The genesis of privileged identity

1 August 2012 Information Security

When I think about managing identities and privileges within an organisation, one of my favourite analogies for the whole privileged identity lifecycle is biblical. Everything starts ‘in the beginning’ with a super user. Whether someone starts with a server or a workstation, creates on-premise solutions for their network infrastructure or builds out a cloud, they will always have to start out with an account with God-like power that will control all other accounts accessing that resource going forward in the future.

Philip Lieberman, president and CEO of Lieberman Software.
Philip Lieberman, president and CEO of Lieberman Software.

Now, if you were not there at the set-up of new resources, you would probably be unaware that there was a super-user account created at the genesis. But that super-user account never goes away and in most cases is used day-to-day, either by someone or something (either applications or automated systems). As time goes on, the knowledge of these super-users accounts, where they are, how they are being used and so on, gets lost. Just as the history of how the Bible originated is a mystery to most people except for scholars, so it goes with privileged identities.

As time goes on, things change in the world of IT and, again, most people do not understand the implications. Add new appliances, switches, routers and software and new root accounts pop up. Blend that in with new super-user accounts for things like intrusion detection devices, antivirus systems or DLP and you get a whole new layer of privileges added to the environment. People do not really think about it, they simply interact with it at the user level and the environment continues to evolve and morph.

But when auditors and regulators come in and ask ‘Who created all of this?’ and ‘Who has access to these accounts?’, you have got a good old fashioned debate on par with creationism and evolution; because there is no one still around who can answer where the accounts came from and no records detailing who can access them.

Mining the infrastructure with privileged identity management

So where does privileged identity management play in this metaphor? I like to think of it like being the archaeologist of the bunch. When you are managing these identities, your job is to go out and mine the infrastructure, looking for ‘fossils,’ or those clues that provide your organisation with a view of where those God-like accounts are, how they are being used and what they are being used to do.

It is an important task, because there are plenty of rogue scientists – hackers out in the field – that know all about these fossils. They are also looking for DNA in the bones embedded in the rock that can be used to piece together where the original accounts are in your infrastructure. So much information about these super-user accounts is publicly available, waiting to be mined by the bad guys. Don’t believe me? Search Google with the phrase ‘default administrator account’ and see how many websites there are that list the default account information that will get you into most systems if the logins are not changed. Still don’t believe me? Visit the Default Passwords List website – your passwords are probably there, for the world to see.

Do not kid yourself. Those default logins are lurking in the bedrock. The problem with most organisations today is that the person provisioning new users may do so through a root account without even realising it. Even if they do know what they are doing, they may not know that these accounts are actually only a subset of all of the privileged accounts out there – many of which have always been accessible through default login information.

The identity management lifecyle

IT folks are somewhat like the priest or the rabbi talking about the Bible and conducting well-organised and inspirational services, but not necessarily understanding the history of the materials that they are presenting. Many of the true scholars of the area know information that may shock the flock and those that are leading the flock.

For IT staff, the shock would be if they knew how the process of provisioning and deprovisioning results in many open privileged accounts that can easily be compromised. The process starts with someone getting hired. With a great, wide, wonderful world of systems out there, from an empty mill machine on a factory floor or a key card to get you through the front door, all the way to an SAP system or a really complicated line-of-business system that was written decades ago by an unknown in-house developer, new accounts need to be created to give that employee access to these systems. Some systems may be Windows-based, some Linux-based. It is a smorgasbord.

So, when HR brings someone on board, they have the problem of governance and access in which they have to get these people enrolled into all of the systems they need. The difficulty is that with all these systems out there – legacy and new – you have got to figure out not only what systems they need to access, but what kind of access they are entitled to. In the Windows world it is fairly easy. You just use Active Directory to classify employees in roles for the applications and level of privilege they need and you are done. When they leave the company, you delete them from Active Directory and when they change roles you change their group membership. But enterprise applications creep far beyond the Windows platform and that is the problem. You have got all of these other cultures and religions to deal with as well – and believe me, other operating systems are religions – plus the cult of SAP and salesforce to think about.

And while many applications do have Active Directory connectors built into them, the dark secret of it all is that these connectors do not work all that well. Further complicating things, when a company adds new systems, takes systems away or updates them, almost universally these provisioning systems stop working and that ends up leading to more manual work. Over time, these systems just fall apart.

One of the most common reasons the systems fail to work is the problem of paperwork. When someone leaves or joins the company there is usually a mountain of paperwork involved and there is a workflow that has to be taken care of that is partially manual and partially electronic. Now, when people come in to the company, their bosses are screaming for access and that becomes top priority. But when they leave, the sense of urgency just is not there.

Similarly, when employees change jobs the demand from up top is for new access but no one pressures for the old access to be turned off. So you run into a queuing problem where you can go into any given organisation and potentially see hundreds of people who have been discharged or who have changed their roles and there is one HR person who has to go through the paperwork and go into the systems to get rid of their accounts. A backlog inevitably grows. People forget about accounts that are orphaned and left opened to be used by the previous employee or anyone else that knows about the account. The danger is that not only are there low-level accounts in this backlog but also privileged accounts with a direct pipeline into the company’s most important IT assets.

Bringing in a privileged identity management system automates the digging and the finding of these omnipotent accounts to understand how everything connects together. Putting it in place is a science, one which will better help you control who does what with your most critical data.

And remember, if God created the world in six days, shouldn’t you be able to find and secure all of your privileged accounts in the same amount of time? With the right privileged identity management solution you can.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...