BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Greylisting Applications with PowerBroker for Windows Risk Compliance

Posted February 10, 2014    Morey Haber

PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the user’s permissions. PBW policies and rules are created for any specific application, publisher, path, or a variety of other traits including their arguments and wildcards. Traditionally, these rules are black and white and do not consider the risk of the application itself. This concept is commonly known as greylisting and something no privileged identity vendor has been able to successfully integrate – until now.

PowerBroker for Windows 6.5 introduces a brand new paradigm for greylisting based on regulatory compliance and the associated vulnerabilities with an application. This new concept is patent-pending and called “Risk Compliance.” Traditional rules only pattern match an application for privileged elevation or application denial. Risk Compliance allows rules to be created based on violations to regulatory compliance initiatives and vulnerabilities publicly identified for that application. BeyondTrust has mapped, in real time, application-based vulnerabilities from the Retina vulnerability scanner to dynamically create PowerBroker Rules.

PBW-Risk Report

For instance, an administrator can create an application rule based vulnerabilities associated with HIPAA compliance that are over 30 days old and choose to send an alert, denial the application from launching, or restrict permissions of the application when it launches. Security best practices, and many regulations, dictate that critical vulnerabilities should be patched within 30 days (PCI DSS v3 for example). This type of rule would stop an at-risk system from launching the applications with excessive privileges until proper remediation is performed. In addition, extensive reports are available based on these rules to document which systems have application vulnerabilities that violate governance initiatives and what users and applications should not be utilized with administrative (or denied completely) until remediation is conducted.

PBW-Backup Report

PowerBroker for Windows Risk Compliance is a game changer. It provides real-time, application-based vulnerability assessment, privileged identity management, file integrity monitoring, session monitoring, and Windows event log monitoring all in one security agent. When the technology is used with the BeyondInsight IT Risk Management Platform, clients will benefit from the BeyondTrust vision of “Context Aware Security Intelligence” for user and asset risks.

For more information, check out our white paper “Powerbroker for Windows: Risk Compliance.”

Tags:
, , , , ,

Leave a Reply

Additional articles

PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,
PowerBroker for Windows can be configured to automatically identify the end user’s language preference

Implementing Least Privilege Around the World with PowerBroker for Windows

Posted July 17, 2014    Morey Haber

BeyondTrust recognizes that international, multilingual businesses have unique operating challenges, especially when it comes to implementing enterprise software. PowerBroker for Windows is a least-privilege solution often deployed across thousands of systems spanning multiple geographies and protecting users of diverse backgrounds. Earlier this year, PowerBroker for Windows introduces new data privacy features for EMEA and APAC,…

Tags:
, ,