(Words by Morey Haber, Chief Technology Officer, BeyondTrust)
http://ameinfo.com/wp-content/uploads/2018/10/Morey-Haber-CTO-BeyondTrust-1-200x300.jpg 200w, http://ameinfo.com/wp-content/uploads/2018/10/Morey-Haber-CTO-BeyondTrust-1-768x1153.jpg 768w, http://ameinfo.com/wp-content/uploads/2018/10/Morey-Haber-CTO-BeyondTrust-1-682x1024.jpg 682w" sizes="(max-width: 414px) 100vw, 414px">
For all of information technology’s benefits, most organizations are well acquainted with the by-product of rapid IT advances and expansion―increased cybersecurity risk. Indeed, growing cybersecurity concerns correlate directly with your organization’s expanding digital universe and the number of people given some level of authority to operate within it.
A swiftly expanding digital perimeter—both physical and logical—inevitably makes organizations more vulnerable to the so-called cyberattack chain, regardless of how far the perimeter has extended. The attack process starts with a successful perimeter breach or insider malfeasance, followed by the theft of “privileged” user credentials through either poor privilege security management or exploitation of a vulnerability. With privileged user IDs and passwords in hand, an attacker can then move laterally throughout an organization, seeking its most valuable digital resources.
As the IT perimeter continues to evolve, threats and risks become increasingly difficult for IT and security teams to manage as they try to connect the dots between privileged accounts, vulnerabilities, exploits, and successful data and system breaches. This barrier is a big reason why compromised privileged credentials are such a dominant source of successful attacks, accounting for 80% of all cyber breaches, Forrester Research estimates.
Not all of these breaches involve cyberthieves or other outsiders stealing and then exploiting privileged credentials. In many cases, privileged users cause problems on their own, usually inadvertently through poor security practices but sometimes malevolently. Whether intentional or accidental, privilege-related breaches can bring devastating consequences.
Regardless of the perpetrators and their intentions, it’s clear that organizations generally haven’t done enough to understand and manage their privileged accounts. That’s a big problem because the need for privileged account access—and management—will only become more pressing as IT and communications environments continue to expand beyond traditional firewalls.
The Expanding IT Perimeter
The days of computer users sitting only within the four walls of a secure and digitally isolated building are a distant memory. The adoption of mobile devices and cloud computing dramatically expanded the digital footprint of companies. The more recent emergence of Internet of Things (IoT) devices is accelerating this expansion, and the spread of new processes and technologies, from DevOps to artificial intelligence, is adding ever more complexity across the digital landscape.
According to our 2018 study of NGT trends and issues, 78% of the participating IT professionals said security was a challenge associated with NGT adoption. 20% said they had experienced five or more breaches related to NGTs over the prior 24 months, resulting in data loss, IT outages, or compliance alerts. What was more revealing was that the cause of 85% of all NGT-related breaches involved privileged access—either authorized users unintentionally or intentionally doing inappropriate things or outsiders gaining privileged access to steal credentials.
READ: FireEye: Two-thirds of email traffic wasn’t ‘clean’ in H1 2018
Adopting a Privilege-Centric Approach
It’s time for organizations to get serious about placing their privileged accounts under tight control, regardless of their digital presence. To this end, a partial or piecemeal solution won’t do. Organizations require a comprehensive approach to privileged access management (PAM) that encompasses not just the full community of credentialed users but also the many technologies and systems—existing and emerging—that they can access.
The first step to a successful PAM deployment is to perform a comprehensive inventory of your organization’s digital assets, processes, and—in this case—privileged accounts. Only after completing this initial discovery process can you perform a detailed risk analysis that identifies the most valuable or most sensitive data and systems, along with the most likely threats to their security.
Another major element of a successful PAM strategy is controlling user and application access rights as securely as possible. Often that means rescinding existing privileged credentials if a user’s or application’s need to access sensitive resources should be limited. By enforcing least privilege and appropriate credential usage and providing the lowest level of actual privileges needed to perform a task, some PAM solutions can help control mushrooming numbers of privileged accounts.
PAM solutions can also block access on the fly, by inspecting scripts; verifying commands; and, in some cases, performing dynamic vulnerability management. The goal is to reduce an asset’s risk, whether targeted via a privileged attack vector or through a vulnerability and exploit combination. With 80% of attacks traced to privileged credentials, deploying a comprehensive PAM solution is among the most effective ways to greatly reduce the risk of cyber breaches, regardless of the attack vector.
Lastly, organizations need to take a risk-based approach to planning, prioritizing, and implementing PAM solutions. Organizations new to PAM may consider applying a PAM layer to their traditional business infrastructure and processes, or they may opt to prioritize deployment for the NGTs that pose the greatest risk.
