The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Hitachi ID Privileged Access Manager Overview.

See more at: http://hitachi-id.com/documents/

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by hitachiid, 2017-06-26 15:26:12

Privileged Access Management

Hitachi ID Privileged Access Manager Overview.

See more at: http://hitachi-id.com/documents/

Keywords: privileged access, privileged access control, privileged access management, privileged account activity management, privileged account management, privileged id management, privileged identity management, privileged identity management gartner, privileged identity management vendors, privileged password management, privileged password management gartner, privileged password manager, privileged session manager, privileged user management

1 Privileged Access Management

Managing the User Lifecycle
Across On-Premises and
Cloud-Hosted Applications

Hitachi ID Privileged Access Manager

2 Agenda

• Hitachi ID corporate overview.
• Hitachi ID Suite overview.
• Securing administrative passwords with Hitachi ID Privileged Access Manager.
• Animated demonstration.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 1

Slide Presentation

3 Hitachi ID Corporate Overview

Hitachi ID delivers access governance
and identity administration solutions
to organizations globally.
Hitachi ID solutions are used by Fortune 500
companies to secure access to systems
in the enterprise and in the cloud.

• Founded as M-Tech in 1992.
• A division of Hitachi, Ltd. since 2008.
• Over 1200 customers.
• More than 14M+ licensed users.
• Offices in North America, Europe and

APAC.
• Partners globally.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 2

Slide Presentation

4 Representative Customers

5 Hitachi ID Suite

© 2015 Hitachi ID Systems, Inc. All rights reserved. 3

Slide Presentation

6 Securing Privileged Accounts

Thousands of IT assets: Who has the keys to the kingdom?

• Servers, network devices, databases and • Every IT asset has sensitive passwords:
applications:
– Administrator passwords:
– Numerous. Used to manage each system.
– High value.
– Heterogeneous. – Service passwords:
• Workstations: Provide security context to service
programs.
– Mobile – dynamic IPs.
– Powered on or off. – Application:
– Direct-attached or firewalled. Allows one application to connect to
another.

• Do these passwords ever change?
• Plaintext in configuration files?
• Who knows these passwords? (ex-staff?)
• Audit: who did what?

7 Project Drivers

Organizations need to secure their most sensitive passwords:

Compliance: • Pass regulatory audits.
Security: • Compliance should be sustainable.
Cost:
Flexibility: • Eliminate static passwords on sensitive accounts.
• Create accountability for admin work.

• Efficient process to regularly change privileged passwords.
• Simple and effective deactivation for former administrators.

• Grant temporary admin access.
• Emergencies, production migrations, workload peaks, etc.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 4

Slide Presentation

8 Participants in PAM

Hitachi ID Privileged Access Manager works by randomizing privileged passwords and connecting
people and programs to privileged accounts as needed:

Privileged Get new, random passwords daily or at the desired frequency.
accounts
Must sign into HiPAM when they need to sign into administrator accounts.
IT Users Are automatically updated with new passwords values.
Use the HiPAM API instead of embedded passwords.
Services Define policies regarding who can connect to which privileged account.

Applications Monitor access requests and privileged login sessions.

Security
officers

Auditors

9 HiPAM Impact

Feature Impact Benefit
Randomize passwords daily Disconnect former IT staff.
Eliminate static, shared
Controlled disclosure passwords. The right users and programs
can access privileged accounts,
Control who can see others cannot.
passwords. Accountability.
Faster troubleshooting.
Logging & Reporting Monitor password disclosure. Physical compromise does not
expose passwords.
Encryption Secure passwords in storage Survive server crashes and site
Replication and transit. disasters.

Passwords stored on multiple
servers, in different sites.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 5

Slide Presentation

10 Understand and Manage the Risks

A privileged access management (PAM) system becomes the sole repository of the most important
credentials.

Risk Description Mitigation
Disclosure • Encrypted vault.
• Compromised vault • Strong authentication.
→ security disaster. • Flexible authorization.
• Replicate the vault.
Data Loss • Destroyed vault
Non-availability → IT disaster. • One vault in each of 2+ sites.

• Offline vault
→ IT service interruption.

Customers must test failure conditions before purchase!

11 Randomizing Passwords

Push random • Periodically (e.g., between 3AM and 4AM).
passwords to systems: • When users check passwords back in.
• When users want a specific password.
• On urgent termination.

