advising on IT-business alignment
IT-business alignment about us blog our services articles & reports resources your profile exposure
blog
blog
Thursday, April 06, 2006

Plugging an identity-related compliance hole

I just got off the phone (off the Skype Out doesn't have the same ring to it ;-) ) from a briefing with Cyber-Ark Software . The company has been around since 1999, with headquarters in Massachusetts - the founder actually originates from Israel - and has received $23M in funding. It has more than 200 customers, including the likes of ABN Amro, citigroup, ING, Lehman Brothers, Pfizer and Wells Fargo.

Cyber-Ark's business is based around what it refers to as secure Vaulting Technology, for the storage and exchange of sensitive information. What on earth has that got to do with compliance holes? I posed myself the same question at the beginning of the call. In fact it appears from my discussion that the link to identity and compliance is only something that Cyber-Ark has made in the last 12-18 months as more and more companies have come under the scrutiny of auditors as result of regulatory compliance. The link between identity and compliance is nothing new (and something I discuss in our recent identity management report) so what's the story?

At its heart it relates to privileged accounts: Unix root; Oracle's inbuilt system and sys accounts (as a former Oracle DBA it bought back memories of customers looking aghast as I sat at the SQL Plus prompt and informed them that I was in a position to delete their entire database even though they hadn't give me the passwords); Cisco's IOS enable; accounts embedded in batch and admin scripts and so forth.

These accounts pose, quite rightly, a problem for auditors. By virtue of the privileged status, users of those accounts have significant power to potentially bypass audit controls. This makes it difficult to prove - and that's what auditors want - that power has not been abused. This is where the Secure Vaulting technology comes in. The privileged account details are treated as sensitive information, stored in an encrypted form in an Enterprise Password Vault. If an administrator requires privileged access, they first have to go via the vault which maintains an audit trail of all such accesses. Obviously, it can't control what's done once logged on as an administrator and so has to be implemented as part of a broader auditable security framework, with access control and audit. But it ensures accountability - and also periodically regenerates passwords. It also overcomes the challenge of the forgotten administrator password scenario (I remember being shown a hack on a SunOS 4 workstation to recover the root password 30 minutes before a critical product demonstration where rebuilding the system wasn't an option!); the DBA's been run over by the proverbial bus problem; and disaster recovery situations.

This is not something that is acknowledged, at least in my research, by current identity management players, and it's therefore no surprise that Cyber-Ark has established partnerships with the likes of IBM with Tivoli Identity Manager.

Although Cyber-Ark seems to address a very real issue, it seems to me that the company faces a couple of challenges. First, there's the fact that they don't fit well with into the product/technology buckets of the big analyst firms (but perhaps should have a place in Compliance Oriented Architectures - hint to our friends at RedMonk). Second, and more significant, is that the compliance risks associated with privileged user accounts are not well understood - until after an audit.

Whether or not organisations need an off-the-shelf solution to this problem, it seems to me that Cyber-Ark raises an important issue that can not be ignored in planning for compliance.


Burn this feed
Burn this feed!

Creative Commons License
This work is licensed under a Creative Commons License.

Blog home

Previous posts

What is Web 2.0?... lucky I wasn't drinking
Writing the rules of regulation
The virtualisation battle moves into the next phase
We're podcasting
Vista delays give time to reflect
How flat is the IT world, anyway? [cont'd]
SOA, reuse and rabbit-holes
Web services management standards convergence
Enterprise mashups: save us from the hype
An interesting spin on user-centric identity

Blog archive

March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
September 2008
October 2008
November 2008
December 2008
January 2009
February 2009
March 2009
April 2009
May 2009
June 2009
July 2009

Blogroll

Andrew McAfee
Andy Updegrove
Bob Sutor
Dare Obasanjo
Dave Orchard
Digital Identity
Don Box
Fred Chong's WebBlog
Inside Architecture
Irving Wladawsky-Berger
James Governor
Jon Udell
Kim Cameron
Nicholas Carr
Planet Identity
Radovan Janecek
Sandy Kemsley
Service Architecture - SOA
Todd Biske: Outside the Box

Powered by Blogger

Weblog Commenting and Trackback by HaloScan.com

Enter your email address to subscribe to updates:

Delivered by FeedBurner