Greylisting Applications with PowerBroker for Windows Risk Compliance
PowerBroker for Windows is designed to elevate privileges on an application based on rules. It does so using technology that does not alter the user but rather the security token for the application at runtime. The results allow a standard user to launch and interact with an application that requires administrative privileges, without changing the user’s permissions. PBW policies and rules are created for any specific application, publisher, path, or a variety of other traits including their arguments and wildcards. Traditionally, these rules are black and white and do not consider the risk of the application itself. This concept is commonly known as greylisting and something no privileged identity vendor has been able to successfully integrate – until now.
PowerBroker for Windows 6.5 introduces a brand new paradigm for greylisting based on regulatory compliance and the associated vulnerabilities with an application. This new concept is patent-pending and called “Risk Compliance.” Traditional rules only pattern match an application for privileged elevation or application denial. Risk Compliance allows rules to be created based on violations to regulatory compliance initiatives and vulnerabilities publicly identified for that application. BeyondTrust has mapped, in real time, application-based vulnerabilities from the Retina vulnerability scanner to dynamically create PowerBroker Rules.
For instance, an administrator can create an application rule based vulnerabilities associated with HIPAA compliance that are over 30 days old and choose to send an alert, denial the application from launching, or restrict permissions of the application when it launches. Security best practices, and many regulations, dictate that critical vulnerabilities should be patched within 30 days (PCI DSS v3 for example). This type of rule would stop an at-risk system from launching the applications with excessive privileges until proper remediation is performed. In addition, extensive reports are available based on these rules to document which systems have application vulnerabilities that violate governance initiatives and what users and applications should not be utilized with administrative (or denied completely) until remediation is conducted.
PowerBroker for Windows Risk Compliance is a game changer. It provides real-time, application-based vulnerability assessment, privileged identity management, file integrity monitoring, session monitoring, and Windows event log monitoring all in one security agent. When the technology is used with the BeyondInsight IT Risk Management Platform, clients will benefit from the BeyondTrust vision of “Context Aware Security Intelligence” for user and asset risks.
For more information, check out our white paper “Powerbroker for Windows: Risk Compliance.”