9 Strategies for Getting Control of Unix/Linux Privileged Accounts

Derek A. Smith, Founder, National Cybersecurity Education Center

Derek A. Smith, Founder, National Cybersecurity Education Center

Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently the Director of Cybersecurity Initiatives for the National Cybersecurity Institute at Excelsior College, responsible to perform complex duties relating to the development and coordination of cyber initiatives at NCI. Formerly, he has worked for a number of IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He has also taught business and IT courses at several universities for over 20 years. Derek has served in the US Navy, Air Force and Army for a total of 24 years. He completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education.

About this Webinar

In the clutches of an external attacker, or an insider gone rogue, Unix and Linux privileged accounts represent perhaps the most glaring cyber security threat to businesses and government organizations today. Privileged accounts are routinely required to perform mundane administration as well as for “break the glass” emergency access scenarios, but their mere existence, let along their use, exposes organizations to considerable security risk. Attackers access privileged accounts with alarming frequency. This is often initially accomplished through a low-level exploit, with the attacker then moving laterally until they can escalate their privileges. Once inside, an attacker can expose sensitive data, conduct unauthorized transactions, plant malware, and destroy systems, while erasing traces of his/her presence each step of the way. Today, it is essential to have a strategy in place to control and audit Unix/Linux privileged access. Many regulations, such as Sarbanes-Oxley, the Payment Card Industry Data Security Standard (PCI DSS), the Federal Energy Regulatory Commission (FERC), and HIPAA, also mandate controls and oversight for privileged access. Moreover, business partners are increasingly demanding a review of controls associated with privileged accounts as part of their Statement on Auditing Standards (SAS) 70 reviews. In this webinar, you will gain an understanding of strategies and technologies that can help you get control and auditability over your Unix/Linux privileged accounts. We will examine:

  • How to prevent root escalation on Unix and Linux systems
  • How PAM tools can help mitigate risks associated with elevated access on Unix/Linux systems
  • Appropriate password change frequency + checkout methods + programmatic password caching
  • Privileged single sign-on (SSO)
  • How to manage security information, identity, and privilege delegation on Unix/Linux systems
  • Physical security of privileged systems

The webinar will also impart you with 9 basic principles for Unix/Linux security, and an action plan you can immediately apply to strengthen Unix/Linux privileged account security.  

9 Strategies for Getting Control of Unix/Linux Privileged Accounts

Derek A. Smith, Founder, National Cybersecurity Education Center