology directly affects how this question is answered. If cap- turing more sessions is relatively inexpensive and if it does not noticeably slow down the work of the affected users, then it makes sense to record more sessions. Conversely, as the cost of capture, transmission and storage rise, the motivation to more carefully target what is and what is not recorded diminishes. In the context of session recording of system administrators, Hitachi ID Systems recommends that all logins to sensitive accounts should be recorded. In the context of session recording of high-risk business users – for example, HR staff, financial traders, etc. – Hitachi ID Systems recommends that all logins by those users, to any system, should be recorded. Over time, as the cost of storage and bandwidth continue to decline, it may make sense to record all login sessions by all users to all systems. Hitachi ID Systems does not recommend this approach at the time that this document was prepared (mid-2011). 4 What data should be captured? The data that can be recorded from a modern, graphical user interface is extensive. It includes: 1. Screen captures – i.e., image files of the contents of a single application or of a user’s graphical desktop. 2. Process information, such as the names of and arguments passed to running programs. 3. User interface elements, such as window titles, labels and text from input fields. 4. Keyboard events, such as key presses and releases. 5. Pointer device (mouse) events, such as movement and button clicks. 6. The contents of the operating system copy buffer. 7. Filesystem events, such as mounting or detaching network drives or removable media. 8. File transfers, such as copying files from one filesystem to another. 9. Video or image streams from a video capture device such as a webcam. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 2
  • 5. Design and Implementation of Administrator Session Monitoring 10. Network data transfers, such as e-mails or web pages. At a minimum, when recording the login sessions of a user into an administrator-level account, it makes sense to capture what they typed and what the system displayed. This means video capture as well as capture of input from both the keyboard and copy buffer. Regarding video capture, it may make sense to capture the user’s entire desktop, so that in the event that the user downloaded a file with sensitive data to his computer, the recording will show what he then did with that file? For instance, if a sensitive file was briefly examined – as would be normal in the context of troubleshooting – and then deleted, the action can be taken to be innocuous. On the other hand, if a sensitive file was copied to a USB flash drive or sent to the user’s personal GMail account, the action can be interpreted as malicious. Regarding input capture, it makes sense to capture both keyboard events and copy buffer contents. This is because the user may have constructed commands in advance and pasted them into the login session, without generating any keyboard events. Finally, it may make sense to capture webcam video. This is useful in the event of serious misconduct leading to legal proceedings. When this happens, the user in question is likely to claim that the recorded actions were taken by someone else – i.e., “that wasn’t me – someone must have stolen my password!” With webcam capture, this argument won’t work, since images of the user who performed the actions in question will accompany screen captures and input events. 5 Data format and volume There are two broad categories of data that may be captured by a session recording system: 1. High volume, unstructured data, principally video capture from the screen and possibly web camera. 2. Low volume, structured data, principally keyboard events, copy buffer contents, process IDs, UI ele- ments, etc. It makes sense to store the low volume data stream in a database, so that it can be manipulated and searched. Modern databases do not cope well with large volume data such as video. It therefore makes sense to store only pointers to this data set in the database and store the actual raw data either on a filesystem or in a content archiving system. For data stored on a filesystem, the next question is how to encode it. For efficiency, it makes sense to capture differential data (i.e., what changed from one screen capture to the next) and to compress the data. For screen capture, lossless compression such as PNG makes sense, since the data is normally very uniform. For web cam capture, lossy capture makes more sense, since the input stream consists of more “natural” lighting and scenes. For this, it makes sense to capture JPEG files. In either case, when constructing videos for playback, it is important to use standard encoding and packag- ing, such as MPEG4 or AVI. This ensures that popular playback programs can be used. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 3
  • 6. Design and Implementation of Administrator Session Monitoring 6 Where to insert instrumentation When a user connects to a privileged account on a server, there are three basic places where the connec- tion can be instrumented for recording: 1. On the user’s own PC. 2. On the server to which the user connects. 3. On the network in between these two endpoints. Each of these approaches has its own pros and cons: Monitor user PCs Pros Cons • Nothing to install on servers. • Works with every type of server – operating systems, databases, network devices, applications, etc. • May require software to be installed on many computers. • User might be able to tamper with and disable monitoring. • Implies uniform types of endpoint devices, or at least a limited set of options (e.g., all Windows, or Windows+Mac, etc.). Monitor managed systems Pros Cons • Nothing to install on user PCs. • More difficult to bypass. • Can monitor user sessions even if they are made directly to the console of a server, not via a privileged access management system at all. • Potentially destabilizing change control on sensitive servers, to install invasive surveillance code. • Only compatible with a few types of servers. For example, this approach is not likely to work with relatively closed systems such as network devices or with vertical market or custom applications. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 4
