BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Least Privilege Legacy Apps and the Desktop “Wild West”: Part 4

Posted February 2, 2011    Peter McCalister

This week we report the conclusions of our recent survey of 185 IT Administrators and Help Desk Operatives, in a report Legacy Applications and Least Privilege Access Management’  – which reveals the way legacy apps leave Windows desktop environments unnecessarily exposed to attack from malware, as well as providing an open door to insider threats.

Perhaps most the most revealing insight from our survey, was that while we knew legacy apps like Sage and Quickbooks, caused problems for IT Admins with over privileged users, we hadn’t anticipated just how many others there were.  When survey respondents were invited to name which legacy applications they were nominating when selecting ‘Other’ they revealed over 50 different applications, from the understandable (company needs it to run it’s business) to the complete absurd (company doesn’t need it to run it’s business, and would violate compliance requirements if found with it.)

Notable examples include:

  • Old Mainframe applications.
  • Software used for running an office (printer drivers) or the desktop itself (defragmentor)
  • Third party point of sale software provided to retailers.
  • Adobe and Flash software.
  • Respondents from industries such as oil, automotive, and chemical cited technical applications which, although used by a handful of employees, still enforce the entire desktop to be set to administrator or super user status.
  • Applications downloaded by individual employees from the web to help them do their job better: for example, financial trading software.
  • Applications downloaded and installed by employees for their own entertainment, including: iPhone applications, and in one instance, a Golf Course Game Application.

Indeed, this paints a revealing picture of enterprise desktop environments today: they are littered with applications, each of which requires different configuration settings for different users, and makes effective access management practically impossible.

Not surprisingly, many respondents said they had too many legacy applications to mention.  Indeed, is it any wonder that today IT Admins consider desktops the “Wild West,” not just because of the overwhelm of managing access to multiple applications, but also because they never know what they were going to encounter on a user’s workstation.  One desktop manager, reported: “We have limited control on what the end user can install and change on a desktop, and in many cases we have limited awareness of changes being made. In most cases it’s too late if a user installs malware and adware, leaving our desktop resources left fire-fighting problems.”

Fortunately, the fault is not the legacy applications.  Business need not give up the applications they need to run business as usual.  The fault is the lack of awareness of just how easy it is to automate the elevation of privilege user access at a granular level, based on the role definition of each employee.

Leave a Reply

Additional articles

VMware Hardening Guidelines-img3

How to Audit VMware ESX and ESXi Servers Against the VMware Hardening Guidelines with Retina CS

Posted February 27, 2015    BeyondTrust Research Team

Retina CS Enterprise Vulnerability Management has included advanced VMware auditing capabilities for some time, including virtual machine discovery and scanning through a cloud connection, plus the ability to scan ESX and ESXi hosts using SSH. However, in response to recent security concerns associated with SSH, VMware has disabled SSH by default in its more recent…

Tags:
, , , ,
dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,