Implementing Least-Privilege Security Management in Complex Linux and UNIX Environments

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Virtually all government and private security regulations, such as Sarbanes-Oxley and the Payment Card Industry’s Data Security Standard, have a few common requirements: that access to sensitive data and servers be granted only to those whose job function requires it, and that those individuals are granted only the privileges they need to perform their duties. This “least-privilege” security model has obvious merits in theory, but in practice it can be challenging to implement, particularly in Linux and UNIX environments, where it is still all too common for administrators to share passwords to root or other superuser accounts. How, for example, do you give backup administrators the superuser privilege to copy a database and move it to another volume without giving them access to the database itself? While sudo and other tools provide some help, they can be cumbersome to manage and implement and become unworkable in complex environments with hundreds of heterogeneous servers and multiple administrators with widely varying job roles and authority. 

This webinar will:

  • Examine the real-world challenges around tying entitlements to individuals instead of to root or generic accounts
  • Describe the baseline requirements for implementing a least-privilege security model based on user roles
  • Explain why existing tools such as sudo fall short in delivering enterprise-class security and manageability
  • Show you the value of leveraging Active Directory’s centrally managed identities and its rich group- and role-based management capabilities to provide access control and privilege management services to Linux and UNIX systems
  • Demonstrate how the Centrify Suite provides an integrated, consistent and cost-effective solution for least-privilege security management across some 200 of the most widely used versions of Linux and UNIX

This webinar is for:

  • All IT personnel who need to know the basics of least-privilege security management
  • IT security executives and managers who want to understand how current practices may be putting them at risk and why current tools are failing to address those risks
  • IT security managers, infrastructure architects and administrators who are interesting in seeing how existing infrastructure can be leveraged to address these risks


Photo of Danny Bradbury

Danny Bradbury

Contributing Writer & North America Webinar Moderator

David McNeely

Director of Product Management, Centrify Corporati

Eugene Schultz

Chief Technology Officer at Emagined Security, an

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.