  • 7. Design and Implementation of Administrator Session Monitoring Monitor network (proxy) Pros Cons • Nothing to install on either user endpoint devices or servers. • Compatible with multiple types of endpoint devices. • Difficult or impossible for users to disable monitoring. • Since a specific proxy is required for each type of application (e.g., SSH, RDP, etc.), only works for some types of servers. • Quite difficult to add support for new applications or even new versions of old applications (e.g., new version of RDP, SSH, SQL clients, etc.). • Difficult or impossible to capture everything that happens with SSH, since users can use that to proxy other connections, including other SSH connections. • Session playback is a difficult problem, especially for complex and multi-layered client/server protocols. • Creates a single point of failure for system administration (the proxy). • May introduce performance problems in administrator sessions. Examples can help clarify this analysis: • Assuming a client based approach is used, which instruments Windows PCs used by administrators. If an administrator wishes to connect to a system from a Mac or Linux PC or using a smart phone or tablet, then monitoring of a direct connection will not be possible. Instead, assuming that monitoring is mandatory, the user will have to first launch a connection to a Terminal Services or Citrix server and from there – where monitoring is available – connect to the managed system. • Assuming that a proxy-based approach is used, users will no longer be able to sign into managed systems directly. Instead, they must connect to the proxy, which forwards their connection to the managed system and also records it. While any protocol can be recorded this way, conversion of a recorded data stream to a human-legible video requires a deep understanding of the protocol in question. This means that in practice only a handful of versions of a handful of the most popular protocols – remote desktop (RDP), secure shell (SSH), Telnet/TN3270 and perhaps some SQL variant – will be recorded. This strictly limits the ability of the system to monitor all administrator logins, to all systems. This approach also does not work if a user signs directly into the console of a managed system. • Assuming that a proxy-based approach is used, even console logins can be recorded. On the other hand, support for only the most common and most open types of managed systems is possible – most likely just Windows and Linux servers. Connections to network devices, applications and databases will simply not be possible. In practice, multiple approaches can be combined. In particular, the client-based and server-based ap- proaches work well together as they provide lightweight and protocol-neutral session monitoring in general plus a hard-to-bypass solution for the most sensitive servers, with the two mechanisms sharing the same playback technology. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 5
  • 8. Design and Implementation of Administrator Session Monitoring 7 Visible or stealth surveillance With a proxy-based monitoring solution, the fact that sessions can be recorded is self-evident. This is not necessarily true of recording on the user’s PC or on a system to which the user connects. When a user’s login session – on the console of his own PC or connected via an application such as RDP, SSH or SQL Studio to another system – is recorded, the recording process itself may be evident to the user or stealthed. Stealth recording means that there are no obvious user interface elements to indicate to the user that recording is happening. It should be noted that a sophisticated user will always be able to tell that monitoring is happening – by inspecting the computer’s process table, network traffic or simply by noting that the activity indicator lights up on his web cam. In general it seems reasonable to inform users that recording is happening: 1. This is less likely to violate privacy-protection legislation. 2. Awareness of monitoring is likely to encourage business-appropriate behaviour on the part of users. If stealthy monitoring is chosen, the process should be reviewed by an organization’s legal counsel. More- over, an explanation should be made ready for users who detect that their logins are being recorded despite stealth measures. 8 Tamper-proofing the recording process When a proxy-based solution is used, there may simply be no network path that allows users to bypass the recording system. When monitoring is launched from a user’s PC, it should be linked to the login session, so that any inter- ference with the monitoring process itself or with the recording data stream sent to the monitoring server causes (a) an alarm and (b) the login session to be automatically disconnected. When monitoring is implemented directly on a managed system, it should likewise be configured to detect interference and automatically sign off any logged in users in the event that surveillance is interrupted. In some cases, it may be desirable to allow users to establish and maintain login sessions even in the event that session recording is non-functional. This may be the case in the event of a network outage that interrupts connectivity to the session recording server, for instance. In these cases, at least a local cache of recorded data should be maintained. A business decision must be made to choose which is more important – the ability to sign into and manage systems, even if session recording is not available – or the assurance that all administrative logins are recorded. It is likely that a different choice will be made on each system, depending on how highly available that system must be versus the sensitivity of data on that system. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 6
