Privileged Account Management Jason Fehrenbach, Product Manager.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Complete Event Log Viewing, Monitoring and Management.
BalaBit Shell Control Box
Complete Event Log Viewing, Monitoring and Management.
Privileged Identity Management Enterprise Password Vault
Audit Issues regarding Passwords on Elevated Privilege Accounts Gene Scheckel Global Internal Audit.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
IBM Software Group ® Accessing Domino via Outlook iNotes Access for Microsoft Outlook - Notes Domino 5.5 – Domino Access for MS Outlook - Notes Domino.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Active Directory: Final Solution to Enterprise System Integration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Identity and Access Management
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Chapter 7 WORKING WITH GROUPS.
Lieberman Software Random Password Manager & Workflow Delegation.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Hands-On Microsoft Windows Server 2008
Module 6: Designing Active Directory Security in Windows Server 2008.
Chapter 7: WORKING WITH GROUPS
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
Netwrix product briefing n4.0 Unified Auditing for Critical IT Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
© Copyright 2009 Sysgem AG, 8002 Zurich, Switzerland Sysgem Products Sysgem Enterprise Manager (SEM)  Identity & Access Management  System Management.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Managing in Multiple Operating System Environments OS administration in an hp-ux and Linux environment Steeve Daigle, HP & Steve Cooke, HP.
1 Windows 2008 Configuring Server Roles and Services.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Lieberman Software Random Password Manager & Two-Factor Authentication.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Retina Network Security Scanner
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
2016 Citrix presentation.
Unix Provisioning Manager
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
BOMGAR REMOTE SUPPORT Karl Lankford
Unit 8 NT1330 Client-Server Networking II Date: 8/2/2016
Chapter 9 MANAGING SOFTWARE.
Windows Server 2008 Administration
PRIVILEGED ACCOUNT ABUSE
Offices: DC, London, Sydney
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Windows desktop sharing
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Productive + Hybrid + Intelligent + Trusted
IT Management, Simplified
Presentation transcript:

Privileged Account Management Jason Fehrenbach, Product Manager

Customer Use Cases - Introduction A US-based Natural Gas and Electric company serving multiple states Project Requirements –Only grant access to shared administrative accounts with pre-approval based on established policy –Need to provide ‘firecall’ functionality –Needed to delegate administrative access for Separation of Duty (SoD) –Required logging of Windows administrator activity –Needed to consolidate Unix identities into Active Directory to streamline provisioning, password management and privilege account management

Customer Use Cases - Introduction A global leader in payment processing Project Requirements –Needed to centralize accounts and get control over passwords and user lifecycles –Needed to replace NIS and provide centralized authentication –Needed to restrict and audit what users could do but at the same time provide for users to carry on with their day-to-day jobs –Needed to provide controls around shared administrative passwords –Needed to rotate administrative account passwords regularly –Needed to correlate and audit administrative activity with the actual end user

Delegation PAM Sub-Categories Use Case – Utility Company Needed to consolidate Unix identities into Active Directory to streamline provisioning, password management and privilege account management Use Case - Payment Processing Needed to centralize accounts and get control over passwords and user lifecycles Needed to replace NIS and provide centralized authentication PRIVILEGES Privilege Sessions AD Bridge Shared Passwords PLATFORMS Operating Systems

Delegation Use Case – Utility Company Only grant access to shared administrative accounts with pre-approval based on established policy Need to provide ‘firecall’ functionality Use Case - Payment Processing Needed to provide controls around shared administrative accounts Needed to rotate administrative account passwords regularly PRIVILEGES PLATFORMS Privilege Sessions Shared Passwords Operating Systems Network Devices Databases Applications AD Bridge PAM Sub-Categories

Delegation PRIVILEGES Privilege Sessions Shared Passwords AD Bridge PAM Sub-Categories

Delegation PRIVILEGES Privilege Sessions Shared Passwords AD Bridge PAM Sub-Categories

PROTOCOLS RDP VNC PRIVILEGES SSH TELNET HTTP HTTPS Delegation Shared Passwords Privilege Sessions AD Bridge Use Case – Utility Company Required logging of Windows administrator activity PAM Sub-Categories

PLATFORMS Operating Systems PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge Use Case – Utility Company Needed to provide find-grained delegation of administrative (root) access for Separation of Duty (Sod) Use Case - Payment Processing Needed to restrict and audit what users could but at the same time provide for users to carry on with their day-to-day jobs Needed to correlate and audit administrative activity with the actual end- user PAM Sub-Categories

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge How do I allow users to perform elevated tasks on Unix without losing control of the root password? Pair a password vault with a delegation solution Common delegation solutions Native OS solutions (RBAC implementations) The open source Sudo project The Commercial Unix Security space Unix Delegation: Problem Statement

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge What did we discover? Result? Companies would: Purchase a PAM sol’n only for their highest risk machines Hate having to re-train admins & help desk staff on a new syntax “Bend” sudo in crazy ways Result? Companies would: Purchase a PAM sol’n only for their highest risk machines Hate having to re-train admins & help desk staff on a new syntax “Bend” sudo in crazy ways Commercial 3 rd party solutions ~3,000 customers Native OS options sudo Linux: 7.5M servers Unix: 2.8M servers Mac: 2.0M servers No focus on this segment!

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge Sudo v1.7 and earlier

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge How do I easily provide access control reports? How do I deal with sudoers? How to manage it, distribute it, etc How do I enable central keystroke logging? How do I know what is going on across lots of systems? How do I provide more fine-grain control in the policy? Field Feedback: Common Pain and Trends

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge Sudo v1.8 and the new plug-in API

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge Example architecture using plug-in API

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge Sudo Reporting Access Control Report Event Activity Commands run Policy changes Deployment Preflight and sudo plug-in installation Policy Management Editor, Versioning, Rollback Keystroke Logging Search, Playback Separation of Duty Example pain points that the plug-in API can assist with

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge (April 12, 2012) New security policy format Designed for the needs of the enterprise Include an API to support analysis and reporting tools Support grouping of commands and options in logical units Facility management of sudoers by multiple stake-holders Time based policy rules Data source plug-ins SUDO v2.0: Design Phase

PRIVILEGES Privilege Sessions Shared Passwords Delegation AD Bridge SUDO v2.0: Design Phase

19 ©2011 Quest Software, Inc. All rights reserved.. Simplify Account Management Manage Access to Business Critical Information Audit User Activity Privileged Account Management Access Governance Privileged Account Management Complete Identity & Access Management Understand & Control Administrator Activity Identity Administration User Activity Monitoring

Thank You

Centrally view sudo event activity

Search and filter sudo event logs

Manage local accounts

Replay sudo sessions

Detailed Sudo access control reporting

Separation of Duty