BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Identity Management is Best in Enterprise Security

Posted March 14, 2012    Peter McCalister

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to
measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could inhibit our ability to accomplish our objectives. In an enterprise situation, this model acts as a critical gauge- one which separates compliant from noncompliant, secure from insecure, and controlled from chaotic.

So what security projects in our organizations qualify as “best?” I’ll tell you right now it boils down to identity management. Security as a whole is critical for every organization. But at the core of every security functions ist he obligation to protect sensitive assets (be it data, machines, ideas, etc.) from harm. And where does that harm stem from? People! So it makes sense that protecting critical data from people should get considerable attention from a security standpoint. What should get even more consideration is defending those assets from the most dangerous type of threat- people who have unrestricted access to said information.

Identity management is the key to having the “best” in enterprise security. This probably sounds familiar- it’s something we’ve maintained since we started in the business over 25 years ago. According to Gartner, however, business are STILL not managing the identities of their employees very well. In fact just yesterday, Gartner Analyst Bob Blakely spoke to the Gartner Identity and Access Management Summit in London about how critical the management of identity is. According to this article, he specifically emphasized that, “cleaning up Active Directory to manage identity based on attributes rather than hierarchy should be a priority for 2012.”

So how can you improve the way you manage the priviles of your employees and third party contractors? It comes down to this: implement a least privilege solution in your organization. Without such a thing, it’s impossible for you to achieve “best” when it comes to the security of your company. Click here for more information on how to take the next steps in securing your IT environment.

Leave a Reply

Additional articles

VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,
dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,