  • 9. Design and Implementation of Administrator Session Monitoring 9 Planning for network bandwidth and storage requirements Session recordings can generate terabytes of data, mainly due to video capture. A single user whose PC is instrumented, generating one screen shot of his desktop per second, will generate about 10 kBytes/second of data per monitor. In comparison to this, structured data (keystroke events, etc.) adds a negligible amount of data. This data stream must be transmitted from the user’s PC to a central storage server and from there perhaps replicated to a backup location. Assuming that a user’s entire work day is subject to surveillance, this amounts to: 1. Bandwidth from user to server: 10kBytes/sec. 2. Data on server: 290MByte/day (8 hours/day); 64GByte/year (220 work days/year). Assuming that 100 users are being monitored this scales up to: 1. Bandwidth from 100 users to a single server: 1MBytes/sec or 10MBits/sec. 2. Data on server: 29GByte/day (8 hours/day); 6.4TByte/year. While these storage requirements are manageable with contemporary technology, if the data is replicated this means data transfer of 29GByte/day – over a wide area network this is significant. Assuming that 7 years of data are retained to support possible future forensic audits, this amounts to 45TB of storage. 10 What to do in the event of a termination Session recording is very helpful in the event that a user with access to privileged accounts has to be terminated: 1. At the point of termination, the active communication between the user’s PC and managed systems can be leveraged to actively disconnect any currently logged-in sessions. 2. Post termination, recent user activity can be reviewed to see if the user has taken any inappropriate actions. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 7
  • 10. Design and Implementation of Administrator Session Monitoring 11 Privacy protection and access controls In most jurisdiction, it is reasonable for employers to monitor the activity of their employees and contractors, so long as: 1. The surveillance takes place at the workplace. 2. The surveillance takes place on employer-owned equipment. In some jurisdictions, there may be a third requirement, which is to make sure that users are aware of the surveillance. These criteria create some boundary cases which organizations should consider carefully and avoid wher- ever possible: 1. Regarding video capture (i.e., web cam surveillance) – it is important to only enable it on corporate computers and only when those computers are known to be physically in an employer-owned location / facility and perhaps even only in a location that is closed to outsiders. 2. It should be understood that if a user who can legitimately be monitored uses a corporate computer for some private activity while at work – even where this is perfectly legitimate and reasonable – that activity will be captured. For example, if a system administrator takes a break and does some on-line banking, his bank account number and password may be captured along with his work. To mitigate the risks of inappropriate compromise of employee or contractor privacy, it is essential to imple- ment security measures to ensure that access to recordings is legitimate and authorized in all cases. Since the simple act of performing a search on the database of recordings may yield privacy-related information, it makes sense to authorize access to recordings in two steps: First, request and approve the right to perform a specific search. Second, request and approve the right to retrieve the recording from a specific session. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 8
  • 11. Design and Implementation of Administrator Session Monitoring 12 Summary Session recording is a powerful technology that enables organizations to create accountability, generate forensic audit trails and support knowledge sharing. The advent of inexpensive broadband networks and large storage systems makes it feasible to record and archive large numbers of login sessions in detail. When designing a session monitoring system, it is important to take into consideration compatibility with both end user devices and back-end systems. Other parameters, such as tamper-proofing the system, making users aware of its operation, protecting the privacy of users by controlling when recordings happen and who can retrieve them are also all very important. A session recording system can generate large volumes of data. Because of this, it is important to plan in advance for the network bandwidth and storage requirements of the system. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 9
  • 12. Design and Implementation of Administrator Session Monitoring APPENDICES © 2014 Hitachi ID Systems, Inc.. All rights reserved. 10
