BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Insider Hero Introduced: Compliance Carl

Posted July 22, 2011    Peter McCalister

In order to put a face on the depth and breadth of potential insiders that can be found throughout your enterprise, I will introduce you to three insider villains and three insider heroes. Each villain will represent one of the key misuse of privileges and each hero will represent key values delivered by least privilege. This sixth and final introduction will be of the most unlikely hero.

“Compliance Carl” is is your classic auditor responsible for regulatory compliance reporting and auditing of IT policies for enforcement of corporate governance. Carl has two sides. The unassuming, nose-to-the-grindstone side worries about system processes and productivity. And the assertive, give-‘em-no-quarter’ side worries about human mistakes and malice.

Carl is about dualities: part technical analyst, part financial analyst. At his best Carl is part Sherlock Holmes and part Judge Judy. At his worst he is part Homer Simpson and part Harvey Two-Face.

Most business and IT executives alike tremble when Compliance Carl comes around because they know their practices and systems will be scrutinized. Part of this generalized fear is the black and white nature of a compliance audit. At the end they will either pass or fail. A failing mark can mean anything from small policy changes required to massive financial fines.

Because these decisions are almost solely at the discretion of the type of Compliance Carl you have in your organization, the difference between the “Holmes/Judy” version can be dramatically different that the “Simpson/Two-face” version without a least privilege solution.

Leave a Reply

Additional articles

Sudo_logo

Don’t Create a Different sudoers File for Each System

Posted May 20, 2015    Randy Franklin Smith

What if you have multiple Linux and/or Unix systems? Sudo management can become onerous and unwieldy if you try to manage a different sudoers file on each system. The good news is that sudo supports multiple systems.

password-safety

What Does Microsoft Local Administrator Password Solution Really Do?

Posted May 19, 2015    Morey Haber

LAPS is a feature that allows the randomization of local administrator accounts across the domain. Although it would seem that this capability overlaps with features in BeyondTrust’s PowerBroker Password Safe (PBPS), the reality is it is more suited for simple use cases such as changing the local Windows admin account and not much more.

Tags:
, ,
webinar_ondemand

On Demand Webinar: Securing Windows Server with Security Compliance Manager

Posted May 14, 2015    BeyondTrust Software

On Demand Webinar: Security Expert Russell Smith, explains how to use Microsoft’s free Security Compliance Manager (SCM) tool to create and deploy your own security baselines, including user and computer authentication settings.

Tags:
, ,