randy franklin smithLike UNIX, at its core, Linux’s security model is basically monolithic – you either have root access or you don’t. But root access is too powerful for so many reasons; routinely using the actual root account – while easy and still frighteningly common – is so dangerous it borders on negligent. Auditors know about root and what questions to ask. In fact some auditors already have their risk findings written up regarding root and privileged access before they even begin assessing your environment! Considering recent breaches exploiting privileged credentials, as well was continuing audit recommendations for accountability on account usage and reduction in privileges, how do IT organizations limit who has assess to root accounts to reduce the risk of compromises without hindering productivity? The good news is that there are a variety of things built on top of Linux to make privileged access more granular, more accountable, more auditable and overall more secure. BeyondTrust is hosting a webcast on January 27, 2015 where I will show you how root access and least privilege management works in Linux. You will learn about how administrators can still do their work efficiently without logging on as root. I’ll will show you how sudo works and how you can use sudo to:
  • Limit which commands users can execute
  • Ensure accountability between admins
  • Eliminate logons as root
  • Create least privilege profiles that allow people to get their work down without sacrificing security
You will also learn best practices on:
  • How to monitor misuse of root access
  • How to protect root accounts and passwords
  • Controlling shell access
  • Auditing logons, commands and other activity
But sometimes sudo isn’t enough. Sometimes organizations need more than what sudo has to offer to better secure access to their critical Linux systems. During the webcast, BeyondTrust will review options for replacing sudo with a commercially supported solution. BeyondTrust and I will show you how to take privileged access control to the next level and implement true least privilege effortlessly across multiple systems from a central point of control. Join us for this technical and practical webcast. Register Now >>