SlideShare a Scribd company logo
1 of 24
Download to read offline
M A N A G I N G U N I X A C C O U N T S I N T O D A Y ’ S
C O M P L E X W O R L D – S T O P T H E S H A D O W I T
A N D B E M O R E E F F I C I E N T
B Y C H R I S R AY, C I S S P - I S S M P
1
TABLE OF CONTENTS
• State of the Union
• IAM –What the Industry Requires
• Defense in Depth Model
• IAM Evolution
• Scenario I – User Account Management
• Scenario II – Server Management
• Scenario III – Audit Madness!
• Getting Executive Buy-In
• Summary
2
STATE OF THE UNION – INTERNET
OF THINGS (OR “THINGIFICATION”)
3
1. 50 to 200 billion connected devices by 2020
“Number of connected devices worldwide will rise from 15 billion today to 50 billion by 2020.” -
Cisco
2. $1.7 trillion in spending by 2020
“Global spending on IoT devices & services will rise from $656 billion in 2014 to $1.7 trillion in
2020.” - IDC
3. The $79 billion smart-home industry
“Smart-home industry generated $79.4 billion in revenue in 2014 and is expected to rise
substantially as mainstream awareness of smart appliances rises.” - Harbor Research & Postscapes
4. 90% of cars will be connected by 2020
“By 2020, 90% of cars will be online, compared with just 2% in 2012 supporting in-car infotainment,
autonomous-driving, and embedded OS markets” - Telefonica
5. 173.4 million wearable devices by 2019
“Global wearable device shipments will surge from 76.1 million in 2015 to 173.4 million units by
2019.” - IDC
The wearables market will connect to the smart-home and connected-car markets and
open the doors to new automation solutions. Cars can be unlocked, started, or even
summoned by a smartwatch. Wearables can also be used to open smart-home locks,
automatically turn lights on and off, and communicate remotely with smart appliances.
Chart source: http://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html
State of the Union –
Information Security
AfterVerizon breach,1.5 million
customer records put up for sale
Verizon Enterprise's security
expertise gets put to the test.
by Jon Brodkin - Mar 24, 2016 3:58pm CDT
4
IAM – REGULATION REQUIREMENTS FOR UNIX ADMINS
PR.AC-1: Identities and credentials are
managed for authorized devices and
users
• CCS CSC 16
• COBIT 5 DSS05.04,DSS06.03
• ISA 62443-2-1:2009 4.3.3.5.1
• ISA 62443-3-3:2013 SR 1.1, SR 1.2, SR 1.3, SR 1.4,
SR 1.5, SR 1.7, SR 1.8, SR 1.9
• ISO/IEC 27001:2013A.9.2.1,A.9.2.2,A.9.2.4,
A.9.3.1,A.9.4.2,A.9.4.3
• NIST SP 800-53 Rev. 4 AC-2, IA Family
• HIPAA Security Rule 45 C.F.R. §§
164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C),
164.308(a)(4)(i), 164.308(a)(4)(ii)(B),
164.308(a)(4)(ii)(C ), 164.312(a)(2)(i),
164.312(a)(2)(ii), 164.312(a)(2)(iii),164.312(d)
PR.AC-4:Access permissions are managed, incorporating
the principles of least privilege and separation of duties
• CCS CSC 12, 15
• ISA 62443-2-1:2009 4.3.3.7.3
• ISA 62443-3-3:2013 SR 2.1
• ISO/IEC 27001:2013A.6.1.2,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4
• NIST SP 800-53 Rev. 4 AC-2,AC-3,AC-5,AC6,AC-16
• HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(3), 164.308(a)(4),
164.310(a)(2)(iii), 164.310(b),164.312(a)(1),164.312(a)(2)(i),164.312(a)(2)(ii)
PR.MA-2: Remote maintenance of organizational assets
is approved, logged, and performed in a manner that
prevents unauthorized access
• COBIT 5 DSS05.04 • ISA 62443-2-1:2009 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7,
4.4.4.6.8
• ISO/IEC 27001:2013A.11.2.4,A.15.1.1,A.15.2.1
• NIST SP 800-53 Rev. 4 MA-4
• HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(3)(ii)(A),164.310(d)(1),
164.310(d)(2)(ii),164.310(d)(2)(iii), 164.312(a), 164.312(a)(2)(ii),
164.312(a)(2)(iv), 164.312(b),164.312(d),164.312(e),164.308(a)(1)(ii)(D)
DE.CM-3: Personnel activity is monitored to detect
potential cybersecurity events
• ISA 62443-3-3:2013 SR 6.2
• ISO/IEC 27001:2013A.12.4.1
• NIST SP 800-53 Rev. 4 AC-2,AU-12,AU-13, CA-7, CM-10, CM-11
• HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A),
164.308(a)(5)(ii)(C),164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e)
5
Payment Card Industry, Data Security Standards (PCI-DSS)
7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access.