  • 13. Design and Implementation of Administrator Session Monitoring A Privileged Access Manager overview Overview: Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications. Random passwords are encrypted and stored on at least two replicated credential vaults. Access to privi- leged accounts may be disclosed: • To IT staff, after they have authenticated and their requests have been authorized. • To applications, replacing embedded passwords. • To Windows workstations and servers, which need them to start services. Password changes and access disclosure are closely controlled and audited, to satisfy policy and regulatory requirements. Features: Privileged Access Manager secures privileged accounts with: • Random passwords: Privileged Access Manager is designed to change as many as 2,000,000 passwords per day to new, random values. This minimizes the window of opportunity that hackers and former users have to compromise systems and applications. • Encrypted, replicated vault: Privileged Access Manager stores randomized passwords in an encrypted and replicated vault. This protects against unauthorized access to passwords and against loss of access to data because of a hardware failure or physical disaster. • Many built-in connectors: Privileged Access Manager ships with built-in integrations for over 110 systems and applications. That means that it can secure access to sensitive accounts on most servers, directories, network devices, databases and applications without customization. • Laptop support with a local service: Privileged Access Manager also ships with software that can be installed on laptops running Windows or Linux. This allows it to secure access to computers that are sometimes turned off, unplugged from the network, change IP addresses or physically removed from the premises. • Access control policy engine: Security officers set policy on Privileged Access Manager to control who can access which accounts. For example, Windows administrators can be granted access to local Administrator accounts, Unix © 2014 Hitachi ID Systems, Inc.. All rights reserved. 11
  • 14. Design and Implementation of Administrator Session Monitoring administrators can be allowed to login as root, etc. The policy engine is very flexible, as it connects groups of administrators to named accounts on groups of systems. • Workflow for one-time access requests: Privileged Access Manager includes a powerful workflow engine that allows users to request one-time access to privileged accounts. Requests are subject to policy (who can ask, who must approve). The workflow engine leverages e-mail to invite authorizers to act and a secure web form for approvals. Timely response is assured by inviting multiple authorizers, sending automated reminders, escalating requests from non-responsive authorizers to alternates and more. • Flexible access disclosure options: Rather than displaying passwords to users, Privileged Access Manager can: – Launch RDP, SSH, SQL Studio, VMWare vSphere and similar sessions, injecting passwords without displaying them. – Temporarily attach the authorized user’s Active Directory account to a local security group on the target Windows server. – Temporarily attach the authorized user’s SSH public key to the authorized_users key ring on the target Unix or Linux server. • Session recording: Privileged Access Manager can be configured to record screen, keyboard and other data while users are connected to privileged accounts. The recording may be of just the window launched to connect a user to a privileged account or of the user’s entire desktop. The session recording system is tamper resistant – if users attempt to interrupt recording, their login sessions to privileged accounts are disconnected and an alarm is raised. Session recordings may be archived indefinitely and may serve a variety of purposes, ranging from knowledge sharing and training to forensic audits. Access to recorded sessions is secured through a combination of access control policies and workflow approvals, designed to safeguard user privacy. The Privileged Access Manager session monitoring infrastructure is included at no extra cost. It works using ActiveX components and does not require software to be permanently installed on user PCs. There is no footprint on managed systems and no proxy servers are used. Session monitoring is compatible with all administration programs and protocols, as it instruments the administrator’s PC, rather than network traffic. Recordings can be made of SSH, RDP, vSphere, SQL Studio and any other administrative sessions launched via Privileged Access Manager. Recordings can include key-logging, video, webcam, copy buffer and more, based on policy settings and without regard to the type of session (protocol, client tool) that was launched. • Infrastructure to secure Windows service account passwords: In addition to managing access to administrator accounts, Privileged Access Manager can randomize passwords used to run services, scheduled jobs and other unattended processes on Windows com- puters. It can then notify the Windows Service Control Manager, Scheduler, IIS and other components of the new password, so that tasks can be successfully started in the future. • An API to replace static, embedded passwords: Privileged Access Manager exposes an API that allows one application to securely acquire a password that will then be used to connect to another application. This mechanism is used to eliminate plaintext passwords in application source code or text files. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 12
  • 15. Design and Implementation of Administrator Session Monitoring • Auto-discovery: Privileged Access Manager includes an advanced infrastructure auto-discovery system, designed to minimize both initial and ongoing configuration. This system can: 1. Extract a list of systems from AD, LDAP or other sources. 2. Apply rules to decide whether a given system should be managed. 3. Apply rules to choose a security policy to apply to each managed system. 4. Probe systems in a massively parallel fashion, to get a list of accounts, groups and services on each one. 5. Apply rules to decide which accounts on each system should be managed. • Reports: Privileged Access Manager includes a variety of built-in reports, that are used to answer questions such as: – What computers are on the network? – Which computers have been unresponsive during the past 30 days? – Which administrators have signed into this computer? – Which systems has this administrator managed? – Who has made a large number of requests for one-off access? Benefits: Privileged Access Manager improves the security of privileged accounts by: • Eliminating static, shared, well-known passwords. • Ensuring that former IT staff cannot access sensitive infrastructure. • Requiring strong, personal authentication of users prior to accessing privileged accounts. • Enforcing robust policy over who can access privileged accounts. • Recording a detailed audit trail of privileged login sessions. Privileged Access Manager reduces the cost of managing passwords on privileged accounts by automating the password change, storage and disclosure process. © 2014 Hitachi ID Systems, Inc.. All rights reserved. 13
  • 16. Design and Implementation of Administrator Session Monitoring B Session monitoring in Privileged Access Manager Hitachi ID Privileged Access Manager session recording technology consists of: ActiveX Recording Architecture Session monitoring in Privileged Access Manager works by launching an ActiveX component when a login session is established to a privileged account. The ActiveX component, in turn, launches the administration tool the user wishes to use – terminal services client (TSC), PuTTY or similar for SSH sessions, SQL Studio, vSphere, etc. and passes a target system address, login ID and password into that client. While the user is connected, the ActiveX component can capture session data – video, key-log, etc. and stream that back to an Privileged Access Manager server. The ActiveX component also checks with the server, to find out whether the user’s session should be terminated, for example if the allotted time has run out or if the user’s access is being terminated intentionally. Using an ActiveX component means that the installation footprint of Privileged Access Manager session monitoring is minimized – there is no software to install on user PCs and no proxy server for users to connect through. Types of Recorded Data The session monitoring infrastructure in Privileged Access Manager is designed to capture any combination of the following data types: 1. Video capture: either the display window of the program launched on behalf of the authorized user (e.g., RDP, SSH, vSphere, etc.) or that user’s entire desktop (could span multiple monitors). 2. Keystrokes – either just those entered when the launched window has focus, or all keystrokes for the duration of the login session. 3. Snapshots from the user’s web cam (of the user, presumably). 4. Contents of the user’s copy buffer – useful if the user pastes text into an input field, such that the text would not appear in key-log data. 5. Meta data about processes running on the user’s PC, including process name and ID, window title, etc. 6. Meta data about user interface elements on the user’s screen, such as text prompts and the content of input fields. Indefinite Retention Session recordings may be archived indefinitely and may serve a variety of purposes, ranging from knowl- edge sharing and training to forensic audits of administrator actions. Access to recorded sessions is secured through a combination of access control rules and workflow processes, to protect user privacy. Tamper Proofing © 2014 Hitachi ID Systems, Inc.. All rights reserved. 14
  • 17. Design and Implementation of Administrator Session Monitoring The session recording system is tamper resistant – if users attempt to interrupt recording, their login ses- sions to privileged accounts are disconnected and an alarm is raised. Privileged Access Manager can be configured to make a recording of a user’s PC for the duration of a login session to a privileged account. This includes either video capture of either the full screen or just the login window, key logging, recording of the contents of the copy buffer and even snapshots from the user’s webcam. Full screen and web cam capture Capturing the full screen gives context for administrator actions. For example, if a user downloads a file from a privileged account to his PC, a recording of just his login window will not show what happens next, but a full screen recording may show the file being copied to a USB drive or uploaded to a web site. Capturing web cam snapshots reliably links the session to the user in question. In the event of a forensic audit, if the user claims that actions recorded and associated with his profile were performed by someone else, perhaps after stealing his password, there will be clear evidence that it was the user in question who performed. Network and storage impact The session monitor ActiveX component can generate up to about 10 kBytes/second of data, most of which is video. On a modern PC, it will consume no more than 2% to 3% of the user’s CPU and only a very small amount of memory. A single Privileged Access Manager server can collect about 100 concurrent session recording data streams. This means that a load balanced arrangement of 3 Privileged Access Manager nodes can capture sessions from 300 IT workers simultaneously, and probably more than 500 users total, 24x7. The data volume from a single administrator session, assuming a constant stream of data for 8 hours/day, 220 days/year, amounts to about 60GB/year. 100 concurrently active administrators whose every action is recorded will generate about 6TB/year of data. www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com File: / pub/ wp/ documents/ sessmon-howto/ sessmon-howto-1.tex Date: 2011-04-29