BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

BeyondTrust Webcast: “The Privileged Identity Management Health Check” with guest speaker Andras Cser

Posted August 12, 2014    Chris Burd

BeyondTrust recently hosted a webcast presentation featuring Andras Cser, VP and Principal Analyst with Forrester Research, Inc., on “The Privileged Identity Management Health Check.” Below is a summary of key takeaways from the webcast, plus an on-demand video recording of the full presentation.

Cser shares his perspective on why Privileged Identity Management (PIM) is such an important choice for companies with sensitive data of any kind. He also explains how PIM works and discusses trends that have surfaced in the past few years.

The purpose of this webcast is to help companies understand the importance of a PIM platform and analyze recent PIM trends in threat mitigation, behavioral analytics, business user involvement, and cloud support. In this webcast, Cser offers his insight into the following four trends in PIM and how they can work for your business:

1. PIM as Threat Mitigation

According to Cser’s experience and research, 35-45% of all data breaches involve the misuse of administrative privileges. Even more disconcerting is that employee fraud monitoring does not always extend to all systems — App2App passwords are everywhere, and storing those credentials creates even more confusion and opportunities for a security breach.

We also can’t rely on the typical 10-15% tracking ratio of network forensics, because there is simply too much data to watch and store. Organizations can preempt that risk by using PIM as a part of a broad strategy to mitigate persistent threats and reduce opportunities for data breach.

2. Behavioral Analytics to Separate Out Anomalies

Fortunately, there is a way to circumvent those administrative threats. The answer is behavioral analytics. Using a quirky example of purchasing a pair of red platform Steve Madden pumps, Cser shows the audience how to use behavioral analytics to identify and understand baseline behavior. Companies can then use that information to identify anomalies in how user behaviors change and how to understand behaviors in comparison with peer groups.

Behavioral analytics represents a critical exchange of information and gives you a bird’s-eye-view of a given user’s behavior. That leads you to be able to identify (and be alerted to) behavior anomalies automatically.

3. Business User and Privileged User Overlap

Unfortunately, not all business systems support traditional Identity Access Management (IAM) – the provisioning connectors don’t exist, aren’t cost-effective to implement, and thick application integration is difficult. Shared accounts are also hard to manage and the highest sensitivity transactions may not be logged by the application in sufficient detail.

Cser points out that pre-existing PIM solutions are increasingly being used for a number of overlapping security checkpoints: shared credentials management for passwords and PKI certificates; session recording to understanding who is accessing what; tamper-resistant auditing of business user actions as a triangulation point; and for controlling company social media accounts.

PIM has expanded beyond just “talking to administrators” and now covers the intelligence needs of business users. It allows your team to create a visual risk score, chart, or dashboard to help you focus on the areas you need support in and then share that intelligence with auditors who want to know who has access to passwords and what they do when they are checked in with that password.

4. Organized and Secured Cloud Operations

Cser also shares insight into the new challenges that cloud operations bring to PIM security. These challenges include monitoring the activity and access of Infrastructure as a Service (IaaS) administrators, Platform as a Service (PaaS) administrators, and outsourced administrators – all of whom need granular access control for Hypervisor-level privileges. Virtualized guest operating systems may also be outside of the sphere of control of the owner or even the operator, making it easy to steal data from the virtualized system. To speak to these security issues, Cser calls for IT leaders to establish headless operations, or API control of and API calling from and to PIM solutions, for more secure helpdesk operations.

Managing privileged passwords, recording sessions, and delegating privileges are all PIM functions that help you run your business more quickly and at a lower long-term cost. And tools that help you manage PIM essentially help you function better as an organization.

For a cohesive approach to PIM, Cser encourages businesses to use integrated products from a minimal number of vendors and ensure high availability. He also suggests you keep login pages and scripts in all environments consistent.

For more of Cser’s insight into PIM trends, and for Forrester’s view of what’s to come, view the on-demand webcast below.

Tags:
, , , , , , , ,

Leave a Reply

Additional articles

Larry-Brock-CISO

Passwords: A Hacker’s Best Friend

Posted September 1, 2015    Larry Brock

After all the years of talk about biometrics and multi-factor authentication, we still have passwords and will likely have them for a long time. Because many “high risk” systems require complex passwords (zk7&@1c6), most people that use them believe their passwords are secure. But they aren’t.

Tags:
, ,
CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,