Why ISO/IEC 27001 Compliance is Impossible without Privileged Management

provide a separate database of activity records that you can use to substantiate security policy violations, for example, to support personnel sanctions. One Identity PAM solutions substantially automate privileged account management to help ensure compliance with ISO 27001 control objectives and industry best practices. One Identity PAM solutions enable organizations to automate a substantial number of ISO 27001 Annex A’s reference controls. For example, minimal effort is required for you to ensure that each system user is uniquely identified; the abuse of system accounts is actively being prevented; strong password management settings are enforced; all privileged use activity is being tracked, recorded and logged; audit trails are secured; and explicit approval by authorized parties is required. Having these foundational IT security measures operating in both development and production environments complements standard user activity monitoring, 3 malware and intrusion detection controls — providing the necessary layers for the defense in depth approach to information security needed in today’s information risk climate. The One Identity privileged management solutions discussed in this paper are: • One Identity Safeguard for Privileged Passwords • One Identity Safeguard for Privileged Sessions • Privilege Manager for Sudo One Identity Safeguard for Privileged Passwords Safeguard for Privileged Passwords automates, controls and secures the entire process of granting administrators the credentials necessary to perform their duties. It ensures that privileged access is granted according to established policies with appropriate approvals; that all actions are fully audited and tracked; and that passwords are changed immediately upon their return. Safeguard for Privileged Passwords also eliminates the security exposure posed by embedded privileged passwords required for applications to talk to each other or to database by replacing these hard-coded passwords with programmatic calls that dynamically retrieve the account credential. Safeguard for Privileged Passwords is deployed on a secure, hardened appliance. One Identity Safeguard for Privileged Sessions Safeguard for Privileged Sessions enables authorized trusted workforce members to issue privileged access for a specific period or session to administrators, remote vendors and high-risk users — with full recording and replay for auditing and compliance. It provides a single point of control from which trusted workforce members can authorize connections, limit access to specific resources, allow only certain commands to be run, view active connections, record all activity, alert if connections exceed pre-set time limits, and terminate connections. This solution is also deployed on a secure, hardened appliance and when combined with Safeguard for Privileged Passwords, it can completely hide the account password from the privileged user. One Identity Privilege Manager for Sudo Privilege Manager for Sudo enhances sudo with a central policy server that enables centralized management of sudo and the sudoers policy file, as well as centralized reporting on sudoers access rights and activities. It also performs keystroke logging, complete with search and playback capabilities, for in-depth auditing and compliance requirements. Privilege Manager for Sudo is part of One Identity Privileged Access Suite for Unix. Meeting ISO 27001 requirements with PAM solutions This chart on the following pages provides a detailed mapping of ISO/ IEC 27001:2013 controls to the capabilities of One Identity privileged account management solutions. You can use this mapping to proactively identify and address gaps in your ISO compliance with One Identity PAM solutions. ISO/IEC 27001:2013 controls from Annex A No. Control name How One Identity PAM solutions help Safeguard for Privileged Passwords, Safeguard for Privileged Sessions and Privilege Manager for Sudo support the enterprise-wide access control and privileged access management requirements that are part of every information security policy. In particular, these tools help ensure that authorization and separation of duty (SoD) requirements are defined and enforced across all platforms in your network. A.5.1.1 Policies for information security A.6.1.1 Information security roles and responsibilities A.6.1.2 Segregation of duties A.6.1.3 Contact with authorities Safeguard for Privileged Sessions and Safeguard for Privileged Passwords store recorded sessions and logs in a secure, encrypted vault and Privilege Manager for Sudo securely records keystrokes. These features provide organizations with a legally defensible repository of privileged activities from which they can retrieve court-admissible evidence using proper chain of custody controls. A.6.1.5 Information security in project management With One Identity PAM solutions, organizations can address questions that come from an information security risk assessment conducted at an early stage of a project by providing controls for granting and using privileged access. For example, Safeguard for Privileged Passwords can be used when a project begins to define required security roles, and Safeguard for Privileged Sessions can be used to carefully control and track the actions of privileged sessions for all project users, including remote users and contractors. A.6.2.2 Teleworking (remote access) Organizations allowing remote access need a policy that restricts remote access privileges. Safeguard for Privileged Passwords can restrict unauthorized remote IP addresses for API and CLI sessions. Safeguard for Privileged Passwords, Safeguard for Privileged Sessions and Privilege Manager for Sudo automatically generate randomized passwords to reduce the risk of pass-the-hash, credential harvesting and other exploits that are often associated with remote access. And Safeguard for Privileged Sessions also protects against viruses, malware and other dangerous items that may exist on a remote user’s system because it proxies all sessions to target resources. In addition, it records all actions users perform. A.7.2.1 Management responsibilities Deploying Safeguard for Privileged Passwords and Safeguard for Privileged Sessions provides an excellent way for management to demonstrate its support of the organization’s information security policies, procedures and controls. A.7.3.1 Termination or change of employment responsibilities Safeguard for Privileged Passwords, Safeguard for Privileged Sessions and Privilege Manager for Sudo can quickly terminate access privileges to sensitive information and reduce or remove access to system accounts — even if a user has multiple identities from holding different roles over many years with the organization. 4
Please complete the form to gain access to this content