Managing and monitoring the privileged
Trusted and high-level stakeholders may be offered privileged network access, but this may not be well managed or monitored
Tarzey: High-level access must also be monitored and managed
A small group of employees in any organisation will have the ability to wreak havoc on IT infrastructure and the business it is there to serve: they are the privileged users who manage it.
Granting privileges to such users is necessary for them to be able to do their jobs, but when things go wrong the consequences can be dire.
The actions to blame may be unintentional but, because of the high-level access, the ‘accidents’ of privileged users can be far more serious than those of normal users. They may wipe a disk or crash a server at peak times.
And some privileged users abuse their status. Examples include Société Générale trader Jérôme Kerviel, who used his privileged access to perpetrate a ?4.9bn fraud, and UBS systems administrator Roger Duronio, who was convicted in 2006 of sabotaging his employers IT systems in retaliation over a compensation dispute.
It is not just the privileged themselves who are the problem; privileged accounts are often targeted by hackers. Such accounts are often left with default settings at installation, making them easier to access than many ‘normal’ accounts.
If a hacker gets in this way too, they will have far wider access to the target systems. This is how UK hacker Gary McKinnon broke into the Pentagon’s systems in the US.
It is not just in an organisation’s own interest to get the privileged-user issue under control; regulators and standards bodies have something to say about the matter too.
The ISO 27001 IT security standard states that the allocation and use of privileges shall be restricted and controlled. The Payment Card Industries Data Security Standard (PCI-DSS), to which any business taking credit or debit card payments should adhere, recommends auditing all privileged-user activity as well as avoiding the use of vendor-supplied defaults for system passwords.
Despite this, when interviewing 270 European IT managers we found many organisations still allow poor practice around the management of privileged users.
You can see our results in the report, Privileged-user management it’s time to take control, which is free to CRN readers at: http://www.quocirca.com/pages/analysis/reports/view/store250/item22042/?link_683=22042
Take-up of certain IT security standards is high. Sixty per cent of respondents said they had implemented or would implement ISO 27001. Even so, about half also admitted to the sharing of privileged user accounts — meaning no one privileged user can be held to account when things go wrong, including some that have
implemented these IT security standards.
A standard is often implemented gradually and selectively. However, those who are reassured by a given organisation’s compliance claims might be shocked to find that underlying weaknesses in IT management can remain.
While all this sounds a bit gloomy, for resellers there are services and product opportunities. An assessment of any organisation that has not addressed the privileged-user issue and only about 25 per cent have may expose some of the weaknesses outlined. Then a case can be made for buying tools for privileged-user management (PUM).
PUM tools allow the monitoring of software, including operating systems, databases and applications, to ensure privileged-user accounts are not left with default passwords and are only granted to certain people. They also enable continuous monitoring of users while acting under privilege, creating an audit trail that protects users themselves and the business.
To sell such tools to IT managers may prove tricky, as they are being asked to limit their own activities. You may need buy-in from business managers as well, who should be shocked at their organisation’s exposure via privileged access.
Bob Tarzey is service director at Quocirca