Privileged Identity Management - Why and What it has to offer ?

Why Privileged Identity Management (PIM) ?Password Management

  • Critical passwords of Databases, OS & Routers are stored in text files and/or spreadsheets
  • Password expiry & change: Admins must manually change too many passwords 
  • Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║Ôö£├ÂÔö£├éÔö£├½AdminÔö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║├ö├Â┬ú├ö├▓├╣ passwords shared by all  Administrators

Privileged Access Management

  • Privileged ids (Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║Ôö£├ÂÔö£├éÔö£├½sysÔö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║├ö├Â┬ú├ö├▓├╣, Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║Ôö£├ÂÔö£├éÔö£├½systemÔö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║├ö├Â┬ú├ö├▓├╣, Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║Ôö£├ÂÔö£├éÔö£├½oraÔö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼├║├ö├Â┬ú├ö├▓├╣) and passwords are shared by all the admins
  • Every DBA has unrestricted full access on all aspects of an accessed database

Audit Management

  • Limited Audit Trail of  OS (Unix/Linux/Windows) access and activity
  • Limited Audit Trail of access to databases (Oracle, Db2, SQL Server, MSSQL, MY SQL) 
  • Limited Audit Trail of access to  Routers (Cisco, Juniper...) 

Visibility & Control

  • Limited visibility on the datacenter activities
  • Limited visibility on activities performed by outsourced partners
  • No control /restrictions on device activities

What it must offer:Single Sign On

  • Single Sign On to Servers, Databases and Network Devices
  • Single Sign On to any URL
  • Single Sign On to any thick/thin client (Toad, SQL Developer, OEM, PL/SQL, SAP, Mainframe emulator etc)
  • All passwords are electronically vaulted and direct device access is prevented
  • All device passwords are encrypted and stored securely in the PIM
  • No more manual changing of passwords 

Privileged Access Management

  • Only proxy login to the target devices through the PIM
  • Every activity of privileged users is logged and screen recorded

Audit Management

  • Complete audit trail of all activities on target devices including screen recording
  • Centralized logs for easier auditability

Visibility & Control

  • Complete visibility into every datacentre activity through logs and screen recordings
  • Real time web based access to all logs and screen recordings

Compliance

  • Complies with regulatory standards like ISO27001, RBI, DOT, IRDA, PCI, SOXÔö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö£├®Ôö£├ÂÔö£├éÔö¼├║├ö├Â┬úÔö¼ÔòæÔö£├ÂÔö£├éÔö¼ÔòØ├ö├Â┬╝Ôö¼ÔòØ
  • Simplifies Third Party Audits
Rate this article: 
No votes yet