BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Least Privilege Legacy Apps and the Desktop “Wild West”: Part 4

Posted February 2, 2011    Peter McCalister

This week we report the conclusions of our recent survey of 185 IT Administrators and Help Desk Operatives, in a report Legacy Applications and Least Privilege Access Management’  – which reveals the way legacy apps leave Windows desktop environments unnecessarily exposed to attack from malware, as well as providing an open door to insider threats.

Perhaps most the most revealing insight from our survey, was that while we knew legacy apps like Sage and Quickbooks, caused problems for IT Admins with over privileged users, we hadn’t anticipated just how many others there were.  When survey respondents were invited to name which legacy applications they were nominating when selecting ‘Other’ they revealed over 50 different applications, from the understandable (company needs it to run it’s business) to the complete absurd (company doesn’t need it to run it’s business, and would violate compliance requirements if found with it.)

Notable examples include:

  • Old Mainframe applications.
  • Software used for running an office (printer drivers) or the desktop itself (defragmentor)
  • Third party point of sale software provided to retailers.
  • Adobe and Flash software.
  • Respondents from industries such as oil, automotive, and chemical cited technical applications which, although used by a handful of employees, still enforce the entire desktop to be set to administrator or super user status.
  • Applications downloaded by individual employees from the web to help them do their job better: for example, financial trading software.
  • Applications downloaded and installed by employees for their own entertainment, including: iPhone applications, and in one instance, a Golf Course Game Application.

Indeed, this paints a revealing picture of enterprise desktop environments today: they are littered with applications, each of which requires different configuration settings for different users, and makes effective access management practically impossible.

Not surprisingly, many respondents said they had too many legacy applications to mention.  Indeed, is it any wonder that today IT Admins consider desktops the “Wild West,” not just because of the overwhelm of managing access to multiple applications, but also because they never know what they were going to encounter on a user’s workstation.  One desktop manager, reported: “We have limited control on what the end user can install and change on a desktop, and in many cases we have limited awareness of changes being made. In most cases it’s too late if a user installs malware and adware, leaving our desktop resources left fire-fighting problems.”

Fortunately, the fault is not the legacy applications.  Business need not give up the applications they need to run business as usual.  The fault is the lack of awareness of just how easy it is to automate the elevation of privilege user access at a granular level, based on the role definition of each employee.

Leave a Reply

Additional articles

red-thumbprint

Why big data breaches won’t always be so easy

Posted September 19, 2014    Byron Acohido

This blog post is republished with the permission of ThirdCertainty. See the original post here. – By: Byron Acohido, Editor-In-Chief, ThirdCertainty Some day, perhaps fairly soon, it will be much more difficult for data thieves to pull off capers like the headline-grabbing hacks of Home Depot and Target. That’s not a pipe dream. It’s the projected outcome…

Tags:
, , , , ,
pbps-blog2

8 Reasons Your Privileged Password Management Solution Will Fail

Posted September 18, 2014    Chris Burd

Leveraging complex, frequently updated passwords is a basic security best practice for protecting privileged accounts in your organization. But if passwords are such a no-brainer, why do two out of three data breaches tie back to poor password management? The fact is that not all privileged password management strategies are created equal, so it’s critical…

Tags:
, , , , , ,
pbps-customer-campaign-image

You Change Your Oil Regularly; Why Not Your Passwords?

Posted September 11, 2014    Chris Burd

There are many things in life that get changed regularly:  your car oil, toothbrush and hopefully, your bed sheets.  It’s rare that you give these things much thought – even when you forget to change them. But what if you’re forgetting something that can cost you millions of dollars if left unchanged for long periods…

Tags:
, , ,