What Does Break Glass Mean?
In computing “Break Glass” is the act of checking out a system account password to bypass normal access controls procedures for a critical emergency. This provides the user immediate access to an account they may not normally be authorized to access. This method is generally used for highest level system accounts such as root accounts for Unix or SYS/SA for a database. These accounts are highly privileged and break glass limits them by the password time duration, with the aim of controlling and reducing the account’s usage to only when necessary to complete a certain task.
When do you Use a Break Glass Process?
Break glass is a quick means for extending a person’s access rights in exceptional cases and should only be used when normal processes are insufficient (e.g., the helpdesk or system administrator is unavailable). Examples of situations when “break glass” emergency access might be necessary are account, authentication, and authorization problems. In many companies some critical tasks exist which – in exceptional cases – must be performed by a person not usually permitted to perform these tasks. For example, a junior physician would be able to perform certain tasks of a senior physician in case of emergency.
The break glass solution is based on pre–staged emergency user accounts, managed and distributed in a way to make them quickly available without unreasonable administrative delay. The break glass accounts, and distribution procedures should be documented and tested as part of implementation and carefully managed to provide timely access when needed.
A best–practice would place the pre–staged emergency accounts under the responsibility of an individual, such as an Emergency Account Manager, who would be readily available during operating hours and who understands the sensitivity and priority of the emergency accounts. This person would distribute the accounts with a sign–out method requiring an acceptable form of identification be provided by the requestor and recorded before the accounts are made available.
An Example of a Break Glass Process
A "Break Glass Process" would look something like this:
- A user performs a break glass checkout when they need immediate access to an account they are not authorized to manage.
- In the break glass check out process, a notification message is sent to the Emergency Account Manager, informing her a break glass check-out process occurred, however, she cannot approve nor stop the process.
- The checked-out break glass account is recorded for audit purposes.
While the emergency account is being used it must be carefully monitored and audited on a regular basis. Additionally, the system should alert the security administrator when an emergency account is activated. The administrator will make sure the account properly closes when done and a new account established.
How Should You Manage a Break Glass Account?
The best way to manage a break glass account is using a privileged access management (PAM) solution. PAM is all about locking “root” or “admin” credentials up in a hardened vault and tightly controlling access to them for increased security. Enterprise password management provides an extra layer of control over privileged administration and password policies, as well as detailed audit trails on privileged access. In addition to controlling the use, distribution and change of the break glass passwords, PAM solutions can also broker sessions to systems or databases so the privileged user never even sees the passwords or credentials.
Using a break glass solution in your organization is a way to ensure your critical systems are accessible when you need them most.
Derek A. Smith, Founder, National Cybersecurity Education Center
Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently an IT Supervisor at the Internal Revenue Service. He is also owner of The Intercessors Investigative and Training Group (www.theintercessorgroup.com). Formerly, Derek worked for several IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He is also a cyber security professor at the University of Maryland, University College and Virginia University of Science and Technology and has taught for over 25 years. Derek is retired from the US Army and also served in the US Navy, and Air Force for a total of 24 years. He is completing his Doctorate Degree in Organizational Leadership and has completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education. Derek has written several books including Cybersense: The Leaders Guide to Protecting Critical Information, and its companion workbook, and he has contributed to several other books as an author and technical adviser.