Break Glass, within computing, is a term used to describe the act of checking out a system account password for use by a human user. Using break glass, the access controls in an application can be bypassed for a critical emergency. A user performs a break glass check out when they need immediate access to an account that they are not authorized to manage. This method is normally used for highest level system accounts such as root accounts for Unix or SYS/SA for a database. These accounts are highly privileged and not usually assigned to a specific human, so instead break-glass limits them by the password time duration, with the aim of controlling and reducing the account’s usage to that which is absolutely necessary to complete a certain task. This presentation will provide information and guidance that will allow decision makers and implementers to successfully utilize the break glass solution in their environments as an effective emergency-access solution.

In this on-demand webinar, join Cyber Security Expert, Derek A. Smith who will cover the following areas.

  • Access Control Model general overview
  • Break Glass Defined
  • Examples of situations when ‘break glass’ emergency access might be necessary
  • The Break Glass Solution a. Pre-staging Accounts b. Distributing Accounts
  • Monitoring Use of Break Glass Accounts
  • Maintenance After Break Glass Account Usage
  • Break Glass Policy
  • Privileged access management (PAM): Using PAM tools to protect shared accounts, superuser accounts, and all privileged user or application service accounts.
Profile photo of Derek A. Smith

Derek A. Smith

Founder, National Cybersecurity Education Center

Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently the Director of Cybersecurity Initiatives for the National Cybersecurity Institute at Excelsior College, responsible to perform complex duties relating to the development and coordination of cyber initiatives at NCI. Formerly, he has worked for a number of IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He has also taught business and IT courses at several universities for over 20 years. Derek has served in the US Navy, Air Force and Army for a total of 24 years. He completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education.