Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Enterprise Security Requires Shared and Privileged Account Password Management

    Written by

    Brian Prince
    Published December 2, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Super users may use their powers for good most of the time, but every now and again, an insider breach will remind us how important keeping track of super users and shared accounts truly is.

      According to a survey performed in summer 2008 by the IOUG (Independent Oracle Users Group), almost a third of the 316 IOUG members who responded said users can bypass applications and gain access to application data in the database directly using ad hoc tools. Nearly four in 10 said super-user data abuse in their organization cannot be monitored.

      Keeping track of super users and shared accounts is important for accountability, Burton Group analyst Mark Diodati said. Unfortunately, however, many organizations simply don’t know for sure who has access to shared passwords.

      “They might have 15 system administrators, for example, who have access to the root password, but that doesn’t mean those are the only 15 people that know it,” Diodati explained.

      Part of the problem is that some operating systems, routers and databases have super-user passwords hard-coded into them. Over time, those passwords can become more widely known by employees through the grapevine. In other cases, as Lieberman Software‘s Chris Stoneff pointed out in an article for Microsoft TechNet, enterprises tell the IT department’s entire staff what a password is. The more people who know a secret, the more likely it will become public knowledge, he wrote.

      “If all of those people who know the passwords still work for the company and are otherwise happy and dutiful employees, this access risk is slightly mitigated,” Stoneff wrote. “But you never know when you might have a malicious user to contend with. If any of those users have left the company on bad terms, you have a loose, hostile element that knows how to break into your network using an otherwise untraceable account.”

      When it comes to dealing with these issues, a good approach is to regularly change shared passwords and reduce the chance that knowledge of the current password will be widespread. There are privileged account management products available that can automate this process.

      According to Gartner, the market for SAPM (shared account password management) tools is one of the fastest-growing segments of the identity and access management market. By 2010, the analyst company predicts that more than half of large organizations will be using SAPM tools.

      Passlogix, for example, on Oct. 29 released v-Go Shared Accounts Manager, which enables shared credentials to be securely stored and retrieved and provides authorization and usage tracking. Stephane Fymat, vice president of strategy and product management at Passlogix, said enterprises need to make sure they have the proper procedures in place so that only the appropriate people have access to shared IDs, even if it is only in paper format and applied manually.

      “[Also,] apply the same password policies as you do to conventional passwords, to the extent possible,” Fymat advised.

      Diodati recommended that enterprises also consider strong authentication such as RSA SecurID tokens for privileged users.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.