All posts by admin

SSH Management With BoKS ServerControl Software

ssh management, server control, boksSSH Management has been in the press a lot the last 2 years.

Sponsored reports from analysts have focused on poor key and SSH management practices, a highly speculative assertion that Edward Snowden somehow used keys to gain access to systems (which he denies), and now the US NIST has published a document that, among other things, puts a focus on ‘automated authentication’ used for application-to-application (app2app) or system-to-system/computer-to-computer (c2c) communications.

NIST now recommends that the same level of focus and account management that has been recommended for year for interactive (people) accounts be placed on these automated accounts. Continue reading

Privileged Access & Control Software for Unix & Linux Systems

Server security, access management, privileged access managementUnix & Linux Control

Controlling what someone can do once they have accessed a Unix or Linux server within your environment is a goal for every systems administrator and security analyst to set their sights on.

System admins have a purpose to allowing other users of the system only limited access; users mess things up, and that know that. It could be anything from a noob (or novice administrator) who oversteps their knowledge, or it could be an application developer running a script with root privileges that does something like ‘rm -rf */*’. No sys admin wants to have to explain how that happened, or clean up the mess. Continue reading

Can Too Much Active Directory Be A Bad Thing?

system security, access management, identity access management, foxt Identity Access Management (IAM)

I just read a recent article about IAM (Identity Access Management) projects, and the level of complication that can ensue when trying to plan and implement a project of the scale and scope that a comprehensive IAM project entails.

The theme of the article is that AD (Active Directory), in many enterprises, is the identity store of choice; the idea being that if you could align your enterprise to use a single account, there is an economy of scale, reducing the number of places where access and permissions would need to be managed. Continue reading

Healthcare Network Security Breach – How Deep Does Your Security Run?

Network and Data Security Breaches Are Rising Exponentially

Inetwork security, data breachIn today’s environment of massive data security breaches organizations more than ever need to deploy a defense in depth.

Firewalls no longer are enough to keep hackers out and prevent breaches. Threats can emanate from all directions, and often the first foothold an attacker can get is on a common desktop or laptop of an unsuspecting person who opens an e-mail attachment or visits a malicious website. Defending these systems is hard, but must be attempted. However, in the face of much evidence these systems will remain vulnerable and continue to be the source of many breaches. It is what happens next that must be considered and prepared for.

After the initial successful breach, the goal of an attacker will be to widen their foothold in an organization until they have compromised the valued data, or have control over the valued systems. Attackers spread themselves through additional systems through lateral attacks, jumping from one machine to the next until they can reach their goal. Each step is an opportunity to prevent or detect the attack, or prevent or detect the next attack.

For these reasons layers of security are required to find and prevent each link in the chain of attack. Continue reading

SSH Management – BoKS Implementation and Control

data security, network securitySecure Shell (SSH) Data Security

The Ponemon Institute and Forrester have both published studies that have raised a lot of attention, and questioned the security of SSH deployments, and both focus on the implementation practices and procedures. The ugly truth is that this vital tool is often little considered in the security plans of many enterprises.

The focus of both of these studies is on SSH key management. This can certainly be a very important topic, especially with a standard/default SSH implementation: if you need to use SSH user-keys for authentication it becomes enabled for all accounts that have access to the system. Continue reading

Enterprise System Security Training

Access Management and System SecuritySecurity training is one of the easiest, and hardest, things for an enterprise to do.

First, it takes budget, and these days budget for something ‘soft’ like this can be hard to come by in any organization. Second, it can be hard to measure any return on the investment. This is a problem with security in general, but with an exercise like training an activity like testing the training can be difficult, and it can add to the overall cost. Third, no matter how much training we give people, it always seems like it doesn’t stick. Especially with something like security where we are often asking people to replace what may be perceived as an efficient or simple method of doing something with a more secure practice that could be perceived as a burden.

And, after training managers may have an expectation that the problem is solved, where really it may not be. This leads to the first bit of advice:

Expectation does not replace inspection.

If we do not test for compliance, we can not truly know if we are compliant.

This is a great lesson for managing internal systems. Systems buried deep in our networks, providing critical operations and accessed only by the trusted staff of administrators at an enterprise are often assumed to be secure. The fact is, they are not inherently secure, but need to be secured. What these servers need to be protected against is the possibility of a compromised account, a user or administrator who exceeds his authority, or a disgruntled user who deliberately abuses their privilege to access a system.

Data Access and System SecurityIn the case of deliberate abuse, well, it is really very hard to stop. After all, someone has to have access to provide for the administration of our servers. And, we expect them to behave professionally and in the best interest of the enterprise.

And, there we go again, expecting something.

For Linux and Unix servers providing critical services it is not enough to expect the best. The use of a privilege management tool that can record the privileged activity is essential, and provides the ability to inspect as well.

There is a growing trend in enterprises, recognizing that administrative access to servers needs to be managed, protected and recorded. BoKS ServerControl provides the ability to manage the who, how and what of Linux and Unix access, combining account management, access control and privilege enforcement and monitoring.


You may also be interested in: Best Practices for Unix/Linux Privileged Identity and Access Management

system security, identity access management, foxt, active directoryFoxT Access Management & Governance solutions complement your existing technologies by adding granular control and enforcement of authentication and authorization policies for both privileged and end users.

FDIC Network Security Concerns

information security, security controls, network securityThe Federal Deposit Insurance Corp. (FDIC), responsible for insuring bank deposits, has been identified as failing to implement; controls to authenticate its system users’ identities, and other security programs by the Government Accountability Office (GAO).

Network Security weaknesses were identified during audits conducted by the GAO. Other flaws included restriction of access to sensitive systems and data, the encryption of sensitive data, the monitoring of system access, and conducting background investigations on its employees. Continue reading

June 19th, 2014 – CampIT: Enterprise Risk/Security Management

June 19th, 2014 Chicago, IL

CampIT: Enterprise Risk/Security Management

Overview: In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved. Continue reading

Apr 14-17, 2014 – Red Hat Summit 2014 and Open Source Technology

April 14-17, 2014
San Francisco, CA

The 2014 Red Hat Summit (open source technology) is meant for anyone looking to exponentially increase their understanding of open source technology and identify powerful solutions for their business needs. From community enthusiasts and system administrators to enterprise architects and CxOs, we have sessions and tracks for each level of interest and need.

FoxT Appoints Mark Lambiase as Chief Technology Officer

New Executive Appointment Reflects the Company’s Focus on Driving Innovation in Privileged Access Management

Fox Technologies, Inc., Mountain View, CA – August 16, 2013 – Fox Technologies Inc (FoxT), the industry leader in privileged access management, today announced that Mark Lambiase has been appointed as Chief Technology Officer.  This latest executive appointment reflects the company’s drive to deliver innovative solutions for privileged access management to the market.

Continue reading