1 / 26

Audit Issues regarding Passwords on Elevated Privilege Accounts

Gene Scheckel Global Internal Audit. Audit Issues regarding Passwords on Elevated Privilege Accounts. Audit Issues on Elevated Privilege Accounts. Passwords are not changed regularly.

alden-wynn
Télécharger la présentation

Audit Issues regarding Passwords on Elevated Privilege Accounts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Gene Scheckel Global Internal Audit Audit Issues regarding Passwords on Elevated Privilege Accounts

  2. Audit Issues on Elevated Privilege Accounts Passwords are not changed regularly. Passwords on shared accounts are not changed when an individual with knowledge of the passwords leaves the department.

  3. Audit Issues on Elevated Privilege Accounts On shared accounts, there is no individual accountability. On shared accounts, passwords are stored in a location that is widely accessible to large group of people.

  4. Audit Issues on Elevated Privilege Accounts Password complexity is not enforced. System default passwords from the software vendor are still active in the production environment.

  5. Richard Leonard Global Information Protection & Assurance 918-661-3918 Richard.e.leonard@conocophillips.com Business and Policy Considerations for an Electronic Password Vault

  6. 1st Core StandardNetwork Administration System and application protection Monitoring system security and usage Workforce and staffing Separate Login ID for administrator Granting system privileges necessary for them to carry out their jobs Administration and management of business-critical systems must not become dependent upon a single individual Immediate withdrawal of system privileges from staff in trusted positions This chapter and associated standards are the minimum requirements to be applied by Information Technology (IT) Administrators in order to secure Company Information Assets. Administrators are in a special position of trust within the Company, being in charge of the critical computer infrastructure and data on which the Company depends, in order to do business. It is therefore vitally important that Administrators read, under-stand and fully implement the contents of this chapter. Standards in this chapter must be used in conjunction with the rest of the standards chapters. References are inserted in applicable sections to point to related chapters.

  7. 2nd Core Standard Logon and Authentication Accounts and accounts management System Access Authentication Password requirements Activity monitoring and logs Local account - a User ID, functional ID, or service ID that is locally used and not defined to be global. Examples are Root (Unix), System (Oracle), and Administrator (Windows) Functional IDs - shared user accounts, usually associated with a role created for various job functions and permissions to perform certain operations Service IDs - non-user accounts assigned to system tasks or business applications

  8. Functional & Service AccountIssues Solved With a Password Vault Functional Account Shared password for many devices known by many Administrators Service Accounts shall not be used for: Regular interactive login. Any activity where individual accountability must be maintained Have annually expiring passwords when more frequent password changes unacceptably increase the risks/business impact associated with password changes

  9. Business Drivers Audit non-compliance findings with PCI, HIPAA, and SOX audits Lack of individual accountability when using shared passwords on privileged accounts Ongoing burden of password changes in application accounts Ongoing break-fix events caused by unsynchronized password changes Ongoing unsecure methods for communicating passwords amongst Administrators Disparate privileged account management models

  10. Balance of Operational and Security Considerations Common functional account use by Administrators Automated password changes for applications and systems Password changes because of staff rotations Reduced break-fix because of password changes Activity monitoring and staff accountability Passwords confidential and protected Multiple passwords for a functional account Strong password maintenance Best practices insider threats Best practices, password change cycle Best practices log monitoring and accountability Passwords encrypted in transit and at rest Operations Security

  11. Risks to Implement a Password Vault New Technology Risk – Password Vault environment May not implemented correctly can’t support Information Services effectively on an ongoing basis Support and applications groups resisting a privileged account management model that changes procedures and culture User password maintenance may bypass passwords managed by a password vault Professional services may not be provided on a timely basis Project funding to implement the vault may be constrained Password Vault may not be technically compatible with some applications, devices, and systems Compliance rather than ROI funding justifications Management support and emphasis

  12. Results & Questions Password vault selected Infrastructure architected and implemented Password vaulting efforts initiated Questions at end of joint presentation

  13. Glenn Davis Sr. Analyst, Identity Management/Vault Administrator Glenn.R.Davis@conocophillips.com Technical Aspects of the Password Vault

  14. Why we chose Cyber-Ark Most Flexibility Windows (AD and local accounts) Unix Cisco IOS Oracle Sybase OS390 Microsoft SQL Server .NET (V5.0) SAP (V5.0) Good Reputation for Reliability and Support Ability to handle hard-coded (scripted) passwords

  15. What is a “Password Vault”? Vault Safe 1 Safe 2 Safe 3

  16. Password Vault Components Password Vault Web Access Central Password Manager Password Vault Application Password Manager

  17. Retrieving a Password with a Script Set sdk = CreateObject(“COMPasswordSDK.PasswordSDK”) Set PassReq = CreateObject(“CompPasswordSDK.PSDKPasswordRequest”) With PassReq .Safe = “Test” .Object = “Passwo5” .CredFilePath = “C:\CredFiles\AppUser.cred” .Reason = “Just experimenting with EPV” End With Set Pass = sdk.GetPassword(PassReq) With Pass MsgBox “Password is:”& .Content End With

  18. Questions?

More Related