blog


6 Ways Throttling Privileged Access Can Surge Your MSP Business

Login and Password

Morey HaberAccording to the 2016 Verizon Data Breach Investigations Report, more than 60 percent of attacks on businesses leverage privileged access – the root and administrator accounts most IT teams use daily – often without regard to the risk they represent. Passwords to these accounts are rarely changed; are known by multiple individuals, often including contractors and temporary employees; and are frequently reused on a range of systems, accounts and applications.

MSPs must help customers get a handle on out-of-control credentials.

Privileged access management, or PAM, is the part of identity management focused on administrative or root accounts within the IT infrastructure. PAM is frequently used as a data security and governance tool to help companies meet prevent internal and external data breaches stemming from abuse or misuse of privileged accounts. It’s a key component of vulnerability management – the practice of identifying, classifying, remediating and mitigating vulnerabilities on a continuous basis – and is a fundamental component of many regulatory-compliance initiatives.

Verizon’s DBIR reveals nine areas of vulnerability that partners must address. Download the free report.

It can also help solve seven problems plaguing most customers today.

1. Enabling anytime, anywhere secure access

Companies must be able to control access to data across all devices and environments, including traditional and virtual desktops, servers, databases and applications, Internet of Things devices and tablets and smartphones. With a managed-services offering for privileged access, an administrator or a contractor can authenticate against select assets remotely (or on premises) and provide sessions that are fully documented (session recording and keystroke logging); controlled via a documented workflow and approval process; and restricted based on policies around factors including time/date and location.

2. Auditing and reporting on privileged activity

The ability to record and replay any activity – including mouse actions, keystrokes and user interface screen captures – by privileged accounts across network and cloud environments is essential to mitigating the risks of a data breach and proving compliance. Ensure that your PAM solution allows activity to be attributed to individuals, even when shared accounts are being used.

3. Cycling employee and third-party passwords

Automatic, active password management and rotation and reconciliation, including on cloud-based platforms, are essential for closing password-security gaps across heterogeneous environments. If you have customers with complex needs and mobile workforces, ensure password changes can be performed with or without local agent technology.

4. Securing third-party access

Many recent, high-profile data breaches have occurred due to attacks originating from non-employees. Strengthening the weak link in the security chain – remote access by third-party vendors and contractors – requires controlled network separation and activity monitoring. In fact, MSPs can help mitigate that risk with a focus on clearly defined access levels, secure connection gateways, proxied access, and auditing and recording of third-party sessions.

5. Securing network devices

Chances are a customer is using weak passwords on networking devices, including firewalls, switches and routers. Common problems include:

  • Default or common passwords
  • Shared credentials across multiple devices
  • Excessive password age (due to fear of changing configs or lack of management capabilities)
  • Overly privileged accounts able to make changes to allow exfiltration of data or impact infrastructure availability
  • Outsourced support services where changes in personnel, contracts and tools are outside of IT’s direct control, which could expose credentials to unauthorized individuals

Any one of these could lead to excessive risk. MSPs need to equip client infrastructures with complete control and auditing of privileged accounts, including shared administrative, application, local administrative, service, database, cloud and social-media accounts, as well as devices and SSH keys.

6. Securing against privilege elevation

Employees, regardless of role, need elevated permissions from time to time. Maybe it’s for installing new software, troubleshooting a problem or running an essential application. Partners can minimize the need to have privileged credentials widely available by performing tasks that require admin access. Also consider a managed service providing auditing for any and all applications that need privileged access. This lowers the risk from hacking techniques, like pass-the-hash, that steal administrative credentials and allows a trusted independent party (the MSP) to monitor and report on all privileged access, regardless of platform.

It’s an increasingly complex world, and the advent of new technologies and IP-enabled devices only increases the chances of a cybersecurity breach. With an MSP helping to minimize the risk around privileged accounts, customer IT staff can spend more time on growing the business and less time on the never-ending process of vulnerability assessment, reporting and patch mitigation.

The more services you can offer to a client, the more you’ll become a part of their daily routine. The more technical roadblocks you can remove, the more likely they will continue to do business with you, recommend you to peers and add new services during periods of growth.

Morey Haber is VP of technology for BeyondTrust. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently oversees solutions for both vulnerability and privileged account management. In 2004, Mr. Haber joined eEye as the director of security engineering. There, he was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients.


Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Polls

In our Channel Influencer Awards digital issue, we highlighted eight technologies ready to "take off" in the channel this year. Which two will take off the most?

View Results

Loading ... Loading ...
The ID is: 53218