keynote 7, steven ringelberg, vanguard

23
Best Practices for Securing Privileged Accounts Steven Ringelberg Chief Operating Officer go2vanguard.com

Upload: guide-share-europe-austracee

Post on 15-Aug-2015

75 views

Category:

Engineering


6 download

TRANSCRIPT

Page 1: Keynote 7, steven ringelberg, vanguard

Best Practices for Securing Privileged

Accounts Steven Ringelberg

Chief Operating Officer

go2vanguard.com

Page 2: Keynote 7, steven ringelberg, vanguard

About Vanguard

Founded: 1986

Business: Cybersecurity experts for large enterprises

Provide software, professional services, and training

Customers: 1,000+ worldwide

More than 20 distributors and resellers serving 50+ countries worldwide

Page 4: Keynote 7, steven ringelberg, vanguard

“Passing Audits” is no solution.

Target Corporation: One of the Largest

Retailers in the United States

“Target was certified as meeting the standard

for payment card industry (PCI DSS) in

September 2013. Nonetheless, we suffered a

data breach…”

now ex-chairman, ex-president, and ex-CEO of Target

Corporation, Gregg Steinhafel (http://buswk.co/1lT9j0X)

Page 7: Keynote 7, steven ringelberg, vanguard

Sophisticated Criminal Enterprises

Hacktivists/Terrorists

Governments

Who is attacking you?

Page 9: Keynote 7, steven ringelberg, vanguard

What is our goal?

Perfect Security?

Better Security?

Good Enough Security?

Security

Page 12: Keynote 7, steven ringelberg, vanguard

Lock Out Privileged Users.

Everyone with high degree of privilege (sysprogs, security administrators, etc.) is like a locksmith: they can make a key to unlock any door/access any resource. Basic Step: Implement an automated tool to prevent privileged users from making their own key/granting themselves access.

Page 13: Keynote 7, steven ringelberg, vanguard

– Multifactor Authentication: a method of

requiring factors from three categories

• Knowledge Factors

• Possession Factors

• Inherence Factors

Multifactor Authentication

Page 14: Keynote 7, steven ringelberg, vanguard

• Two-Factor Authentication

• Two-Step Verification

• Strong Authentication

Multifactor Authentication

Page 15: Keynote 7, steven ringelberg, vanguard

• Knowledge Factors

- Password

- PIN number

- Mother’s maiden name

- Favorite potato chip

Multifactor Authentication

Page 16: Keynote 7, steven ringelberg, vanguard

• Disconnected (RSA, ActivID, etc.) - Sequence-based tokens – singular button, multiple

depresses

- Time-based tokens – change every ‘x’ seconds typically

• Mobile phones – soft token or SMS one-time password

• Connected – Magnetic strip – ATM card, etc.

– Contacts – Smartcard, EMV credit cards,

– USB – zPDT key, RSA SecureID800,

– Wireless – RFID, Bluetooth, Proximity

– Other – Audio Port, iButtons, etc,

Possession Factors

Page 17: Keynote 7, steven ringelberg, vanguard

• Fingerprint

• Hand topography

• Eye (iris)

Inherence Factors

Page 18: Keynote 7, steven ringelberg, vanguard

When a critical or sensitive resource is

accessed, an automated message should

be sent to one or more people so they can

investigate and approve or remediate.

Active Alerts

Page 19: Keynote 7, steven ringelberg, vanguard

What is our goal?

Perfect Security?

Better Security?

Good Enough Security?

Exposure Issues

Page 20: Keynote 7, steven ringelberg, vanguard

Vanguard

Least Privileged • Vanguard Administrator • Vanguard Analyzer

Lock Out • Vanguard Configuration Manager.

• Vanguard Policy Manager.

Multi Factor • Physical tokens • Smartcards aka PIV or CAC cards • Software-based virtual tokens

Alerts • Vanguard Active Alerts • Vanguard Enforcer Vanguard Advisor

Page 21: Keynote 7, steven ringelberg, vanguard
Page 22: Keynote 7, steven ringelberg, vanguard

Questions?

35

Page 23: Keynote 7, steven ringelberg, vanguard

For More Information: Call 800-794-0014

or Email [email protected]

Grazie

Japanese

Thank You English

Merci French

Russian

Danke German

Italian

Gracias Spanish

Obrigado Brazilian Portuguese

Arabic

Simplified Chinese

Traditional Chinese Hindi

Thai

Korean