READ: Hackers are targeting students with nearly undetectable techniques
The answer—A sophisticated solution
To provide these and other advanced PAM functions, organizations should consider a fully integrated and comprehensive PAM platform that provides one set of interfaces for password and session management, privilege management, vulnerability management. The solution should also be able to be deployed in any format: as software; as a virtual or physical appliance; or as a cloud service.
By deploying multiple platform components as software or appliances, organizations can scale their solution to accommodate any environment by using a simple, role-based model for features, functions, and secure architecture. Such an extensible-platform approach can provide best-of-breed capabilities to protect privileges across traditional, emerging, and next-generation technologies.
READ: Infographic: Email marketing optimization hacks & case studies
The post No such thing as too secure: Privilege security for the new perimeter appeared first on AMEInfo.
ایده ها برای استارت آپ موجب رونق کسب و کارهای اینترنتی
آینده / استارت آپ
استارتآپها ادبیات بازار سرمایه را بلدند؟
استارت آپ
صدور تاییدیه دانش بنیانی شتابدهنده صدر فردا
اخبار / استارت آپ
اپلیکیشن شارژاپ
گوناگون / استارت آپ / رپرتاژ آگهی / بازتاب
جذابترین ایدههای B2B در سال 2020
استارت آپ
تعریف استارت آپ startup
دانشنامه / استارت آپ / مقاله
۱۰ استارتاپ که بدون سرمایه به سوددهی رسیدند
استارت آپ
ایده ها و پیشنهاد برای استارت آپ در سال جدید
راهکارها و ترفند ها / استارت آپ
استارتآپ ایرانی؛ مرجع اول زنان افغان
استارت آپ
شروع یک کسب و کار نوپا پلتفرمی
استارت آپ
برنامه شبکه اجتماعی تیندر
گوناگون / معرفی وب سایت / استارت آپ
10 استارت آپ برتر تاکسیرانی جهان
استارت آپ
پخت پیتزاهای هیجان انگیز با هوش مصنوعی
آینده / استارت آپ
ایده های استارتاپی فراموش شده
دورنما / بازار / استارت آپ
اپل، استارتاپ فناوری خودران Drive.ai را تصاحب کرد
استارت آپ
بررسی مهمترین چالشهای تیمهای استارتاپی
استارت آپ
نگرانی کاربران از هزینه تعمیر و تامین قطعات
گفت و گو / بازار / استارت آپ
مصاحبه با مدیرعامل و بنیانگذار استارتاپ Moz
گفت و گو / استارت آپ
آشنایی با استارت آپ های حوزه مدیریت آب
استارت آپ
راه اندازی ۷۰ استارت آپ توسط نخبگان ایرانی
استارت آپ
معرفی هشت استارتآپ موفق ایرانی در حوزه فینتک
استارت آپ
اولین مرورگر شرعی دنیا
استارت آپ
از صفر تا پیست
استارت آپ
معرفی برترین استارتاپهای CES 2019
اخبار / استارت آپ
ازدواج با فرد ثروتمند یا خوش اخلاق
سبک زندگی / برترین ها
هدف از تشکیل خانواده چیست
سبک زندگی
اول عاشق شویم، بعد ازدواج کنیم
سبک زندگی
خانواده چیست
سبک زندگی
مشاوره خانواده چیست؟
سبک زندگی
اولویتهای پسانداز خانواده چیست؟
سبک زندگی
هزینه های خانواده چیست؟
سبک زندگی
راهکار بیشتر حرف زدن اعضای خانواده چیست؟
سبک زندگی
چرخه زندگی و خانواده چیست؟
سبک زندگی
اهداف و اصول تشکیل خانواده
سبک زندگی
آموزش جنسی نادرست به سبک خانم جلسه ای
سبک زندگی
لطفا تماشاچی آزار زنان نباشید!
سبک زندگی
کودک آزاری؛ از نشانهها و دلایل تا درمان
گزارش / سبک زندگی / پرورش کودکان
روش های تعیین هدف و مسیر زندگی برای رسیدن به موفقیت
سبک زندگی
مجله اینترنتی دیپروتد نشریه مجازی بر بستر اینترنت به مسائل آموزشی و مقالات پیرامون کسب وکار های نوپا یا استارت آپ ها و سبک زندگی است فعالیت و محتوای مطالب ارائه شده در سایت همه بیشتر در حوزه مدیریت، کارآفرینی ، روانشناسی ،اقتصادی و فناوری اطلاعات است نام اصلی دیپروتد "ریشه های عمیق " با مجوز رسمی از هیات نظارت برمطبوعات مشغول به فعالیت است
ما را در شبکه های اجتماعی دنبال کنید
تمامی حقوق برای سایت فوق محفوط است.
S-TECH: ایرانی توانمند | Powered by: مجله اینترنتی دیپروتد