Privilege Access Management

It is in the Security 101 manual that end users (no matter who they are) should not have admin rights on their workstations.  Certain users may be allocated an administrative account for their workstation, but this account must not have internet access or an associated email account and must not be used for normal day to day tasks.  However, in general this is not a recommended approach and also has its share of problems.

The reason for this is simple, admin rights enable applications and processes to execute in the context of a privileged user which in essence means code can get installed or access the system at a low level, in many cases without the user knowing.  Removing admin rights on a Windows workstation will immediately thwart somewhere in the region of 80% of current threats.  It also allows the Domain administrators to take back control of their endpoints.

How often have we heard this from decision makers?

“I don’t mind users having admin rights, they know what they’re doing and don’t click stuff !”

Obviously for those of us who are in the business we know that these kinds of individuals are very hard to convince until they have to pay out tens of thousands to recover from something which could have been avoided for a few thousand pounds…Assuming a recovery is a success.

However, removing admin rights does come with its challenges.

  • Users are unable to install any software
  • Users are unable to install a software update
  • Users cannot manage printers
  • Users cannot change network settings

Plus, many more examples.

There is a solution though, and that is to implement a quality privilege access management solution which gives back the users just enough control on their machines for them to remain efficient, without breaking the security model.

For example:

  • Give access to printer settings allowing users to install and manage queues/
  • Give access to network settings for some users.
  • Being permitted to install and upgrade approved applications from trusted sources
  • Some older applications may require admin privileges to run.  This can be provided whilst the user is still only a standard user type on their system.

There are many solutions out there but one which offers a huge amount of flexibility is DefendPoint by BeyondTrust..  Policies can be as broad or specific are you like right down to different user groups in the Domain having different privileges. 

Comments

Popular posts from this blog

configuring the zmodo ZP-IBi-13W camera to work with Blue Iris Software.

Apple MAC Fake Virus Alert

Evolution