SlideShare une entreprise Scribd logo
1  sur  4
SOLVING




The Privileged Access Conundrum
IT managers everywhere feel overwhelmed with the rising
tide of IT security threats they have to deal with in the face of
an increasing regulatory burden and the ever expanding
vision of the IT infrastructure. It is not surprising then that they
tend to overlook one particular area of IT security, which is the
privileged access that they grant to themselves and/or their
colleagues in order to do their jobs. Not only are the
challenges of privileged access moving up and down the
stack from the hardware layer up to the business application
level, they are also moving outside those boundaries to the
cloud and virtual computing environments. Regardless of the
environment, there are administrators responsible for
managing those environments and privileged users with
access to highly sensitive information that must be managed,
monitored and controlled.



The British hacker Gary McKinnon, who the US government
wanted to extradite after he hacked Pentagon IT systems,
gained much of his access through privileged user accounts
which had been left with the default settings.
Privileged
Access Challenges
Today, organizations spend a lot of resources building an infrastructure
for securing the enterprise and assuring their business continuity and
compliance. Every typical IT environment comprises of hundreds or
thousands of servers, databases, network devices and more, all
controlled and managed by a variety of privileged and shared
identities – also known as break-glass, emergency or fire IDs – which
are the most powerful in any organization. This includes the ‘Root’
account on UNIX/Linux, ‘Administrator’ in Windows, Cisco ‘enable’,
Oracle ‘system/sys’, MSSQL ‘sa’ and many more.
                                                                          What is a Privileged
                                                                           User/Access
                                                                             Someone with IT permissions to




These identities are often neglected; it is difficult to monitor their session
activities, and passwords are rarely changed. In some cases, these
identities are required not only by the internal IT personnel, but also by
external third-party vendors and, thus, require extra care, such as
secure remote access and secure session initiation without exposing the
credentials. Powerful passwords are also often found hard-coded
inside applications, scripts and parameter files, leaving them
unsecured and rarely changed. Mismanagement of privileged access
imposes great risks to organizations. These include the following:

Insider Threat – One of the biggest concerns today is the risk of insider
threat. In many organizations, the same Root or Administrator
password is used across the organization, making it easier for a
disgruntled insider to abruptly take down core systems.
                                                                                                            ?
                                                                                 Access highly sensitive data
                                                                                 Change critical IT systems
                                                                                 Conduct high value transactions
                                                                                 Cover their tracks in the audit trail




                                                                                 Administrative Overhead – With hundreds of network devices,
                                                                                 privileged access can be extremely time-consuming to manually control
                                                                                 and report on, and more prone to human errors. Moreover,
                                                                                 inaccessibility of such a password by an on-call administrator may
                                                                                 cause hours of delay in recovering from system failure.

                                                                                 Despite often being employees of a relatively low rank, the level of
                                                                                 access to sensitive data given to Privileged users is often the highest any
                                                                                 employees have had in the history of business. Worst still, poor practice
                                                                                 can leave Privileged user accounts easily accessible to outsiders. So, the
                                                                                 Privileged access issue is first about managing the Privileged user
                                                                                 accounts and then about managing the actual Privileged users, andin
                                                                                 many cases they are not well aligned.




                                                                                 Why Privileged Access can turn
                                                                                 Catastrophic
                                                                                 There are a number of reasons a once seemingly trustworthy Privileged
                                                                                 user might go rogue; one of the most obvious reasons being for
                                                                                 financial gains.

                                                                                 This can either be straight forward theft, such as the 2007 case of a “low
Audit and Accountability – Compliance regulations (such as Sarbanes-             level” database administrator at the US banking services company
Oxley, PCI and Basel II) require organizations to provide accountability         Fidelity National Information Services who was found to have stolen 2.3
about who accessed shared accounts, what was done, and whether                   million credit card records and selling them on to a data broker.
passwords are protected and updated according to policy.
                                                                                 Another reason is plain spite; a disenchanted privileged user may
Loss of Sensitive Information – Privileged accounts usually have                 choose to wreak havoc, just because they can. A former systems
unlimited access to backend systems. Compromising such accounts                  administrator of the Swiss bank UBS, RogerDuronio, was convicted in
may lead to uncontrolled access, bypassing the normal system                     2006 of sabotaging his employers IT systems in retaliation over a
operation. For instance, this can result in manipulating billing records         compensation dispute. UBS never reported the cost of lost business, but
and loss of money.                                                               did say the attack cost the company more than $3.1 million to get the
                                                                                 system back up and running.
The theft of intellectual property by employees leaving one employer          PAMS is not just about protecting the data and intellectual property
for another is also adanger. There are many examples of “normal”              assets of the business and paying regards to the privacy of employees in
users doing this, but privileged users have even greater opportunity          general; it is also about complying with the requirements of regulators
with their wide-ranging access rights.                                        that are often explicit about privileged users in their requirements.


