BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Sharing Isn’t Always Caring Without Least Privilege

Posted May 9, 2011    Peter McCalister

In kindergarten, we all learned an important lesson: how to share. Some people, as they grew up, seem to have taken this concept a little too far, with no real consideration for possible consequences. I’m not trying to undermine the importance of sharing as a general rule, but let’s just take a quick look at how sharing has “helped” in the recent past.

Vodafone. We’ve talked about it before, but it’s the perfect example of how sharing isn’t always the way to go. They experienced a breach early this year that affected private customer data. This information was leaked as a result of the misuse of a password. More than likely the damage that password caused was a result of it being sold or given to someone else. The consequences of this breach were severe: fines to be paid, fired employees, and a whole unnecessary mess to be cleaned up. All because someone was loose with their password.

Every user in every organization must have their own credentials. Every time. Sure, it can be easier to let someone user your password. Yes, they would probably end up with privileged access if they had called the help desk anyway. But at what cost does sharing become acceptable? Organizations need not risk sensitive information for laziness.

Companies also need to have the ability to track and log the use of those passwords. Granular details about when someone logged in, the keystrokes they performed, and the information they accessed is the key to correct governance, as well as fast response time if a breach were to occur. Without a system in place to ensure the proper people are using their passwords appropriately, all of your efforts will have been for not.

I think it’s safe to say that sharing is not always a benefit. Should we take it too far and stop teaching children to share? No. Should we stop teaching adults with the keys to their enterprises’ kingdom to share? Absolutely.

Leave a Reply

Additional articles

How To Implement The Australian Signals Directorate’s Top 4 Strategies

Posted October 20, 2014    Morey Haber

The Australian Signals Directorate (ASD), also known as the Defence Signals Directorate, has developed a list of strategies to mitigate targeted cyber intrusions. The recommended strategies were developed through ASD’s extensive experience in operational cyber security, including responding to serious security intrusions and performing vulnerability assessments and penetration testing for Australian government agencies. These recommendations…

Tags:
, , , ,
asp-mvc

Exploiting MS14-059 because sometimes XSS is fun, sometimes…

Posted October 17, 2014    BeyondTrust Research Team

This October, Microsoft has provided a security update for System.Web.Mvc.dll which addresses a ‘Security Feature Bypass’. The vulnerability itself is in ASP.NET MVC technology and given its wide adoption we thought we would take a closer look. Referring to the bulletin we can glean a few useful pieces of information: “A cross-site scripting (XSS) vulnerability exists…

Tags:
4bestpracticesaudits-blog

Four Best Practices for Passing Privileged Account Audits

Posted October 16, 2014    Chris Burd

Like most IT organizations, your team may periodically face the “dreaded” task of being audited. Your process for delegating privileged access to desktops, servers, and infrastructure devices is a massive target for the auditor’s microscope. An audit’s findings can have significant implications on technology and business strategy, so it’s critical to make sure you’re prepared…

Tags:
, , , ,