Q
Manage Learn to apply best practices and optimize your operations.

How can enterprises alleviate the threat of privileged users?

Privileged users pose a growing threat to organizations. Expert Joseph Granneman looks at this insider threat and shares ways to mitigate it.

I read recently that "privileged user" abuse and malicious behavior is a growing concern within the enterprise,...

according to a Ponemon survey. What is a privileged user specifically, and how can my company mitigate the inside threat they might pose?

The old saying "absolute power corrupts absolutely" applies as much today as when it was written in 1887. Privileged users have become the glue that holds together our interconnected modern society and are just as necessary as the systems they manage. They maintain user accounts, apply software updates, perform backups and replace failed components. These types of tasks require users to have the highest level of access, which grants them absolute power over the systems and data they oversee. Even good employees will struggle with the temptation to access this data. Employees with malicious intent can cause serious monetary and organizational harm if their actions go undetected.

There are several different techniques that organizations can employ to reduce the threat from this ultimate insider. The most important is to remove absolute power from any one individual. Democratic governments are structured so that checks and balances prevent abuse of power; the duties of privileged users can be divided in the same way. An administrator who adds user accounts is audited by another administrator who monitors access logs for example. The procedure to modify firewall rules can require two administrators to verify the changes are appropriate.

Organizations are inadvertently handing control of technology assets to only a few individuals. This high level of access provides a potentially irresistible opportunity for abuse if it is not governed with controls like separation of duties. Technical controls must be in place to enforce this separation like smart cards for strong authentication, separate administrative accounts and logging systems to verify appropriate use. Implementing separation of duties for privileged users is not that different from how it is employed in other areas of the organization, such as finance. If absolute power corrupts absolutely, it is time to remove the absolute power from privileged users.

Ask the Expert
Have questions about enterprise security? Send them via email today! (All questions are anonymous.)

Next Steps

Consider implementing the least privilege principle to protect privileged users.

This was last published in March 2015

Dig Deeper on Security Awareness Training and Internal Threats-Information

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Enhance security by fine-grained, policy-based regulation of privileged accounts. Conduct privilege and asset discovery. Prevent unauthorized privileged account activity. Granularly assign root admin privileges.
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close