BalaBit Essential Guide To Privileged User Monitoring
BalaBit Essential Guide To Privileged User Monitoring
THE
PRIVILEGED
USER
PRIVILEGED ACTIVITY
www.balabit.com
Why an Essential Guide?
One of the greatest challenges of IT is preventing privileged users from doing things in IT systems that are not
allowed. The activity of a web-site visitor might be limited, but employees—especially system administrators—
often have few restrictions. The greater the access privileges an employee has, the greater the risk they pose
to the company.
Regulatory requirements, a global IT supply chain and sophisticated cyber threats, are forcing companies to
provide more supervision of privileged users to mitigate these risks. Implementing a solution can be challenging,
but today’s technology can help you accomplish this.
Privileged User Monitoring (PUM) tools monitor and control the access of privileged users to IT assets.
This guide provides an overview of PUM, defining the key capabilities of PUM solutions and their benefits.
This guide examines the key challenges various industries face from privileged users and identifies best
practices for using a PUM solution to mitigate these risks.
Privileged users can be categorized as:
are your
Shared administrative accounts exist in most devices and software
administrators. According
applications. These include the Administrator user on Microsoft
to the Glossary of Security
Windows, the root user on UNIX/Linux, or the SYS account on Oracle.
Terms, Definitions, and
Privileged
These accounts hold “superuser” privileges and are often shared
Acronyms Privileged users among IT staff such as system administrators or network admins.
Information System than users and IT personnel. They have a high level of privilege and their
use or misuse can significantly affect the organization’s business.
a general user. These can
Users accessing these accounts usually are business or IT managers.
range from “superusers”
who have accumulated managerial approval. Users accessing these accounts are typically
administrators, help-desk personnel, or IT operators.
privileges over time.
Users Accessing
4
Sensitive Business Systems
These are employees who can access and manage sensitive data
stored in key applications, such as SAP or financial systems. Some
examples are the accountants, the HR managers, or the customer
service employees.
Taken together, these categories mean that almost any employee or contractor who has elevated privileges
to systems or data can be a “privileged user.” Compounding the challenges, access to these high-risk
accounts often are shared, making it more difficult to monitor and control use.
What are Key Security Business users Superusers accessing Cyber threats: Inadequate
improperly accessing “everything” Privileged accounts monitoring of user
Risks related to sensitive data under attack activity
At most companies, users at different Administrators, IT contractors Privileged accounts have emerged Many legacy systems or custom-
Verizon 2016 Data Breach Investigations Report is an inadequate tool for reliable
UNLIMITED AND
UNCONTROLLED ACCESS! monitoring of privileged users.
MANAGERS
How to monitor internal IT staff
“Insider incidents are the hardest (and take the longest) to detect. Of all the incidents,
Business these insider misuse cases are the most likely to take months or years to discover.”
Verizon 2016 Data Breach Investigations Report
System administrators are the most powerful users in an IT environment. Although they often sit at the bottom of the organizational hierarchy,
Challenges they have very high or even unrestricted access rights to operating systems, databases and applications. With superuser privileges on servers,
administrators can directly access and manipulate your company’s sensitive information, including financial and client data or HR records. But
their accountability often is low and they have opportunities to mask their activities.
Sharing administrative passwords - IT personnel often share Using “dead” accounts – Twenty-eight percent of respondents
passwords for privileged accounts, which is a violation of security have accessed systems belonging to employers after leaving the
best practices. A 2015 survey on insider risk by Intermedia found company.
that 65 percent of IT professionals share logins with multiple users.
Bypassing company policies – Intermedia found that 40 percent
This increases risks when an administrator leaves the organization
think it is all right to install applications without consulting IT.
or changes role and shared passwords are not changed.
In a global economy, IT functions often are outsourced to contractors, hosting services and cloud providers. These third parties might provide
essential business and IT operations, including network infrastructure, websites, email, CRM services or Enterprise Resource Planning (ERP)
applications. Your organization must trust these third-party administrators with its data and the operation of business-critical systems.
Giving responsibility to an IT service provider always involves a risk. There will be contractual obligations, but actually monitoring third-party
employees cannot be done with a Service Level Agreement (SLA). There are few reliable and easy-to-use solutions for validating IT SLAs and
verifying billable activities. Measuring Key Performance Indicators (KPI) such as response times or restricting external administrator access
is also challenging. It is essential to actively monitor third-party activities to know what your partners do when they connect to your systems.
How to achieve Compliance with Regulations
Business obey, or risk legal sanctions, up to and including prison for its officers.”
Gartner
A growing body of laws, regulations and industrial standards mandate security policies and practices to ensure privacy and protect customer
Challenges data. Regulations such as the Sarbanes-Oxley Act (SOX), the Payment Card Industry Data Security Standards (PCI-DSS), ISO 27001, and the
arriving EU General Data Protection Regulation (GDPR) require the protection of sensitive information - be it personally identifiable information,
credit card data, or other financial information. For example:
SOX requires CEOs and CFOs to certify that all financial data ISO27001 specifies controls for monitoring system use, system
provided to auditors is accurate. Management can even face administration and operations, and the management of security
prison for serious violations. incidents.
The Control Objectives for Information and Related Technology The PCI DSS requires auditing access to cardholder data and use
(COBIT), requires security monitoring, change management and data of an access control system.
security controls and the ability to monitor user activity and access.
