The genesis of privileged identity

1 August 2012 Information Security

When I think about managing identities and privileges within an organisation, one of my favourite analogies for the whole privileged identity lifecycle is biblical. Everything starts ‘in the beginning’ with a super user. Whether someone starts with a server or a workstation, creates on-premise solutions for their network infrastructure or builds out a cloud, they will always have to start out with an account with God-like power that will control all other accounts accessing that resource going forward in the future.

Philip Lieberman, president and CEO of Lieberman Software.
Philip Lieberman, president and CEO of Lieberman Software.

Now, if you were not there at the set-up of new resources, you would probably be unaware that there was a super-user account created at the genesis. But that super-user account never goes away and in most cases is used day-to-day, either by someone or something (either applications or automated systems). As time goes on, the knowledge of these super-users accounts, where they are, how they are being used and so on, gets lost. Just as the history of how the Bible originated is a mystery to most people except for scholars, so it goes with privileged identities.

As time goes on, things change in the world of IT and, again, most people do not understand the implications. Add new appliances, switches, routers and software and new root accounts pop up. Blend that in with new super-user accounts for things like intrusion detection devices, antivirus systems or DLP and you get a whole new layer of privileges added to the environment. People do not really think about it, they simply interact with it at the user level and the environment continues to evolve and morph.

But when auditors and regulators come in and ask ‘Who created all of this?’ and ‘Who has access to these accounts?’, you have got a good old fashioned debate on par with creationism and evolution; because there is no one still around who can answer where the accounts came from and no records detailing who can access them.

Mining the infrastructure with privileged identity management

So where does privileged identity management play in this metaphor? I like to think of it like being the archaeologist of the bunch. When you are managing these identities, your job is to go out and mine the infrastructure, looking for ‘fossils,’ or those clues that provide your organisation with a view of where those God-like accounts are, how they are being used and what they are being used to do.

It is an important task, because there are plenty of rogue scientists – hackers out in the field – that know all about these fossils. They are also looking for DNA in the bones embedded in the rock that can be used to piece together where the original accounts are in your infrastructure. So much information about these super-user accounts is publicly available, waiting to be mined by the bad guys. Don’t believe me? Search Google with the phrase ‘default administrator account’ and see how many websites there are that list the default account information that will get you into most systems if the logins are not changed. Still don’t believe me? Visit the Default Passwords List website – your passwords are probably there, for the world to see.

Do not kid yourself. Those default logins are lurking in the bedrock. The problem with most organisations today is that the person provisioning new users may do so through a root account without even realising it. Even if they do know what they are doing, they may not know that these accounts are actually only a subset of all of the privileged accounts out there – many of which have always been accessible through default login information.

The identity management lifecyle

IT folks are somewhat like the priest or the rabbi talking about the Bible and conducting well-organised and inspirational services, but not necessarily understanding the history of the materials that they are presenting. Many of the true scholars of the area know information that may shock the flock and those that are leading the flock.

For IT staff, the shock would be if they knew how the process of provisioning and deprovisioning results in many open privileged accounts that can easily be compromised. The process starts with someone getting hired. With a great, wide, wonderful world of systems out there, from an empty mill machine on a factory floor or a key card to get you through the front door, all the way to an SAP system or a really complicated line-of-business system that was written decades ago by an unknown in-house developer, new accounts need to be created to give that employee access to these systems. Some systems may be Windows-based, some Linux-based. It is a smorgasbord.

So, when HR brings someone on board, they have the problem of governance and access in which they have to get these people enrolled into all of the systems they need. The difficulty is that with all these systems out there – legacy and new – you have got to figure out not only what systems they need to access, but what kind of access they are entitled to. In the Windows world it is fairly easy. You just use Active Directory to classify employees in roles for the applications and level of privilege they need and you are done. When they leave the company, you delete them from Active Directory and when they change roles you change their group membership. But enterprise applications creep far beyond the Windows platform and that is the problem. You have got all of these other cultures and religions to deal with as well – and believe me, other operating systems are religions – plus the cult of SAP and salesforce to think about.

And while many applications do have Active Directory connectors built into them, the dark secret of it all is that these connectors do not work all that well. Further complicating things, when a company adds new systems, takes systems away or updates them, almost universally these provisioning systems stop working and that ends up leading to more manual work. Over time, these systems just fall apart.

One of the most common reasons the systems fail to work is the problem of paperwork. When someone leaves or joins the company there is usually a mountain of paperwork involved and there is a workflow that has to be taken care of that is partially manual and partially electronic. Now, when people come in to the company, their bosses are screaming for access and that becomes top priority. But when they leave, the sense of urgency just is not there.

Similarly, when employees change jobs the demand from up top is for new access but no one pressures for the old access to be turned off. So you run into a queuing problem where you can go into any given organisation and potentially see hundreds of people who have been discharged or who have changed their roles and there is one HR person who has to go through the paperwork and go into the systems to get rid of their accounts. A backlog inevitably grows. People forget about accounts that are orphaned and left opened to be used by the previous employee or anyone else that knows about the account. The danger is that not only are there low-level accounts in this backlog but also privileged accounts with a direct pipeline into the company’s most important IT assets.

Bringing in a privileged identity management system automates the digging and the finding of these omnipotent accounts to understand how everything connects together. Putting it in place is a science, one which will better help you control who does what with your most critical data.

And remember, if God created the world in six days, shouldn’t you be able to find and secure all of your privileged accounts in the same amount of time? With the right privileged identity management solution you can.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.