SlideShare une entreprise Scribd logo
1  sur  28
Risk Management
of Privileged Users
June, 2014
Understanding the Challenge
3
The situation for privileged users
 Often these accounts are Non Personal
 Created during Projects for Specific Task
 Clear and Static set of Entitlements
 When Created an End Date is not Foreseen
4
That creates Challenges
 Often Privileged Accounts do not get Cleaned Up
 Nobody knows How Many there are
 Nobody knows Which Entitlements they have
 Nobody knows which ones are No Longer In Use
Which steps do you need to
follow to get back in to control
6
Step 1: Discover
In the Discovery Phase all NPA’s / Privileged Accounts
are detected within the infrastructure. For most of
those we can assess right away if they are
still actively being used or not.
7
Step 2: Monitor
For those accounts for which not directly can
be established if/how they are being used,
a monitoring process is started.
8
Step 3: Clean Up!
All NPA’s / Privileged Accounts that are no longer
being used, will be decommissioned during
the third phase: the Clean Up.
9
Step 4: Manage
All accounts are being put into a Managed Lifecycle.
Responsibility is placed under a role, owned by a
‘normal’ identity and an expiration date is added.
10
Focus on the basics
Enforce
access
controls
Monitor
user
activity
Minimize
rights
How to make your Active
Directory safe and compliant
12 © 2012 NetIQ Corporation. All rights reserved.
The Current State of Active Directory
Where are we at? Where are we going?
Demand for better controls over
user permissions and changes,
richer reporting and auditing
capabilities
Active Directory’s role
in the enterprise is
evolving to meet
business demands
Microsoft native tools lack
fine-tuned administration
features
Automating
processes could
decrease workload
and simplify
compliance
13 © 2012 NetIQ Corporation. All rights reserved.
What NetIQ Provides
NetIQ Directory and Resource Administrator
• Features
‒ Secure delegated administration
‒ Centralized auditing & reporting of account
management tasks
‒ Automation of repetitive tasks
‒ Enforcement of account policies
• Benefits
‒ Reduces administration costs
‒ Increases administration efficiency
‒ Assures enterprise security
‒ Helps achieve compliance
14 © 2012 NetIQ Corporation. All rights reserved.
Secure, Delegated Administration
NetIQ Directory and Resource Administrator
• What is it?
‒ Dramatically simplifies the delegation
of administrative entitlements across
Active Directory
• Benefits
‒ Reduces the number of native
privileged accounts
‒ Delegate administrative tasks out
across the organization
‒ Using ActiveView technology,
administrators only see what they are
allowed to manage
Puts greater control over
administrative capabilities,
assuring the security of
Active Directory
15 © 2012 NetIQ Corporation. All rights reserved.
Centralized Auditing of Administration
NetIQ Directory and Resource Administrator
• What is it?
‒ Captures all account management
activities
‒ Identifies who did what, when, and
where
• Benefits
‒ Enforcement of activity auditing
‒ Capturing & centralizing activities in a
multi-master environment
‒ AD security audit log conciseness &
interpretation
‒ Complete audit trail
Helps achieve regulatory
compliance and security
best practices
16 © 2012 NetIQ Corporation. All rights reserved.
‒ The Reporting Center Console allows you to view,
configure, and create reports based on data collected by
DRA servers.
Reporting Center Console
17 © 2012 NetIQ Corporation. All rights reserved.
Enforcement of Account Policies
NetIQ Directory and Resource Administrator
• What is it?
‒ Ensure policy is enforced across
administrative-related activities
• Benefits
‒ Content control through data validation
policies
‒ Data correctness and compliance
‒ Assures content consistency as well as
contextual control
‒ What and when changes are made
‒ Ability to review and rollback deleted
objects
Assures data integrity,
accuracy, and improved
control over changes
18 © 2012 NetIQ Corporation. All rights reserved.
Automation of Repetitive Tasks
NetIQ Directory and Resource Administrator
• What is it?
‒ Facilitates the automation of
repetitive activities to reduce the level
of required human interaction
• Benefits
‒ Assures that all steps are carried out
correctly, in order, and completely
‒ Ability to integrate and launch 3rd-
party applications and scripts from
within the console
‒ Examples: Mailbox creation, disk
quota reporting and more
Increases administrator
efficiency
19 © 2012 NetIQ Corporation. All rights reserved.
Privileged User Management
Microsoft AD
20 © 2012 NetIQ Corporation. All rights reserved.
Administrationlayer
Privileged User Management
Microsoft AD
21 © 2012 NetIQ Corporation. All rights reserved.
Administrationlayer
Privileged User Management
Privileged Users
Microsoft AD
Delegated
Admin
22 © 2012 NetIQ Corporation. All rights reserved.
Granular Delegated Administration
Administrationlayer
Privileged Users
Microsoft AD
Delegated
Admin
23 © 2012 NetIQ Corporation. All rights reserved.
Administrationlayer
Recycle Bin for Easy Restoration
Privileged Users
Microsoft AD
Delegated
Admin
24 © 2012 NetIQ Corporation. All rights reserved.
Administrationlayer
Full Audit Trail & Enhanced Reporting
Privileged Users
Microsoft AD
Delegated
Admin
25 © 2012 NetIQ Corporation. All rights reserved.
Administrationlayer
AD user provisioning through DRA
Privileged Users
Microsoft AD
Delegated
Admin
Identity Manager
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.26
Thank you.
© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.27
+1 713.548.1700 (Worldwide)
888.323.6768 (Toll-free)
info@netiq.com
NetIQ.com
Worldwide Headquarters
1233 West Loop South
Suite 810
Houston, TX 77027 USA
www.netiq.com/communities
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2014 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