Becoming and remaining compliant with this growing body of regulations means that your organization must have a reliable solution for monitoring
and auditing activities of all privileged users on a granular level.
“36% of the worst security breaches in the year were caused by inadvertent human error.”
Information Security Breaches Survey 2013
The question “Who did what on our server?” is one of the most important and most difficult in the wake of a security incident. Logs for a variety
of devices must be correlated, including the desktop PC, the firewall, and accessed servers. Analyzing thousands of text-based logs can be a
nightmare and might require costly external experts.
Many larger organizations have a Security Operation Center (SOC). But without adequate and reliable data of users’ working sessions, the
investigation of incidents can be expensive and inadequate.
System management tools are improving the ability to handle system errors, but the solution to human error, the number one cause for server
downtime, remains elusive. A tamper-proof session-recording solution is needed to determine who did what, and when.
Cyber Security
Industry Gaps:
The Most
Affected
Sectors
All organizations must pay attention to the security
Cyber
privileged accounts against the operational efficiencies gained through
Security
Privileged User Monitoring (PUM) has various definitions, with each vendor defining it according to the functionality of its products. But there
are some common requirements:
CC
TS
ES
OR
execute,
PR
SC
ZE
REP
ONT
Provide accountability by monitoring
LY
EV
ACTIVITY
3
ANA
ROL
and recording privileged access,
ENT
commands and actions,
REA
what privileged users were doing
S
in the IT environment, through
L-T
SIC
dashboards, reporting and activity DET CT
I
E
M
E
EA
OR
replay. LE
F RT
& S
DIT
Basically, PUM technologies help companies protect AU
critical IT assets and meet compliance requirements by
securing, managing and monitoring privileged access.
Different Vendors – Different Approaches Monitoring
and replaying
user sessions
Privileged User Monitoring vendors approach this market from different directions and with various core competencies, such as password management, identity and There is a wide spectrum of monitoring and
access management, or network forensics. Some vendor’s technologies are marketed as parts of larger solutions. But all of these products are trying to meet the replaying capabilities in PUM solutions.
same challenge: controlling and monitoring the access of privileged users to critical IT assets. Some of the technologies used to do this are: Some collect syslog-like messages, which
can be displayed or replayed based on
Jump hosts (Hop gateways) Proxy gateways timestamps. Others log only keystrokes.
These are web-based interfaces for accessing servers. The jump host is Proxy gateways are the most mature solutions in terms of control granularity Some capture screenshots from user
accessed from a browser, and connects to the target server using a web- and auditing quality. They are placed between the client and the server to sessions, or even record the entire session
based client application. The jump host logs activity on the application. inspect the traffic on the application level. They can be used to selectively in an AVI file. But unless there is a way
However, integration into an existing infrastructure can be difficult and there permit or deny access to protocol-specific channels, to authenticate users and to process and analyze the content of the
can be compatibility issues with server applications. enforce policies. screenshots and video files, these might
not be as useful as they seem.
PROXY
They do not control the remote connection used to access the server and The gateway has full access to the traffic and can even transparently record its full content. solutions index the commands on terminal
cannot restrict file transfers, port-forwarding, file redirection on Windows screens and use Optical Character
Proxy gateways are independent from the client and the monitored server, Recognition (OCR) on graphical screens.
or other activities.
preventing modification of audit information. Audit information can be time-
There is no separation between the agent and its host, so agents can be stamped, encrypted, and digitally signed to prevent tampering. As transparent The monitoring and auditing of user
manipulated. This is essentially the same problem as using the system solutions, proxy gateways require minimum change to existing IT environment. sessions make it possible to conduct
logs to check activities of a superuser, who can influence the system logs. Also, since they operate on the network level, the users can keep using the ad-hoc forensics investigations, analyze
client applications they are familiar with, and do not have to change their recorded data in detail, and create custom
working processes. reports.
1 Control Privileged Access
Access management needs to be developed based on formal policies and processes. When developing access control/
management systems, legal regulations and standards should be taken into consideration, and it is often worth treating
users with privileged access separately.
Best Practices a risk for the organization. If such a situation is discovered, protection measures should be taken. User activity monitoring
systems which feature real-time alerts or can prevent execution of unwanted commands/actions provide much higher added
value than analyzing logs retrospectively.
1
2
Cyber Security
Wrap-up
Privileged users include not just administrators, but a wider group of
employees in an enterprise. Users with high-level privileges present a
security risk for organizations with their access to sensitive systems and
data, and their accounts are subject to compromise by outside attackers.
SIEM tools can be useful, but they have limitations.
Privileged User Monitoring (PUM) tools can be an ideal solution for effectively
monitoring and controlling the activities of privileged users. They can collect
4 audit information for incident investigations and compliance reports. By
implementing PUM, your organization can control the activities of internal
3 IT administrators, powerful business users, and outside partners. Advanced
PUM tools support playback and fast, free-text search of user activities to
dramatically speed up troubleshooting and investigations.
PUM tools also help to fulfill the monitoring requirements of local and
industry regulations, helping you to pass compliance audits quickly and
efficiently. PAM solutions can help you significantly increase your security
posture and regulatory compliance.
More about the Solution Balabit’s
Contextual Security
Intelligence Suite
INFORMATION?
in Budapest, Hungary. Balabit is a leading provider
of contextual security technologies with the mission
of preventing data breaches without constraining
business. Balabit operates globally through a network
of local offices across the United States and Europe
together with partners.