The Good, the Bad, and the Ugly: Privileged Account Access Models

Posted by Yanni Shainsky on Apr 11, 2016 4:57:17 PM


In the previous privileged account blog, we described the three main categories of privileged accounts: Local Accounts, Directory Accounts, and Application Accounts, as well as some of the best practices for maintaining those accounts.

In this week’s blog we will discuss the pros and cons of various privileged account access models.

For the purpose of our discussion, suppose we have a targetwindows-based server called “PrintServer01.” This server is a member of the domain and its primary function is that of a print server. Mostly the domain administrators need privileged access to this server, in order to provision new network printers or troubleshoot existing printers’ queues and drivers. There are various options for giving the domain administrators access to the server, which we will discuss from the least secure model to the most secure model.

Read More

Topics: Privileged Accounts, PAM

What is a Privileged Account?

Posted by Yanni Shainsky on Mar 28, 2016 4:05:32 PM

PAM_Blog_Post_Series.jpgThis month CyberSheath co-sponsored a table with CyberArk at the annual California Tech Summit, at the convention center in Anaheim. We had a lot of great discussions with conference participants and conference presenters. Often times at events, like the Tech Summit, as a vendor you are asked many questions throughout the day regarding the service or product you are representing. One frequently asked question that came up was "what exactly is a privileged account?"  In order to address that question, we should first discuss the various types of user and service accounts that exist in a typical enterprise.

There are three main types of accounts that exist: local accounts, directory accounts, and application accounts. We will take a look at them to discuss under which circumstances those accounts are typically considered “privileged,” although keep in mind that some organizations can have broader definitions of what it means for account to be privileged.


Read More

Topics: Privileged Accounts

7 Ways a PAM Solution Can Help You Meet DFARS NIST 800-171 Regulations

Posted by Yanni Shainsky on Mar 14, 2016 5:30:58 PM

PAMDFARSReq_Blog_Post.jpgOn June 18, 2015, NIST released the final version of SP 800-171, which provides guidance for protecting the confidentiality of Controlled Unclassified Information (CUI) residing in nonfederal information systems. In August 2015, DFARS clause 252.204-7012 replaced the original NIST 800-53 r4 controls with NIST 800-171, which we detailed earlier here.  CyberSheath has integrated the requirements laid out in NIST 800-171 into our security assessment process that included all NIST 800-53 controls and in-depth reporting on the DFARS-specific controls.

Out of the new 800-171 controls, a handful deal specifically with privileged access.  Privileged Account Management (PAM) is a way for organizations to manage credentials with administrative rights to ensure the accounts stay safe.  CyberArk, a PAM solution and trusted CyberSheath partner, offer a suite of products designed to optimize privilege account creation while keeping the keys to the kingdom safe.  
The following is a list of top 7 ways in which CyberArk's PAM solution can help an organization meet the SP 800-171 guidelines:


Read More

Topics: Privileged Accounts, DFARS, PAM

Improve Healthcare IT Security: 5 Actions You Should Take Now

Posted by Eric Noonan on Feb 3, 2016 12:22:45 PM

Erics_Healthcare5Actions_Blog_Post.jpgModern Healthcare recently reported that "Health insurer Centene Corp. is hunting for six computer hard drives containing the personally identifiable health records of about 950,000 individuals..." While this potential data loss doesn't come close to the monumental data breaches suffered by Anthem, Blue Cross and Blue Shield and others in 2015; it highlights 5 actions that companies of any size in the healthcare space should be taking now to optimize security.

Read More

Topics: Security, eGRC, Privileged Accounts, Security Assessment

5 Reasons that Show How a PAM System Can Prevent Disaster From a RIF

Posted by Yanni Shainsky on Feb 2, 2016 12:25:00 PM

Yannis_PAM-RIF_Blog_Post.jpgThere are many reasons to implement a Privileged Account/Identity Management (PAM) system, including audit and IT security standards compliance, risk mitigation, automation of password management, transparency of user activity, etc. Today we’d like to focus on some of the specific reasons why it is important to implement, maintain, and enforce the utilization of a PAM system for a company that is planning for, or foresees, a significant Reduction in Force (RIF).

As pundits are predicting a bear market in 2016, IT managers are starting to prepare their contingency plans for dealing with potentially hundreds or thousands of employees, whose employment will need to be terminated abruptly. A PAM solution can help mitigate some of the very real risks associated with terminating an employee, particularly one that has key access to IT systems. Employees may react differently in the face of termination. The most technical employee assets may instantly become the biggest liability. The terminating employee may have full administrative access to hundreds of critical servers and network appliances that comprise the environment, creating tremendous potential risk to the company.


Read More

Topics: Privileged Accounts

Privileged Accounts, the Anomaly of Cybersecurity

Posted by Ross Moir on Mar 26, 2015 8:47:00 PM


Read More

Topics: CyberArk, Privileged Accounts

Big Data & The Dentist

Posted by Eric Noonan on Feb 26, 2013 8:23:00 PM


Read More

Topics: Roadshows, Business, eGRC, Security Leadership, Privileged Accounts, RSA ARcher, Security Program Development, Security Assessment