BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

SUPM, SAPM And The Keys To Your Enterprise

Posted July 7, 2011    Peter McCalister

Industry analysts have classified the privilege identity management space into Super User Privileged Management (SUPM) and Shared Account Password Management (SAPM). When it comes to crashing your enterprise systems, destroying data, deleting or creating accounts and changing passwords, it’s not just malicious hackers you need to worry about.

That’s right – anyone inside your organization with superuser privileges has the potential to cause similar havoc, either through accidental, intentional or indirect misuse of privileges. Superusers may well also have access to confidential information and sensitive personal data they have no business looking at, thus breaching regulatory requirements and risking fines. The trouble is that accounts with superuser privileges, including shared accounts, are necessary: You can’t run a corporate IT system without granting some people the privileges to do system-level tasks.

Who has the keys to your enterprise?

This is where SUPM and SAPM methodologies come into play. So what’s the best way to manage personal and shared accounts with superuser privileges in a controlled and auditable manner? That was a key question Research Vice President Ant Allan addressed at the Gartner Information Security Summit 2009 in London back in September. When it comes to best practices for managing personal accounts with superuser privileges, Allan recommended creating three types of accounts:

-Personal accounts with full, permanent superuser privileges
-Personal accounts with full (or restricted) temporary superuser privileges
-Personal accounts with limited, temporary superuser privileges

Leave a Reply

Additional articles

PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,
PowerBroker for Windows can be configured to automatically identify the end user’s language preference

Implementing Least Privilege Around the World with PowerBroker for Windows

Posted July 17, 2014    Morey Haber

BeyondTrust recognizes that international, multilingual businesses have unique operating challenges, especially when it comes to implementing enterprise software. PowerBroker for Windows is a least-privilege solution often deployed across thousands of systems spanning multiple geographies and protecting users of diverse backgrounds. Earlier this year, PowerBroker for Windows introduces new data privacy features for EMEA and APAC,…

Tags:
, ,