­
A CISO Guide to Privilege Identity&Access Management(PIM) Implementation - All Articles - CISO Platform

98bqe8.jpg

Achieved Solution Benefits

To mitigate risk

  • Prevent access breaches through privileged accounts
  • Monitor activities carried out by privileged users
  • Enforce accountability for use of generic privileged accounts
  • Enforce granular access restrictions as required by user roles
  • Limit privileges of admin accounts
  • Maintain complete audit trail of privileged activities (i.e Audit Logs / Screen Recording of every session )

(Read more:  Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)


To improve efficiency

  • Reduce management overhead of maintaining large number of passwords using password fault
  • Single Sign On (SSO) – for Servers/Databases/Network Elements/URL’s/Thick Clients
  • Securely extend access to remote vendors ( i.e OTP Based , Time based access )
  • Audit Logs / Screen Recording of every session
  • Authorization Workflow
  • Central Reporting & Alerting ( SMS & Email alerts )


To ensure compliance

  • Comply to regulations and standards ( SOD principle , IS0 27001 Reports )
  • Meet password policy compliance requirements

Solution Evaluation Checklist must focus on functionality, security, vendor profile, integration, ease of implementation and total cost of ownership. Here is a complete comparison of Iraje, CA Control Minder & Arcos and the comparison parameters.

2ebscok.png

-With Saurabh Kaushik, Head - IT Security, Lupin Group on Privilege Identity & Access Management (PIM) Implementation

(Read more: Hardware Trojans: Sneak Peek into the Future)

E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Comments

  • Iraje has Video on demand with full session recordings. In latest version VOD is enhanced with command based search option.
This reply was deleted.

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Multi-city Round Table

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee