Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry’s Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges they need to perform their duties. This “least-privilege” security model has obvious merits in theory, but in practice it can be challenging to implement, particularly in Linux and UNIX environments, where it is still all too common for administrators to share passwords to root or other superuser accounts. How, for example, do you give backup administrators the superuser privilege to copy a database and move it to another volume without giving them access to the database itself? While sudo and other tools provide some help, they can be cumbersome to manage and implement and become unworkable in complex environments with hundreds of heterogeneous servers and multiple administrators with widely varying job roles and authority.
This webinar will:
- Examine the real-world challenges around tying entitlements to individuals instead of to root or generic accounts
- Describe the baseline requirements for implementing a least-privilege security model based on user roles
- Explain why existing tools such as sudo fall short in delivering enterprise-class security and manageability
- Show you the value of leveraging Active Directory’s centrally managed identities and its rich group- and role-based management capabilities to provide access control and privilege management services to Linux and UNIX systems
- Demonstrate how the Centrify Suite provides an integrated, consistent and cost-effective solution for least-privilege security management across some 200 of the most widely used versions of Linux and UNIX
This webinar is for:
- All IT personnel who need to know the basics of least-privilege security management
- IT security executives and managers who want to understand how current practices may be putting them at risk and why current tools are failing to address those risks
- IT security managers, infrastructure architects and administrators who are interesting in seeing how existing infrastructure can be leveraged to address these risks