As Work Becomes More Distributed and Remote, Password Management Has Never Been More Important

05

January 2021

By: Ali Gomulu

With new software-based approaches and cybersecurity automation, organizations can protect themselves from one of the primary causes of breaches – adversaries taking control of privileged accounts by being able to “crack the code” on privileged users’ passwords.

By securely storing credentials in a password vault and initiating secure connections into critical systems, services and infrastructure, employees and contractors can obtain access without the usual log in and password routine, while the Privileged Access Management (PAM) platform controls and records the initiation and closure of all sessions, automatically.

Rather than trusting privileged users to set up “unbreakable” passwords, those users’ credentials are securely stored within a vault where access is determined by Role-Based Access Controls, and passwords are encrypted with algorithms. Advanced Password Vaults also update passwords across the IT infrastructure, ensuring the protection of networks, servers, applications, and data, and secure end-point devices from being compromised even if credentials are lost, shared or stolen.

What should organizations look for when reviewing their options for which password vault to use? Here are ten questions decision-makers should pose:

  1. Will the password vault manager broker connections with all relevant systems (including remote desktops, virtual desktops, web and browser-based applications, across all mobile devices, including smartphones and laptops)?
  2. How complex is the installation and configuration for end-users?
  3. Is auto-discovery included to minimize configuration for end-users and IT staff?
  4. How complex is the experience of IT workstations, and how much manual maintenance and monitoring will be required?
  5. What kind of filtering is included to help prevent accidental or malicious disruption?
  6. Does the solution include automated updates of credentials at the beginning and end of every session?
  7. Does the solution interoperate with third-party vendor products (web servers, app servers, routers, and other networking equipment)?
  8. Does the solution work seamlessly with ITSM solutions for change management and governance control?
  9. Is 100% keylogging and recording included to support compliance and audit requirements?
  10. Is real-time reporting, including alerts and notifications in the event of unusual behavior included?

Ironsphere’s Dynamic Password Controller is a password vault that stores and rotates SSH keys and passwords of privileged accounts (admin, system, root, etc.) centrally and securely.

Users log in with their personal accounts, check-out the credential of a privileged account, and then use it to connect to target end-points.

The Dynamic Password Controller generates searchable log records and audit trails to meet security and compliance requirements and takes control of device and database passwords, providing security while sustaining efficiency.

Our advanced solution supports local users accounts on:

  • Operating Systems: Windows/Linux/Unix
  • Databases: Oracle, PostgreSQL, MsSQL, etc.
  • Devices and Appliances with CLI interface
  • Applications with password change API 

Passwords generated by Ironsphere ensure maximum strength and eliminate the usage of non-expired passwords by changing the password after every usage with a one-time-password.

Passwords are not shared among employees because nobody knows/sees the password, and while passwords are stored securely in a vault, our Dynamic Password Controller can randomize shared passwords, making all passwords expire within 300 seconds.

The auto-lock user account feature kicks in automatically when an employee is terminated (integration with enterprise Active Directory or LDAP is required).

With the right password vault technology, organizations prevent unauthorized access to critical systems and ward off attacks using stolen privileged credentials. For compliance and auditing, a unified password usage history documenting which individual users accessed where, when, and why is easily generated and analyzed.

And with our unique feature, embedded passwords can be generated and placed in application source code, configuration files, or databases – completely invisible to users.

Similar Blogs

Decentralized PAM Advantages and Challenges: Keeping Organizations Secure from Edge to Cloud

The debate on centralized vs. decentralized IT has been going on for decades, and there are solid arguments for both choices. The rise of the cloud changed everything, and today “shadow IT” continues to challenge CIOs and CISOs who are charged with protecting the assets of their organizations while also not restricting the number of productivity tools available which employees and contractors continue to find and use rather than using “official” applications.

read more

Password Management in a New Era of Remote Working

2020 was a year of tremendous chaos and stress on many levels and stretched the limits of IT teams who were responsible for securing corporate assets, as entire companies sent employees home to work, including those same IT teams. A new generation of IT heroes was born, and CIOs, CISOs, and IT analysts and managers stepped up to address uncommon challenges, even as cyberattacks grew to all-time highs.

read more