Solution: HCL Privileged Access
Management Services (PAMS)                                                      PAMS Benefits
To bring all this under control requires that Privileged Users are given         There are many benefits not afforded by other
unique access; their individual accounts must be the only way of
gaining access to IT systems at the Privileged User level and their
                                                                                 approaches:
individual activity, whilst operating at that level, should be monitored
and audited.
                                                                                      Privileged user accounts can be scanned for and
The access granted also needs to be modular; too often Privileged                     monitored to ensure default settings are never left
Accounts are assigned broad access rights that are far more than is                   in place.
necessary for a given individual to do their job. It is much safer to
assign fine-grained access controls at the account level. Such                        Privileges can be assigned to named users at the
“appropriate role separation” ensures privileged users cannot over
step the mark, accidentally or intentionally, and, should their accounts
                                                                                      account level on a case-by-case basis, with the
be compromised, the unauthorized user is similarly restricted. This is                appropriate granularity of access, enabling the
known as the “least privilege principle”.                                             “least privilege principle”.

                                                                                      The activity of privileged users can be
                                                                                      continuously monitored and the activities
                                                                                      recorded; the system will record who requested
                                                                                      for a password, when, and what actions they
                                                                                      took.

                                                                                      Compliance with standards and regulations can
                                                                                      be audited and proven when necessary.

                                                                                      In the event of a privileged user accountbeing
                                                                                      compromised, auditors will be able research the
                                                                                      incident forensically.

This has become especially true with the increasing use of                            For particularly sensitive systems, it ispossible to
virtualization. In the past, granting a given privileged user access to a
single physical server still gave them fairly limited access rights but, if
                                                                                      assign one-time passwords.
virtualized, there may be many different systems running on the same
server to which access is possible, if unlimited rights have been                     Dual control (maker and checker) can be enabled
granted at the physical level.                                                        when required.
A further benefit of this level of control over the assignment of
privileges in virtualized environments is that it allows competing                    Around the clock support for mission-
organizations to share the same physical resources. This is                           criticalsystems by geographically distributed
increasingly likely with the move to “cloud computing”. For the                       team scan be easily and safely enabled.
outsourcers like HCL that provide these managed services, the
granular granting of privileges and the auditing system management
activity is essential.
                                                                                      The granular granting of privileges can be
                                                                                      extended to the management of virtualized
                                                                                      environments.

                                                                                      PUM tools ease the integration of IT systemswhen
                                                                                      organizations come together followinga merger
                                                                                      or acquisition.

Contenu connexe

En vedette

SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILEGURUDAS
 
Astral Corporate Profile
Astral Corporate ProfileAstral Corporate Profile
Astral Corporate Profileguest7daa00a
 
Selecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorSelecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorControlEng
 
Global Technical Services - Company Profile
Global Technical Services - Company ProfileGlobal Technical Services - Company Profile
Global Technical Services - Company Profilesherif fathy
 
Continuous Integration, Delivery and Deployment
Continuous Integration, Delivery and DeploymentContinuous Integration, Delivery and Deployment
Continuous Integration, Delivery and DeploymentEero Laukkanen
 
Session 3 Bss
Session 3 BssSession 3 Bss
Session 3 BssGredmill
 

En vedette (8)

C2MS
C2MSC2MS
C2MS
 
Aviosat corporate profile
Aviosat corporate profile Aviosat corporate profile
Aviosat corporate profile
 
SMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILESMARTGUARD SYSTEMS PROFILE
SMARTGUARD SYSTEMS PROFILE
 
Astral Corporate Profile
Astral Corporate ProfileAstral Corporate Profile
Astral Corporate Profile
 
Selecting and Working with a Systems Integrator
Selecting and Working with a Systems IntegratorSelecting and Working with a Systems Integrator
Selecting and Working with a Systems Integrator
 
Global Technical Services - Company Profile
Global Technical Services - Company ProfileGlobal Technical Services - Company Profile
Global Technical Services - Company Profile
 
Continuous Integration, Delivery and Deployment
Continuous Integration, Delivery and DeploymentContinuous Integration, Delivery and Deployment
Continuous Integration, Delivery and Deployment
 