7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.
8.1.1 Assign all users a unique ID before allowing them to access system components or cardholder data.
8.1.3 Immediately revoke access for any terminated users.
10.2.2Verify all actions taken by any individual with root or administrative privileges are logged.
10.2.5.aVerify use of identification and authentication mechanisms is logged.
10.2.5.bVerify all elevation of privileges is logged.
10.2.5.cVerify all changes, additions, or deletions to any account with root or administrative privileges are logged.
IAM – REGULATION REQUIREMENTS FOR UNIX ADMINS
6
DEFENSE IN DEPTH MODEL – WHERE DOES
IAM FIT IN?
• Model resides across all environments
regardless of platform
• Control challenges to focus on:
– IAM Provisioning / Deprovisioning
– Granular Access Controls – “Least
Privilege”
– Policy Enforcement – e.g Password
Complexity
– Logging / Auditing
– Non-repudiation
• What about enabling the business?
7
IAM PROCESS
8
Many kinds of users access these systems,
including:
• Employees.
• Contractors.
• Partners.
• Vendors.
• Customers.
Insiders: including employees and
contractors.
Outsiders: including customers,
partners and vendors.
SCENARIO I – USER ACCOUNT MANAGEMENT
Scenario: When users and administrators need access to a system, a user account needs to be created on each host
in order to provide system access for the user. Rights for these users accounts are not granular which gives the user
more access than is needed. Privileged account passwords must be changed immediately when a person changes
departments or leaves the company.
Challenge:
• New User Accounts (Provisioning) – How do I set up multiple user accounts for administrators and ensure ongoing consistency
to main directory (e.g. Peoplesoft,Windows AD, etc.)?
• Removing User Accounts (Deprovisioning) – How do I promptly remove a person’s access when they change departments or are
no longer with the company?
– How do I change all of my generic privileged account passwords that the person may have had knowledge of?
• Authorization – How do I limit what an administrator can have access to?
• Password Policy – How can I enforce the company’s password policy?
Watch Out!
• Excessive local accounts remain
• Contractor / 3rd Party support personnel are closely
managed and keep access after leaving company
• Rotating passwords are practiced
• Violations of “least privilege” principle
9
SCENARIO I – USER ACCOUNT MANAGEMENT
Unix operating systems have progressed significantly through the years in
regards to user account management.
• “chmod 777TopSecretFile” – not recommended! – except on slot machines…
• Red Hat Identity Management (IdM)
– IdM even provides native integration with Active Directory.
• Managing User Accounts Deploy and modify PAM (Pluggable Authentication
Modules) to enforce password policy.
• Solaris 11.3 - Specific extended rights can be applied to file objects, port
numbers, and user IDs.These extended rights replace the set of rights that
are otherwise available, except for the basic set.
Remember: Implement “least privilege” not only for admins but also for partners, contractors and end users.
Look at solutions that synchronize passwords across environments and provide automated provisioning and
deprovisioning of accounts.
10
SCENARIO II – SERVER MANAGEMENT
Scenario: Unix administrators must constantly connect to their servers to perform daily
management tasks. Accounts require “root” level access to perform duties. Access is typically “all
or none” in regards to having admin level access. Command line restrictions are not available.
11
Challenge:
• Generic accounts – How do I effectively manage my servers
without using generic accounts?
• Remote Access – Given the problem with generic accounts like
“root”, how do I manage the servers remotely if I can’t connect
with “root”?
• Command line – What commands can I restrict users from running?
Watch Out!
Avoid Non-repudiation.
Don’t forget your service accounts.
SCENARIO II – SERVER MANAGEMENT
Disable remote “root” access.
• Change the root shell to prevent users from logging in directly as root, the system administrator can
