Posts Tagged ‘sudo’
In this webinar, with Security Expert Randy Franklin Smith, you will learn how to define common policies for all systems, how to lump similar systems into groups and assign additional specific sudo rules to those groups of systems and even how to implement exception policies for individual systems. Sudo allows you to do all of this in a single sudoers file shared between all systems.
On Demand Webinar – Randy Franklin Smith looks at how to audit what admins do inside Linux and UNIX with sudo’s logging capabilities. Then, the BeyondTrust team will walk through how to augment sudo for complete control and auditing over UNIX and Linux user activity.
At the End of Day You Can’t Control What Privileged Users Do: It’s about Detective/Deterrent Controls and Accountability
Live Webinar: Thursday, April 2, 2015 | 10am PT/1pm ET | REGISTER NOW! In this webinar, Security Expert Randy Franklin Smith will look at how to audit what admins do inside Linux and UNIX with sudo’s logging capabilities.
Like UNIX, at its core, Linux’s security model is basically monolithic – you either have root access or you don’t. But root access is too powerful for so many reasons; routinely using the actual root account – while easy and still frighteningly common – is so dangerous it borders on negligent. Auditors know about root…
A recent discovery by a German researcher, Marco Schoepl, found that it is possible for a user to bypass sudo authentication by resetting the clock. To read more about this vulnerability see the articles on seclist.org and threatpost.com. What we have found is that many highly secure customers have already adopted the timestamp_timeout=0 setting which…