Rehbock joins Magix

August 2010 News

There are many reasons for ignoring the management of privileged identities in business today including the failure to change default and initial login credentials for new hardware and software, to overlapping functions and responsibilities as a result of cost cutting. And then there’s the infamous failure to update someone’s access when they change jobs or to remove it completely when they leave. Arguably, the most unforgivable privileged identity sin is allowing weak access controls that are easily broken by social engineering.

Uncontrolled privileged access can pose serious risks of unwanted data access and loss, as well as disruptions in services. There is, however, a proven four-step process to ensuring the organisation’s privileged identities remain secure and well managed.

1. Identify: Identify and document all critical IT assets, their privileged accounts and interdependencies. This process can be done manually, with the associated risks, or by automated privileged identity management software. The automated approach reduces the risks and costs, while optimising the efficiency of the data collection process without human errors creeping in.

2. Delegate: Once a comprehensive list of assets and dependencies exists, a process needs to be followed to securely and efficiently assign time-managed access privileges to the relevant authorised personnel. Automating this step reduces risk and delivers privileged credentials over a secure communications channel without exposing passwords or falling prey to human error.

3. Enforce: Companies must enforce rules for password complexity, diversity and change frequency, synchronising changes across all dependencies to prevent service disruptions. Once again, automating this process is recommended to force the appropriate changes at the appropriate times.

4. Audit: The final step in ensuring securing privileged identities is ensuring that all security access or change requests, their purpose and durations are documented, and that management is made aware of unusual events. This documentation must be audited regularly to pick up anomalies. Automated privileged identity management software again provides powerful protection and features that give management better control and accountability over systems and processes.

Effective identity and access management (IAM) across the board is a crucial area business today needs to focus on. As part of this process, companies also need to pay special attention to privileged identity management processes to ensure they strictly manage access to the most sensitive areas of their infrastructure.

For more information contact Alan Rehbock, Magix Security, +27 (0)11 258 4442,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

SABRIC annual crime stats 2019
Issue 5 2020 , News
SABRIC, the South African Banking Risk Information Centre, has released its annual crime stats for 2019

From the editor's desk: We're back!
Issue 5 2020, Technews Publishing , News
Welcome to the fifth issue of 2020. If years were people, 2020 would have been hung, drawn and quartered...

XtraVision moves to new premises
Issue 5 2020, XtraVision , News
Hot on the heels of the company changing hands, XtraVision, a distributor of electronic security and fire solutions in Africa and South America, has relocated.

20 years of innovation in security and biometrics
Issue 5 2020, Suprema , News
Founded in 2000, Suprema has built a sales network in over 140 countries and has over 1 billion users.

Fidelity ADT and Vumacam join forces
Issue 5 2020, Fidelity ADT , News
Fidelity-ADT recently partnered with Vumacam to roll out a surveillance network of cameras across a number of southern suburbs in Johannesburg.

Dahua launches ECO Partner Programme
Issue 5 2020, Dahua Technology South Africa , News
Dahua Technology has launched its new technology partner programme, the Dahua ECO Partner Programme.

Suprema unveils Suprema G-SDK
Issue 5 2020, Suprema , News
Suprema’s latest software development kit (SDK), Suprema G-SDK, allows Suprema devices to be seamlessly integrated with third-party software.

New smart alarm solution with video verification
Issue 5 2020 , News
IDS has released the 806, a new 8-zone alarm solution based on 20 years of experience and over 1,5 million IDS805 installations.

From the editor’s desk: Sustaining security and sanity
Residential Estate Security Handbook 2020, Technews Publishing , News
Sustainability is a critical component of almost anything in these days of a tanking economy, boosted by COVID-19, which is given further emphasis by the economy being further hammered by the ‘cure’ for ...

Gallagher launches Command Centre v8.30
Issue 5 2020 , News
Gallagher’s v8.30 release improves operator efficiency with enhancements to Command Centre Mobile and integrated third-party systems, and further supports health and safety obligations.