set the root account's shell to /sbin/nologin in the /etc/passwd file.
• To prevent root logins via the SSH protocol, edit the SSH daemon's configuration file
/etc/ssh/sshd_config, and change the line that reads:
#PermitRootLogin yes to read as follows: PermitRootLogin no.
• Use PAM.
Enforce use of “sudo”: sudo <command>.
• Easy to use and adds an extra layer of protection.
• Audit logs of the user’s transactions are saved in /var/log/messages.
• Administrator can allow different users access to specific commands based on their needs.
Command line – what commands are allowed?
• Restrict commands within the shell itself or via sudo configuration file, /etc/sudoers.
12
SCENARIO III – AUDIT MADNESS!
Scenario: Internal Audit, Information Security, Customers, and Regulatory Audits constantly
require evidence of controls around Unix systems. Some scripting is available for automation but
most evidence collection is cumbersome and pulls Admins away from daily operations.
Challenge:
• Logging – How can I show the details of what happened and by whom?
• Auditing – How am I collecting evidence for the constant audits?
Watch out!
• Physical and mental drain on Unix Operations’ teams.
• Do not give audit the ability to simply run their own commands to gather evidence.
13
SCENARIO III – AUDIT MADNESS!
Move logging to centralized server (e.g. syslog server).
Script!
• http://www.orafaq.com/wiki/Scripts
• http://www.isaca.org/Journal/archives/2015/Volume-4/Pages/auditing-linux-unix-server-
operating-systems.aspx
• http://www.softpanorama.org/Security/perl_sec_scripts.shtml
Be proactive – collect evidence periodically (e.g. quarterly) and save for audit.
• Feed into Security Information and Event Management (SIEM) solution when possible.
14
TIPS FOR GETTING EXECUTIVE BUY-IN
Show efficiency
• Time saved and resources reduced by having automated solution.
• Reduce overhead associated
Audit Improvements
• Partner with audit (both internal and external) for evidence collection.
• Reduction in audits around privileged account management.
• Identity Management always hot item for Corporate Board Members.
Enabling the business
• Numerous business benefits for more robust Identity Management program.
• ImproveTime to Market for internal and external customers.
• Greatly reduce the security risk! 15
SUMMARY
Difficult job for Unix Admins
Know the audit / security requirements
Find ways to automate when possible
Show reduction in work time and risk
16
PowerBroker for Unix &
Linux
Control and Audit Unix and Linux User
Activity
Helicopter View – BeyondTrust Solutions
PowerBroker Auditor:
Audit for Active Directory
Audit for File Server
Audit for MS Exchange
PowerBroker Auditor:
Audit for Active Directory
Audit for File Server
Audit for MS Exchange
PowerBroker Identity Services:
Single Sign On (AD Bridge)
Policy Mgmt for Unix/Linux/Mac via AD
PowerBroker Identity Services:
Single Sign On (AD Bridge)
Policy Mgmt for Unix/Linux/Mac via AD
Privilege Management:
PowerBroker for Windows
PowerBroker for Unix / Linux
PowerBroker for Mac
Privilege Management:
PowerBroker for Windows
PowerBroker for Unix / Linux
PowerBroker for Mac
Password Safe:
Password Management
Session Management
SSH Key Management
Application Management
Password Safe:
Password Management
Session Management
SSH Key Management
Application Management
Vulnerability Management:
Vulnerability Management
Patch Mgmt for Adobe, Java, etc
Analytic Reporting
Vulnerability Management:
Vulnerability Management
Patch Mgmt for Adobe, Java, etc
Analytic Reporting
PowerBroker for Unix & Linux:
• Eliminates the sharing of privileged credentials and delegate
permissions without exposing credentials
• Tracks, logs and audits activities performed on Unix and
Linux systems for compliance
• System level control provides powerful file and folder
controls, not just command line analysis
• Extends beyond Unix and Linux platforms, helping to reduce
risk across the enterprise
How does it work?
Detailed Forensics and Reporting:
• Searchable Index
• Scheduled Reports
• Custom Reporting
• Single Events Window
Product Demonstration
Quick Poll
Q&A
Thank you for attending!

