BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Least Privilege Legacy Apps and the Desktop “Wild West”: Part 4

Posted February 2, 2011    Peter McCalister

This week we report the conclusions of our recent survey of 185 IT Administrators and Help Desk Operatives, in a report Legacy Applications and Least Privilege Access Management’  – which reveals the way legacy apps leave Windows desktop environments unnecessarily exposed to attack from malware, as well as providing an open door to insider threats.

Perhaps most the most revealing insight from our survey, was that while we knew legacy apps like Sage and Quickbooks, caused problems for IT Admins with over privileged users, we hadn’t anticipated just how many others there were.  When survey respondents were invited to name which legacy applications they were nominating when selecting ‘Other’ they revealed over 50 different applications, from the understandable (company needs it to run it’s business) to the complete absurd (company doesn’t need it to run it’s business, and would violate compliance requirements if found with it.)

Notable examples include:

  • Old Mainframe applications.
  • Software used for running an office (printer drivers) or the desktop itself (defragmentor)
  • Third party point of sale software provided to retailers.
  • Adobe and Flash software.
  • Respondents from industries such as oil, automotive, and chemical cited technical applications which, although used by a handful of employees, still enforce the entire desktop to be set to administrator or super user status.
  • Applications downloaded by individual employees from the web to help them do their job better: for example, financial trading software.
  • Applications downloaded and installed by employees for their own entertainment, including: iPhone applications, and in one instance, a Golf Course Game Application.

Indeed, this paints a revealing picture of enterprise desktop environments today: they are littered with applications, each of which requires different configuration settings for different users, and makes effective access management practically impossible.

Not surprisingly, many respondents said they had too many legacy applications to mention.  Indeed, is it any wonder that today IT Admins consider desktops the “Wild West,” not just because of the overwhelm of managing access to multiple applications, but also because they never know what they were going to encounter on a user’s workstation.  One desktop manager, reported: “We have limited control on what the end user can install and change on a desktop, and in many cases we have limited awareness of changes being made. In most cases it’s too late if a user installs malware and adware, leaving our desktop resources left fire-fighting problems.”

Fortunately, the fault is not the legacy applications.  Business need not give up the applications they need to run business as usual.  The fault is the lack of awareness of just how easy it is to automate the elevation of privilege user access at a granular level, based on the role definition of each employee.

Leave a Reply

Additional articles

Are Your Data Security Efforts Focused in the Right Area?

Posted January 28, 2015    Scott Lang

Vormetric Data Security recently released an insider threat report, with research conducted by HarrisPoll and analyzed by Ovum. Based on the survey responses, it is apparent that there is still a great deal of insecurity over data. However, the results also show that there may be misplaced investments to address those insecurities. I will explain…

Tags:
ghost

GHOST Vulnerability…Scary Indeed

Posted January 28, 2015    BeyondTrust Research Team

A vulnerability discovered by Qualys security researchers has surfaced within the GNU C Library that affects virtually all Linux operating systems. The vulnerability lies within the various gethostbyname*() functions and, as such, has been dubbed “GHOST.” GHOST is particularly nasty considering remote, arbitrary code execution can be achieved. In an effort to avoid taxing DNS lookups, glibc developers introduced…

Tags:
,
dave-shackleford-headshot

Your New Years Resolution: Controlling Privileged Users

Posted January 27, 2015    Dave Shackleford

Is 2015 the year you get a better handle on security? The news last year was grim – so much so, in fact, that many in the information security community despaired a bit. Really, the end-of-the-year infosec cocktail parties were a bit glum. OK, let’s be honest, infosec cocktail parties are usually not that wild…

Tags:
, , ,