BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Identity Management is Best in Enterprise Security

Posted March 14, 2012    Peter McCalister

I think we’re all familiar with the concept of “good, better, best.” This theory allows us to
measure how our actions rank against whatever end goal we may have established. In order to achieve our goals, we have to be sure our choices and our actions are “best,” as settling for “good” or “better” could inhibit our ability to accomplish our objectives. In an enterprise situation, this model acts as a critical gauge- one which separates compliant from noncompliant, secure from insecure, and controlled from chaotic.

So what security projects in our organizations qualify as “best?” I’ll tell you right now it boils down to identity management. Security as a whole is critical for every organization. But at the core of every security functions ist he obligation to protect sensitive assets (be it data, machines, ideas, etc.) from harm. And where does that harm stem from? People! So it makes sense that protecting critical data from people should get considerable attention from a security standpoint. What should get even more consideration is defending those assets from the most dangerous type of threat- people who have unrestricted access to said information.

Identity management is the key to having the “best” in enterprise security. This probably sounds familiar- it’s something we’ve maintained since we started in the business over 25 years ago. According to Gartner, however, business are STILL not managing the identities of their employees very well. In fact just yesterday, Gartner Analyst Bob Blakely spoke to the Gartner Identity and Access Management Summit in London about how critical the management of identity is. According to this article, he specifically emphasized that, “cleaning up Active Directory to manage identity based on attributes rather than hierarchy should be a priority for 2012.”

So how can you improve the way you manage the priviles of your employees and third party contractors? It comes down to this: implement a least privilege solution in your organization. Without such a thing, it’s impossible for you to achieve “best” when it comes to the security of your company. Click here for more information on how to take the next steps in securing your IT environment.

Leave a Reply

Additional articles

flash-logo

Adobe Patches Zero-Day Flaw Being Exploited in the Wild

Posted January 22, 2015    BeyondTrust Research Team

Earlier this week, French malware researcher Kafeine reported on a new Adobe Flash zero-day vulnerability that was being exploited in the wild using the latest versions of the Angler Exploit Toolkit. “Any version of Internet Explorer or Firefox with any version of Windows will get owned if Flash up to 16.0.0.287 (included) is installed and enabled”…

Tags:
, , , , ,

Your Data Security Strategy Starts with Deploying a Least Privilege Model (part 2 of 2)

Posted January 22, 2015    Scott Lang

In last week’s blog, we talked about how controls and accountability must be put into place so that only the right folks can access data and the systems on which that data resides, and that employing a least privilege model helps to achieve that and more. We’re using conclusions and data from a recent report…

Tags:
, , , ,
Larry-Brock-CISO

Basic Blocking and Tackling for Defending Against Advanced Targeted Attacks

Posted January 22, 2015    Larry Brock

With football season at its pinnacle at both the college and professional levels, the best teams continually focus on the fundamentals that make them successful. In security, we need to do the same.  It is okay for us to have a few key plays, especially in certain industries where we have to focus on unique…

Tags:
, , , , ,