Contenu connexe

Similaire à RISK MANAGEMENT OF PRIVILEGED USERS

Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1waqar younas
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 CA CISA Jayjit Biswas
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...Rundeck
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
SRS Document for Digital Time Stamping
SRS Document for Digital Time StampingSRS Document for Digital Time Stamping
SRS Document for Digital Time Stampinglord
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docxMoorthy Esakky
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017Smart ERP Solutions, Inc.
 
OS Password-Manager-Report.docx
OS Password-Manager-Report.docxOS Password-Manager-Report.docx
OS Password-Manager-Report.docxrinim85726
 
How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...
How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...
How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...AppDynamics
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
CrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the HashCrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the HashCrowdStrike
 

Similaire à RISK MANAGEMENT OF PRIVILEGED USERS (20)

Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015 Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
Segregation of duties in SAP @ ISACA Pune presentation on 18.4.2015
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Power Platform Governance
Power Platform GovernancePower Platform Governance
Power Platform Governance
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
SRS Document for Digital Time Stamping
SRS Document for Digital Time StampingSRS Document for Digital Time Stamping
SRS Document for Digital Time Stamping
 
Project-fit Blueprint.docx
Project-fit Blueprint.docxProject-fit Blueprint.docx
Project-fit Blueprint.docx
 
Implementing security and controls in people soft best practices - may 2017
Implementing security and controls in people soft   best practices - may 2017Implementing security and controls in people soft   best practices - may 2017
Implementing security and controls in people soft best practices - may 2017
 
OS Password-Manager-Report.docx
OS Password-Manager-Report.docxOS Password-Manager-Report.docx
OS Password-Manager-Report.docx
 
How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...
How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...
How the World Bank Standardized on AppDynamics as its Enterprise-Wide APM Sol...
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
CrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the HashCrowdCasts Monthly: Mitigating Pass the Hash
CrowdCasts Monthly: Mitigating Pass the Hash
 