Session 3 Bss
Session 3 BssSession 3 Bss
Session 3 Bss
 

Plus de HCL Technologies

Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
 
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSUSING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSHCL Technologies
 
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL Technologies
 
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL Technologies
 
Noise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersNoise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersHCL Technologies
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesHCL Technologies
 
A novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraA novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraHCL Technologies
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devicesHCL Technologies
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesHCL Technologies
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimeHCL Technologies
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyHCL Technologies
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)HCL Technologies
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and DigitizationHCL Technologies
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in DigitalHCL Technologies
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...HCL Technologies
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...HCL Technologies
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...HCL Technologies
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...HCL Technologies
 

Plus de HCL Technologies (20)

Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICSUSING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
USING FACTORY DESIGN PATTERNS IN MAP REDUCE DESIGN FOR BIG DATA ANALYTICS
 
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
HCL HELPS A US BASED WIRELINE TELECOM OPERATOR FOR BETTER LEAD-TO-CASH AND TH...
 
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
HCL HELPS A LEADING US TELECOM PROTECT ITS MARKET SHARE AND MAINTAIN HIGH LEV...
 
Noise Control of Vacuum Cleaners
Noise Control of Vacuum CleanersNoise Control of Vacuum Cleaners
Noise Control of Vacuum Cleaners
 
Comply
Comply Comply
Comply
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart Cities
 
A novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR CameraA novel approach towards a Smarter DSLR Camera
A novel approach towards a Smarter DSLR Camera
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
A Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic DiseasesA Sigh of Relief for Patients with Chronic Diseases
A Sigh of Relief for Patients with Chronic Diseases
 
Painting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real TimePainting a Social & Mobile Picture in Real Time
Painting a Social & Mobile Picture in Real Time
 
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based MethodologyA Novel Design Approach for Electronic Equipment - FEA Based Methodology
A Novel Design Approach for Electronic Equipment - FEA Based Methodology
 
Intrusion Detection System (IDS)
Intrusion Detection System (IDS)Intrusion Detection System (IDS)
Intrusion Detection System (IDS)
 
Manufacturing Automation and Digitization
Manufacturing Automation and DigitizationManufacturing Automation and Digitization
Manufacturing Automation and Digitization
 
Managing Customer Care in Digital
Managing Customer Care in DigitalManaging Customer Care in Digital
Managing Customer Care in Digital
 
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
Digital Customer Care Solutions, Smart Customer Care Solutions, Next Gen Cust...
 
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
The Internet of Things. Wharton Guest Lecture by Sandeep Kishore – Corporate ...
 
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
Be Digital or Be Extinct. Wharton Guest Lecture by Sandeep Kishore – Corporat...
 
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
Transform and Modernize -UK's leading specialists in Pension and Employee Ben...
 

Dernier

UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...pr788182
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistanvineshkumarsajnani12
 

Dernier (20)

UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 

HCLT Whitepaper: The Privileged Access Conundrum

  • 2. IT managers everywhere feel overwhelmed with the rising tide of IT security threats they have to deal with in the face of an increasing regulatory burden and the ever expanding vision of the IT infrastructure. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs. Not only are the challenges of privileged access moving up and down the stack from the hardware layer up to the business application level, they are also moving outside those boundaries to the cloud and virtual computing environments. Regardless of the environment, there are administrators responsible for managing those environments and privileged users with access to highly sensitive information that must be managed, monitored and controlled. The British hacker Gary McKinnon, who the US government wanted to extradite after he hacked Pentagon IT systems, gained much of his access through privileged user accounts which had been left with the default settings.
  • 3. Privileged Access Challenges Today, organizations spend a lot of resources building an infrastructure for securing the enterprise and assuring their business continuity and compliance. Every typical IT environment comprises of hundreds or thousands of servers, databases, network devices and more, all controlled and managed by a variety of privileged and shared identities – also known as break-glass, emergency or fire IDs – which are the most powerful in any organization. This includes the ‘Root’ account on UNIX/Linux, ‘Administrator’ in Windows, Cisco ‘enable’, Oracle ‘system/sys’, MSSQL ‘sa’ and many more. What is a Privileged User/Access Someone with IT permissions to These identities are often neglected; it is difficult to monitor their session activities, and passwords are rarely changed. In some cases, these identities are required not only by the internal IT personnel, but also by external third-party vendors and, thus, require extra care, such as secure remote access and secure session initiation without exposing the credentials. Powerful passwords are also often found hard-coded inside applications, scripts and parameter files, leaving them unsecured and rarely changed. Mismanagement of privileged access imposes great risks to organizations. These include the following: Insider Threat – One of the biggest concerns today is the risk of insider threat. In many organizations, the same Root or Administrator password is used across the organization, making it easier for a disgruntled insider to abruptly take down core systems. ? Access highly sensitive data Change critical IT systems Conduct high value transactions Cover their tracks in the audit trail Administrative Overhead – With hundreds of network devices, privileged access can be extremely time-consuming to manually control and report on, and more prone to human errors. Moreover, inaccessibility of such a password by an on-call administrator may cause hours of delay in recovering from system failure. Despite often being employees of a relatively low rank, the level of access to sensitive data given to Privileged users is often the highest any employees have had in the history of business. Worst still, poor practice can leave Privileged user accounts easily accessible to outsiders. So, the Privileged access issue is first about managing the Privileged user accounts and then about managing the actual Privileged users, andin many cases they are not well aligned. Why Privileged Access can turn Catastrophic There are a number of reasons a once seemingly trustworthy Privileged user might go rogue; one of the most obvious reasons being for financial gains. This can either be straight forward theft, such as the 2007 case of a “low Audit and Accountability – Compliance regulations (such as Sarbanes- level” database administrator at the US banking services company Oxley, PCI and Basel II) require organizations to provide accountability Fidelity National Information Services who was found to have stolen 2.3 about who accessed shared accounts, what was done, and whether million credit card records and selling them on to a data broker. passwords are protected and updated according to policy. Another reason is plain spite; a disenchanted privileged user may Loss of Sensitive Information – Privileged accounts usually have choose to wreak havoc, just because they can. A former systems unlimited access to backend systems. Compromising such accounts administrator of the Swiss bank UBS, RogerDuronio, was convicted in may lead to uncontrolled access, bypassing the normal system 2006 of sabotaging his employers IT systems in retaliation over a operation. For instance, this can result in manipulating billing records compensation dispute. UBS never reported the cost of lost business, but and loss of money. did say the attack cost the company more than $3.1 million to get the system back up and running.
  • 4. The theft of intellectual property by employees leaving one employer PAMS is not just about protecting the data and intellectual property for another is also adanger. There are many examples of “normal” assets of the business and paying regards to the privacy of employees in users doing this, but privileged users have even greater opportunity general; it is also about complying with the requirements of regulators with their wide-ranging access rights. that are often explicit about privileged users in their requirements. Solution: HCL Privileged Access Management Services (PAMS) PAMS Benefits To bring all this under control requires that Privileged Users are given There are many benefits not afforded by other unique access; their individual accounts must be the only way of gaining access to IT systems at the Privileged User level and their approaches: individual activity, whilst operating at that level, should be monitored and audited. Privileged user accounts can be scanned for and The access granted also needs to be modular; too often Privileged monitored to ensure default settings are never left Accounts are assigned broad access rights that are far more than is in place. necessary for a given individual to do their job. It is much safer to assign fine-grained access controls at the account level. Such Privileges can be assigned to named users at the “appropriate role separation” ensures privileged users cannot over step the mark, accidentally or intentionally, and, should their accounts account level on a case-by-case basis, with the be compromised, the unauthorized user is similarly restricted. This is appropriate granularity of access, enabling the known as the “least privilege principle”. “least privilege principle”. The activity of privileged users can be continuously monitored and the activities recorded; the system will record who requested for a password, when, and what actions they took. Compliance with standards and regulations can be audited and proven when necessary. In the event of a privileged user accountbeing compromised, auditors will be able research the incident forensically. This has become especially true with the increasing use of For particularly sensitive systems, it ispossible to virtualization. In the past, granting a given privileged user access to a single physical server still gave them fairly limited access rights but, if assign one-time passwords. virtualized, there may be many different systems running on the same server to which access is possible, if unlimited rights have been Dual control (maker and checker) can be enabled granted at the physical level. when required. A further benefit of this level of control over the assignment of privileges in virtualized environments is that it allows competing Around the clock support for mission- organizations to share the same physical resources. This is criticalsystems by geographically distributed increasingly likely with the move to “cloud computing”. For the team scan be easily and safely enabled. outsourcers like HCL that provide these managed services, the granular granting of privileges and the auditing system management activity is essential. The granular granting of privileges can be extended to the management of virtualized environments. PUM tools ease the integration of IT systemswhen organizations come together followinga merger or acquisition.