More Related Content

What's hot

Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Videocnssources
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Protect SAP data with fingerprint recognition software
Protect SAP data  with fingerprint recognition softwareProtect SAP data  with fingerprint recognition software
Protect SAP data with fingerprint recognition softwareMartin Lum
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentationtneudenb
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET Journal
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...Ryan Gallavin
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce ApplicationMufaddal Nullwala
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control systemAlexander Decker
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 

What's hot (20)

Axis Intelligent Video
Axis Intelligent VideoAxis Intelligent Video
Axis Intelligent Video
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
News letter march 12
News letter march 12News letter march 12
News letter march 12
 
Protect SAP data with fingerprint recognition software
Protect SAP data  with fingerprint recognition softwareProtect SAP data  with fingerprint recognition software
Protect SAP data with fingerprint recognition software
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentation
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
Design of a gsm based biometric access control system
Design of a gsm based biometric access control systemDesign of a gsm based biometric access control system
Design of a gsm based biometric access control system
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 

Similar to Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be More Efficient

The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful UsersHelpSystems
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office AdministrationIRJET Journal
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetWattson Alexander Ramírez Rodas
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Systems, Inc.
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessHelpSystems
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxYury Leonychev
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 

Similar to Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be More Efficient (20)

The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheet
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
Hitachi ID Access Certifier: Find and remove stale privileges with periodic r...
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 

More from BeyondTrust

The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access ManagementBeyondTrust
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...BeyondTrust
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)BeyondTrust
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseBeyondTrust
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin PrivilegesBeyondTrust
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?BeyondTrust
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutBeyondTrust
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)BeyondTrust
 
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsMitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsBeyondTrust
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...BeyondTrust
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsBeyondTrust
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksBeyondTrust
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?BeyondTrust
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
 

More from BeyondTrust (20)

The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your Enterprise
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
 
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsMitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT Systems
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 

Recently uploaded

PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 

Managing Unix Accounts in Today's Complex World: Stop the Shadow IT and Be More Efficient