• Suitable for servers and PCs on the corporate network.

Pull initiated by user • Periodically.
devices: • Random time-of-day.
• Opportunistically, when connectivity is available.

• Suitable for off-site laptops, systems in a DMZ.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 6

Slide Presentation

12 Authorizing Access to Privileged Accounts

Two models: permanent and one-time.

Permanent ACL One-time request Concurrency control

• Pre-authorized users • Request access for any • Coordinate admin
can launch an admin user to connect to any changes by limiting
session any time. account. number of people
connected to the same
• Access control model: • Approvals workflow account:
with:
– Users ... belong to – Can be >1.
– User groups ... are – Dynamic routing. – Notify each admin
– Parallel approvals.
assigned ACLs to – N of M authorizers. of the others.
– Managed system – Auto-reminders.
– Escalation. • Ensure accountability of
policies ... which – Delegation. who had access to an
contain account at a given time.
– Devices and
applications

• Also used for API
clients.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 7

Slide Presentation

13 Fault-Tolerant Architecture

HitachiID Site A
Privileged Access Manager

User Password Crypto keys LDAP/S, Windows
Vault in registry NTLM server or DC
Admin
Workstation 101001010110000111

HTTPS SSH,
TCP/IP+AES
Load
Balancer

Replication Unix, Linux
TCP/IP + AES

TCP/IP Various
+AES Target
Systems
Password 110100001011000111 Firewall
Vault Site C
Crypto keys Proxy
in registry

HitachiID Site B
Privileged Access Manager

© 2015 Hitachi ID Systems, Inc. All rights reserved. 8

Slide Presentation

14 Included Connectors

Many integrations to target systems included in the base price:

Directories: Servers: Databases:
Any LDAP, AD, WinNT, NDS, Windows NT, 2000, 2003, Oracle, Sybase, SQL Server,
eDirectory, NIS/NIS+. 2008[R2], 2012, Samba, DB2/UDB, Informix, Progress,
Novell, SharePoint. ODBC, Oracle Hyperion EPM
Shared Services, Cache.
Unix: Mainframes, Midrange:
Linux, Solaris, AIX, HPUX, 24 z/OS: RACF, ACF2, HDD Encryption:
more variants. TopSecret. iSeries, McAfee, CheckPoint,
OpenVMS. BitLocker, PGP.
ERP:
JDE, Oracle eBiz, Collaboration: Tokens, Smart Cards:
PeopleSoft, PeopleSoft HR, Lotus Notes, iNotes, RSA SecurID, SafeWord,
SAP R/3 and ECC 6, Siebel, Exchange, GroupWise, RADIUS, ActivIdentity,
Business Objects. BlackBerry ES. Schlumberger.

WebSSO: Help Desk: Cloud/SaaS:
CA Siteminder, IBM TAM, ServiceNow, BMC Remedy, WebEx, Google Apps, MS
Oracle AM, RSA Access SDE, HP SM, CA Unicenter, Office 365, Success Factors,
Manager. Assyst, HEAT, Altiris, Clarify, Salesforce.com, SOAP
RSA Envision, Track-It!, MS (generic).
System Center Service
Manager

© 2015 Hitachi ID Systems, Inc. All rights reserved. 9

Slide Presentation

15 Types of Privileged Accounts

Definition: Administrator Embedded Service
Challenges:
• Interactive logins. • One application • Run service
• Client tools: connects to programs with
another. limited rights.
PuTTY, RDP, SQL
Studio, etc. • DB logins, web • Windows requires a
• May be used at a services, etc. password!
physical console.
• Interactive logins
for troubleshooting.

• Access control. • Authenticating apps • Avoiding service
• Audit/accountability. prior to password interruption due to
• Single sign-on. disclosure. failed notification:
• Session capture.
• Caching, key
management.

16 Infrastructure Auto-Discovery

Find and classify systems, services, groups, accounts:

List systems Evaluate import rules Probe systems

• From Hitachi IT • Manage this system? • Local accounts.
Operations Analyzer. • Attach system to this • Security groups.
• Group memberships.
• From AD, LDAP policy? • Services.
(computers). • Choose initial • Local svc accounts.
• Domain svc accounts.
• From text file ID/password.
(IT inventory). • Manage this account?
• Un manage this
• Extensible:
DNS, IP port scan. system?

