Security, et al

Randy's Blog on Infosec and Other Stuff

«  Randy's Review of a F... | Vulnerability Scanning Do... »

Beyond Root: Securing Privileged Access in Linux

Wed, 17 Dec 2014 15:34:21 GMT

Like UNIX, at its core, Linux’s secure model is basically monolithic. You either have root access or you don’t. But root access is too powerful for so many reasons. And routinely using the actual root account – while easy and still frighteningly common – is so dangerous it borders on negligent. Auditors know about root and what questions to ask. In fact some auditors already have their risk findings written up regarding root and privileged access before they even begin assessing your environment.

The good news is that there are a variety of things built on top of Linux to make privileged access more granular, more accountable, more auditable and overall more secure and in this webinar I will show you how root access and least privilege management works in Linux. You will learn about how administrators can still do their work efficiently without logging on as root. Then we'll see how sudo work and how you can use sudo to:

  • limit which commands users can execute
  • ensure accountability between admins
  • eliminate logons as root
  • create least privilege profiles that allow people to get their work down without sacrificing security

We will also discuss things like:

  • How to monitor misuse of root access
  • How to protect root accounts and passwords
  • Controlling shell access
  • Auditing logons, commands and other activity

Join us for this technical and practical webinar. Then learn from BeyondTrust how you can take privileged access control to the next level and implement true least privilege effortlessly across multiple systems from a central point of control.

Click here register now!

email this digg reddit dzone
comments (0)references (0)

Related:
Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
5 Indicators of Endpoint Evil
Severing the Horizontal Kill Chain: The Role of Micro-Segmentation in Your Virtualization Infrastructure
Anatomy of a Hack Disrupted: How one of SIEM’s out-of-the-box rules caught an intrusion and beyond

Comments disabled

powered by Bloget™

Search


Categories
Recent Blogs
Archive


 

Additional Resources