Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry’s Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges they need to perform their duties. This “least-privilege” security model has obvious merits in theory, but in practice it can be challenging to implement, particularly in Linux and UNIX environments, where it is still all too common for administrators to share passwords to root or other superuser accounts. How, for example, do you give backup administrators the superuser privilege to copy a database and move it to another volume without giving them access to the database itself? While sudo and other tools provide some help, they can be cumbersome to manage and implement and become unworkable in complex environments with hundreds of heterogeneous servers and multiple administrators with widely varying job roles and authority. 

This webinar will:

  • Examine the real-world challenges around tying entitlements to individuals instead of to root or generic accounts
  • Describe the baseline requirements for implementing a least-privilege security model based on user roles
  • Explain why existing tools such as sudo fall short in delivering enterprise-class security and manageability
  • Show you the value of leveraging Active Directory’s centrally managed identities and its rich group- and role-based management capabilities to provide access control and privilege management services to Linux and UNIX systems
  • Demonstrate how the Centrify Suite provides an integrated, consistent and cost-effective solution for least-privilege security management across some 200 of the most widely used versions of Linux and UNIX

This webinar is for:

  • All IT personnel who need to know the basics of least-privilege security management
  • IT security executives and managers who want to understand how current practices may be putting them at risk and why current tools are failing to address those risks
  • IT security managers, infrastructure architects and administrators who are interesting in seeing how existing infrastructure can be leveraged to address these risks

Speakers

Danny Bradbury

Danny Bradbury Contributing Writer

David McNeely

David McNeely Director of Product Management, Centrify Corporati

    Eugene Schultz

    Eugene Schultz Chief Technology Officer at Emagined Security, an