  • 1. M A N A G I N G U N I X A C C O U N T S I N T O D A Y ’ S C O M P L E X W O R L D – S T O P T H E S H A D O W I T A N D B E M O R E E F F I C I E N T B Y C H R I S R AY, C I S S P - I S S M P 1
  • 2. TABLE OF CONTENTS • State of the Union • IAM –What the Industry Requires • Defense in Depth Model • IAM Evolution • Scenario I – User Account Management • Scenario II – Server Management • Scenario III – Audit Madness! • Getting Executive Buy-In • Summary 2
  • 3. STATE OF THE UNION – INTERNET OF THINGS (OR “THINGIFICATION”) 3 1. 50 to 200 billion connected devices by 2020 “Number of connected devices worldwide will rise from 15 billion today to 50 billion by 2020.” - Cisco 2. $1.7 trillion in spending by 2020 “Global spending on IoT devices & services will rise from $656 billion in 2014 to $1.7 trillion in 2020.” - IDC 3. The $79 billion smart-home industry “Smart-home industry generated $79.4 billion in revenue in 2014 and is expected to rise substantially as mainstream awareness of smart appliances rises.” - Harbor Research & Postscapes 4. 90% of cars will be connected by 2020 “By 2020, 90% of cars will be online, compared with just 2% in 2012 supporting in-car infotainment, autonomous-driving, and embedded OS markets” - Telefonica 5. 173.4 million wearable devices by 2019 “Global wearable device shipments will surge from 76.1 million in 2015 to 173.4 million units by 2019.” - IDC The wearables market will connect to the smart-home and connected-car markets and open the doors to new automation solutions. Cars can be unlocked, started, or even summoned by a smartwatch. Wearables can also be used to open smart-home locks, automatically turn lights on and off, and communicate remotely with smart appliances. Chart source: http://www.intel.com/content/www/us/en/internet-of-things/infographics/guide-to-iot.html
  • 4. State of the Union – Information Security AfterVerizon breach,1.5 million customer records put up for sale Verizon Enterprise's security expertise gets put to the test. by Jon Brodkin - Mar 24, 2016 3:58pm CDT 4
  • 5. IAM – REGULATION REQUIREMENTS FOR UNIX ADMINS PR.AC-1: Identities and credentials are managed for authorized devices and users • CCS CSC 16 • COBIT 5 DSS05.04,DSS06.03 • ISA 62443-2-1:2009 4.3.3.5.1 • ISA 62443-3-3:2013 SR 1.1, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9 • ISO/IEC 27001:2013A.9.2.1,A.9.2.2,A.9.2.4, A.9.3.1,A.9.4.2,A.9.4.3 • NIST SP 800-53 Rev. 4 AC-2, IA Family • HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(3)(ii)(B), 164.308(a)(3)(ii)(C), 164.308(a)(4)(i), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C ), 164.312(a)(2)(i), 164.312(a)(2)(ii), 164.312(a)(2)(iii),164.312(d) PR.AC-4:Access permissions are managed, incorporating the principles of least privilege and separation of duties • CCS CSC 12, 15 • ISA 62443-2-1:2009 4.3.3.7.3 • ISA 62443-3-3:2013 SR 2.1 • ISO/IEC 27001:2013A.6.1.2,A.9.1.2,A.9.2.3,A.9.4.1,A.9.4.4 • NIST SP 800-53 Rev. 4 AC-2,AC-3,AC-5,AC6,AC-16 • HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(3), 164.308(a)(4), 164.310(a)(2)(iii), 164.310(b),164.312(a)(1),164.312(a)(2)(i),164.312(a)(2)(ii) PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access • COBIT 5 DSS05.04 • ISA 62443-2-1:2009 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.4.4.6.8 • ISO/IEC 27001:2013A.11.2.4,A.15.1.1,A.15.2.1 • NIST SP 800-53 Rev. 4 MA-4 • HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(3)(ii)(A),164.310(d)(1), 164.310(d)(2)(ii),164.310(d)(2)(iii), 164.312(a), 164.312(a)(2)(ii), 164.312(a)(2)(iv), 164.312(b),164.312(d),164.312(e),164.308(a)(1)(ii)(D) DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events • ISA 62443-3-3:2013 SR 6.2 • ISO/IEC 27001:2013A.12.4.1 • NIST SP 800-53 Rev. 4 AC-2,AU-12,AU-13, CA-7, CM-10, CM-11 • HIPAA Security Rule 45 C.F.R. §§ 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C),164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e) 5
  • 6. Payment Card Industry, Data Security Standards (PCI-DSS) 7.1 Limit access to system components and cardholder data to only those individuals whose job requires such access. 7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities. 8.1.1 Assign all users a unique ID before allowing them to access system components or cardholder data. 8.1.3 Immediately revoke access for any terminated users. 10.2.2Verify all actions taken by any individual with root or administrative privileges are logged. 10.2.5.aVerify use of identification and authentication mechanisms is logged. 10.2.5.bVerify all elevation of privileges is logged. 10.2.5.cVerify all changes, additions, or deletions to any account with root or administrative privileges are logged. IAM – REGULATION REQUIREMENTS FOR UNIX ADMINS 6
  • 7. DEFENSE IN DEPTH MODEL – WHERE DOES IAM FIT IN? • Model resides across all environments regardless of platform • Control challenges to focus on: – IAM Provisioning / Deprovisioning – Granular Access Controls – “Least Privilege” – Policy Enforcement – e.g Password Complexity – Logging / Auditing – Non-repudiation • What about enabling the business? 7
  • 8. IAM PROCESS 8 Many kinds of users access these systems, including: • Employees. • Contractors. • Partners. • Vendors. • Customers. Insiders: including employees and contractors. Outsiders: including customers, partners and vendors.
  • 9. SCENARIO I – USER ACCOUNT MANAGEMENT Scenario: When users and administrators need access to a system, a user account needs to be created on each host in order to provide system access for the user. Rights for these users accounts are not granular which gives the user more access than is needed. Privileged account passwords must be changed immediately when a person changes departments or leaves the company. Challenge: • New User Accounts (Provisioning) – How do I set up multiple user accounts for administrators and ensure ongoing consistency to main directory (e.g. Peoplesoft,Windows AD, etc.)? • Removing User Accounts (Deprovisioning) – How do I promptly remove a person’s access when they change departments or are no longer with the company? – How do I change all of my generic privileged account passwords that the person may have had knowledge of? • Authorization – How do I limit what an administrator can have access to? • Password Policy – How can I enforce the company’s password policy? Watch Out! • Excessive local accounts remain • Contractor / 3rd Party support personnel are closely managed and keep access after leaving company • Rotating passwords are practiced • Violations of “least privilege” principle 9