Dernier

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 

Dernier (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 

RISK MANAGEMENT OF PRIVILEGED USERS

  • 1. Risk Management of Privileged Users June, 2014
  • 3. 3 The situation for privileged users  Often these accounts are Non Personal  Created during Projects for Specific Task  Clear and Static set of Entitlements  When Created an End Date is not Foreseen
  • 4. 4 That creates Challenges  Often Privileged Accounts do not get Cleaned Up  Nobody knows How Many there are  Nobody knows Which Entitlements they have  Nobody knows which ones are No Longer In Use
  • 5. Which steps do you need to follow to get back in to control
  • 6. 6 Step 1: Discover In the Discovery Phase all NPA’s / Privileged Accounts are detected within the infrastructure. For most of those we can assess right away if they are still actively being used or not.
  • 7. 7 Step 2: Monitor For those accounts for which not directly can be established if/how they are being used, a monitoring process is started.
  • 8. 8 Step 3: Clean Up! All NPA’s / Privileged Accounts that are no longer being used, will be decommissioned during the third phase: the Clean Up.
  • 9. 9 Step 4: Manage All accounts are being put into a Managed Lifecycle. Responsibility is placed under a role, owned by a ‘normal’ identity and an expiration date is added.
  • 10. 10 Focus on the basics Enforce access controls Monitor user activity Minimize rights
  • 11. How to make your Active Directory safe and compliant
  • 12. 12 © 2012 NetIQ Corporation. All rights reserved. The Current State of Active Directory Where are we at? Where are we going? Demand for better controls over user permissions and changes, richer reporting and auditing capabilities Active Directory’s role in the enterprise is evolving to meet business demands Microsoft native tools lack fine-tuned administration features Automating processes could decrease workload and simplify compliance
  • 13. 13 © 2012 NetIQ Corporation. All rights reserved. What NetIQ Provides NetIQ Directory and Resource Administrator • Features ‒ Secure delegated administration ‒ Centralized auditing & reporting of account management tasks ‒ Automation of repetitive tasks ‒ Enforcement of account policies • Benefits ‒ Reduces administration costs ‒ Increases administration efficiency ‒ Assures enterprise security ‒ Helps achieve compliance
  • 14. 14 © 2012 NetIQ Corporation. All rights reserved. Secure, Delegated Administration NetIQ Directory and Resource Administrator • What is it? ‒ Dramatically simplifies the delegation of administrative entitlements across Active Directory • Benefits ‒ Reduces the number of native privileged accounts ‒ Delegate administrative tasks out across the organization ‒ Using ActiveView technology, administrators only see what they are allowed to manage Puts greater control over administrative capabilities, assuring the security of Active Directory
  • 15. 15 © 2012 NetIQ Corporation. All rights reserved. Centralized Auditing of Administration NetIQ Directory and Resource Administrator • What is it? ‒ Captures all account management activities ‒ Identifies who did what, when, and where • Benefits ‒ Enforcement of activity auditing ‒ Capturing & centralizing activities in a multi-master environment ‒ AD security audit log conciseness & interpretation ‒ Complete audit trail Helps achieve regulatory compliance and security best practices
  • 16. 16 © 2012 NetIQ Corporation. All rights reserved. ‒ The Reporting Center Console allows you to view, configure, and create reports based on data collected by DRA servers. Reporting Center Console
  • 17. 17 © 2012 NetIQ Corporation. All rights reserved. Enforcement of Account Policies NetIQ Directory and Resource Administrator • What is it? ‒ Ensure policy is enforced across administrative-related activities • Benefits ‒ Content control through data validation policies ‒ Data correctness and compliance ‒ Assures content consistency as well as contextual control ‒ What and when changes are made ‒ Ability to review and rollback deleted objects Assures data integrity, accuracy, and improved control over changes
  • 18. 18 © 2012 NetIQ Corporation. All rights reserved. Automation of Repetitive Tasks NetIQ Directory and Resource Administrator • What is it? ‒ Facilitates the automation of repetitive activities to reduce the level of required human interaction • Benefits ‒ Assures that all steps are carried out correctly, in order, and completely ‒ Ability to integrate and launch 3rd- party applications and scripts from within the console ‒ Examples: Mailbox creation, disk quota reporting and more Increases administrator efficiency
  • 19. 19 © 2012 NetIQ Corporation. All rights reserved. Privileged User Management Microsoft AD
  • 20. 20 © 2012 NetIQ Corporation. All rights reserved. Administrationlayer Privileged User Management Microsoft AD
  • 21. 21 © 2012 NetIQ Corporation. All rights reserved. Administrationlayer Privileged User Management Privileged Users Microsoft AD Delegated Admin
  • 22. 22 © 2012 NetIQ Corporation. All rights reserved. Granular Delegated Administration Administrationlayer Privileged Users Microsoft AD Delegated Admin
  • 23. 23 © 2012 NetIQ Corporation. All rights reserved. Administrationlayer Recycle Bin for Easy Restoration Privileged Users Microsoft AD Delegated Admin
  • 24. 24 © 2012 NetIQ Corporation. All rights reserved. Administrationlayer Full Audit Trail & Enhanced Reporting Privileged Users Microsoft AD Delegated Admin
  • 25. 25 © 2012 NetIQ Corporation. All rights reserved. Administrationlayer AD user provisioning through DRA Privileged Users Microsoft AD Delegated Admin Identity Manager
  • 26. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.26 Thank you.
  • 27. © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.27 +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) info@netiq.com NetIQ.com Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA www.netiq.com/communities
  • 28. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2014 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.