• Hitachi ID Privileged Access Manager can find, probe, classify and load 10,000 systems/hour.
• Normally executed every 24 hours.
• 100% policy driven - no scripts.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 10

Slide Presentation

17 Alternatives to PW display

Launch session (SSO) • Launch RDP, SSH, • Password is hidden.
Temporary entitlement vSphere, SQL Studio, ... • Convenient (SSO).

Copy buffer integration • Extensible (just add a CLI). • Native logging shows
actual user.
• Group membership (AD,
Windows, SQL, etc.). • Convenient for platform
admins.
• SSH trust
(.ssh/authorized_keys). • Flexible (secondary
connections, open-ended
• Entry in /etc/sudoers files. tooling).

• Inject password into copy • Convenient.
buffer.
• Useful at the physical
• Clear after N seconds. server console.

Display • Show the password in the
UI.

• Clear after N seconds.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 11

Slide Presentation

18 Test Safety Features

To prevent a security or an IT operations disaster, a privileged password management system must be
built for safety first:

Unauthorized • Passwords must be encrypted, both in storage and
disclosure transmissions.

Data loss, • Access controls should determine who can see which
Service Disruption passwords.

• Workflow should allow for one-off disclosure.
• Audit logs should record everything.

• Replicate all data – a server crash should be harmless.
• Replication must be real time, just like password changes.
• Replication must span physical locations, to allow for site

disasters (fire, flood, wire cut).

• These features are mandatory. • Evaluate products on multiple, replicated
• Failure is not an option. servers.
• Ask Hitachi ID for an evaluation guide.
• Turn off one server in mid-operation.
• Inspect database contents and sniff

network traffic.

© 2015 Hitachi ID Systems, Inc. All rights reserved. 12

Slide Presentation

19 HiPAM Unique Technology

Multi-master, • Trivial to setup, no cost, zero effort to recover from disaster.
active-active • Geographically distributed: maximum safety.

Not just • Temporary group elevation, SSH trust relationships.
passwords • Suspend/resume VM (lower cost of cloud!).

Robust • Reminders, escalation, delegation, concurrent invitations.
workflow • Not limited to "two keys" scenario.

Control • Manage AD, LDAP groups that determine who has access.
groups • Requests, approvals, SoD policy, certification, reports.

Single • Credential vault. • Service account
product, • Password randomization. passwords.
not "suite" • Access control policies.
• Session monitoring, • Embedded passwords.
• 110, extensible connectors.
playback.

20 Request one-time access

Animation: ../../pics/camtasia/v82/hipam-request-access/hipam-request-access.cam

21 Approve one-time access

Animation: ../../pics/camtasia/v82/hipam-approve-request/hipam-approve-request.cam

© 2015 Hitachi ID Systems, Inc. All rights reserved. 13

Slide Presentation

22 Launch one-time session using a privileged account

Animation: ../../pics/camtasia/v82/hipam-privileged-login-session/hipam-privileged-login-session.cam

23 Request, approve, play recording

Animation: ../../pics/camtasia/v82/hipam-view-playback/hipam-view-playback.cam

24 Report on requests for privileged access

Animation: ../../pics/camtasia/hipam-71/hipam-06-admin-reports.cam

25 HiPAM: PuTTY to Linux

Animation: ../../pics/camtasia/pam-linux-preauth/pam-linux-preauth.cam

26 Activate Mobile Access

Animation: ../../pics/camtasia/v9/enable-mobile-device-1/enable-mobile-device-1.mp4

© 2015 Hitachi ID Systems, Inc. All rights reserved. 14

Slide Presentation

27 Password display

Animation: ../../pics/camtasia/v9/pw-disp-scaled-1/pw-disp-scaled-1.mp4

28 Account set checkout

Animation: ../../pics/camtasia/v9/account-set-checkout-1/account-set-checkout-1.mp4

29 Summary

Hitachi ID Privileged Access Manager secures privileged accounts:
• Eliminate static, shared passwords to privileged accounts.
• Built-in encryption, replication, geo-diversity for the credential vault.
• Authorized users can launch sessions without knowing or typing a password.
• Infrequent users can request, be authorized for one-time access.
• Strong authentication, authorization and audit throughout the process.

Learn more at Hitachi-ID.com/Privileged-Access-Manager

500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com

ww w.Hitachi-ID.com Date: May 22, 2015 File: PRCS:pres


Click to View FlipBook Version