  • 10. SCENARIO I – USER ACCOUNT MANAGEMENT Unix operating systems have progressed significantly through the years in regards to user account management. • “chmod 777TopSecretFile” – not recommended! – except on slot machines… • Red Hat Identity Management (IdM) – IdM even provides native integration with Active Directory. • Managing User Accounts Deploy and modify PAM (Pluggable Authentication Modules) to enforce password policy. • Solaris 11.3 - Specific extended rights can be applied to file objects, port numbers, and user IDs.These extended rights replace the set of rights that are otherwise available, except for the basic set. Remember: Implement “least privilege” not only for admins but also for partners, contractors and end users. Look at solutions that synchronize passwords across environments and provide automated provisioning and deprovisioning of accounts. 10
  • 11. SCENARIO II – SERVER MANAGEMENT Scenario: Unix administrators must constantly connect to their servers to perform daily management tasks. Accounts require “root” level access to perform duties. Access is typically “all or none” in regards to having admin level access. Command line restrictions are not available. 11 Challenge: • Generic accounts – How do I effectively manage my servers without using generic accounts? • Remote Access – Given the problem with generic accounts like “root”, how do I manage the servers remotely if I can’t connect with “root”? • Command line – What commands can I restrict users from running? Watch Out! Avoid Non-repudiation. Don’t forget your service accounts.
  • 12. SCENARIO II – SERVER MANAGEMENT Disable remote “root” access. • Change the root shell to prevent users from logging in directly as root, the system administrator can set the root account's shell to /sbin/nologin in the /etc/passwd file. • To prevent root logins via the SSH protocol, edit the SSH daemon's configuration file /etc/ssh/sshd_config, and change the line that reads: #PermitRootLogin yes to read as follows: PermitRootLogin no. • Use PAM. Enforce use of “sudo”: sudo <command>. • Easy to use and adds an extra layer of protection. • Audit logs of the user’s transactions are saved in /var/log/messages. • Administrator can allow different users access to specific commands based on their needs. Command line – what commands are allowed? • Restrict commands within the shell itself or via sudo configuration file, /etc/sudoers. 12
  • 13. SCENARIO III – AUDIT MADNESS! Scenario: Internal Audit, Information Security, Customers, and Regulatory Audits constantly require evidence of controls around Unix systems. Some scripting is available for automation but most evidence collection is cumbersome and pulls Admins away from daily operations. Challenge: • Logging – How can I show the details of what happened and by whom? • Auditing – How am I collecting evidence for the constant audits? Watch out! • Physical and mental drain on Unix Operations’ teams. • Do not give audit the ability to simply run their own commands to gather evidence. 13
  • 14. SCENARIO III – AUDIT MADNESS! Move logging to centralized server (e.g. syslog server). Script! • http://www.orafaq.com/wiki/Scripts • http://www.isaca.org/Journal/archives/2015/Volume-4/Pages/auditing-linux-unix-server- operating-systems.aspx • http://www.softpanorama.org/Security/perl_sec_scripts.shtml Be proactive – collect evidence periodically (e.g. quarterly) and save for audit. • Feed into Security Information and Event Management (SIEM) solution when possible. 14
  • 15. TIPS FOR GETTING EXECUTIVE BUY-IN Show efficiency • Time saved and resources reduced by having automated solution. • Reduce overhead associated Audit Improvements • Partner with audit (both internal and external) for evidence collection. • Reduction in audits around privileged account management. • Identity Management always hot item for Corporate Board Members. Enabling the business • Numerous business benefits for more robust Identity Management program. • ImproveTime to Market for internal and external customers. • Greatly reduce the security risk! 15
  • 16. SUMMARY Difficult job for Unix Admins Know the audit / security requirements Find ways to automate when possible Show reduction in work time and risk 16
  • 17. PowerBroker for Unix & Linux Control and Audit Unix and Linux User Activity
  • 18. Helicopter View – BeyondTrust Solutions PowerBroker Auditor: Audit for Active Directory Audit for File Server Audit for MS Exchange PowerBroker Auditor: Audit for Active Directory Audit for File Server Audit for MS Exchange PowerBroker Identity Services: Single Sign On (AD Bridge) Policy Mgmt for Unix/Linux/Mac via AD PowerBroker Identity Services: Single Sign On (AD Bridge) Policy Mgmt for Unix/Linux/Mac via AD Privilege Management: PowerBroker for Windows PowerBroker for Unix / Linux PowerBroker for Mac Privilege Management: PowerBroker for Windows PowerBroker for Unix / Linux PowerBroker for Mac Password Safe: Password Management Session Management SSH Key Management Application Management Password Safe: Password Management Session Management SSH Key Management Application Management Vulnerability Management: Vulnerability Management Patch Mgmt for Adobe, Java, etc Analytic Reporting Vulnerability Management: Vulnerability Management Patch Mgmt for Adobe, Java, etc Analytic Reporting
  • 19. PowerBroker for Unix & Linux: • Eliminates the sharing of privileged credentials and delegate permissions without exposing credentials • Tracks, logs and audits activities performed on Unix and Linux systems for compliance • System level control provides powerful file and folder controls, not just command line analysis • Extends beyond Unix and Linux platforms, helping to reduce risk across the enterprise
  • 20. How does it work?
  • 21. Detailed Forensics and Reporting: • Searchable Index • Scheduled Reports • Custom Reporting • Single Events Window
  • 24. Q&A Thank you for attending!