COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT

Authors

DOI:

https://doi.org/10.28925/2663-4023.2022.16.98112

Keywords:

information security; internal threats; privileged access; unauthorized access; control and management of privileged access.

Abstract

Abuse of privileges in the IT environment is defined as one of the threats to the information assets of the business at the present stage. The article examines and analyzes these problems, which are closely related to the leakage of information due to legitimate access to it and / or unauthorized access to it. Reports, research, acts, surveys at various enterprises contain a large amount of analytical and statistical materials that confirm the relevance and importance of this work. Based on the scientific literature, a review of key definitions on this issue, namely: characterized the definition of "privileged access"; the main examples of privileged access in the IT environment are considered; describes the risks and threats of information from attack vectors associated with privileged access to the IT environment. The mechanism for control and management of privileged access - RAM is presented, the steps of this process are highlighted and its expediency is substantiated. Experimental techniques allowed to choose the most applicable solutions of RAM: WALLIX Bastion PAM, One Identity Safeguard PAM, CyberArk PAM. The essence and functionality of each of these solutions are revealed. The advantages and disadvantages of each technology are established. As a result of research of technical and functional characteristics the comparative analysis of data of three decisions is carried out: obligatory components of the decision on control and management of privileged access are the manager of passwords and the manager of sessions (sessions), and additional - the module with analytics of privileged sessions and the access manager. use a VPN to access privileged assets. It can also be noted that the functionality of all products is very similar, so the implementation plays a big role, namely the practical approach during operation, internal algorithms, additional opportunities for integration and innovation. PAM solutions are recommended for organizations as a means to mitigate information security risks and threats due to insider activities of company employees who have privileged access to the IT environment.

Downloads

Download data is not yet available.

References

Infographic: 20 Alarming Insider Threats Statistics https://www.stealthlabs.com/blog/infographic-20-alarming-insider-threats-statistics/

2020 Insider Threat Report https://www.cybersecurity-insiders.com/portfolio/2020-insider-threat-report-gurucul/

(2022) Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/

EMA Evaluation Guide to Privileged Access Management (PAM). https://loughtec.com/wp-content/uploads/2022/03/ema_eval_guide_to_privileged_access_management_pam-1.pdf

Tep, K. S., Martini, B., Hunt, R., & Choo, K.-K. R. (2015). A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management. У 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE. https://doi.org/10.1109/trustcom.2015.485.

Jayabalan, M., & O’Daniel, T. (2016). Access control and privilege management in electronic health record: a systematic literature review. Journal of Medical Systems, 40(12). https://doi.org/10.1007/s10916-016-0589-z

Gaehtgens, F., Data, A., Kelley, M., Rakheja, S. (2021). Magic Quadrant for Privileged Access Management.

https://www.gartner.com/doc/reprints?id=1-27MYWKG6&ct=211012&st=sb

Sindiren, E., Ciylan, B. (2018). Privileged Account Management Approach for Preventing Insider Attacks. IJCSNS International Journal of Computer Science and Network Security, 18(1).

Haber, M. J. Hibbert, B. (2018). Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. https://doi.org/10.1007/978-1-4842-3048-0, https://libraff.com/b/w/c979cb0ee57fbbfe6487e2e357d71de8b9526b93/privileged-attack-vectors-building-effective-cyber-defense-strategies-to-protect-organizations.pdf

Buriachok, V. L., Tolubko, V. B., Khoroshko, V. O., & Toliupa, S. V. (2015). Informatsiina ta kiberbezpeka: sotsiotekhnichnyi aspekt : pidruchnyk. DUT.

Hulak, H. M., Kozachok, V. A., Skladannyi, P. M., Bondarenko, M. O., Vovkotrub, B. V. (2017). Systemy zakhystu personalnykh danykh v suchasnykh informatsiino-telekomunikatsiinykh systemakh. Suchasnyi zakhyst informatsii, 2, 65-71. http://nbuv.gov.ua/UJRN/szi_2017_2_12.

Shevchenko, S., ZhdanovaY., Skladannyi, P., Boiko, S. (2022). Insaidery ta insaiderska informatsiia: sut, zahrozy, diialnist ta pravova vidpovidalnist. Elektronne fakhove naukove vydannia "Kiberbezpeka: osvita, nauka, tekhnika; 3(15), 175-185.https://doi.org/10.28925/2663-4023.2022.15.175185

Privileged Access Management (PAM). https://www.cyberark.com/what-is/privileged-access-management/

Access Management (PAM). Upravlinnia povnym tsyklom vykorystannia vysokoprivilehirovannykh oblikovykh danykh. https://senhasegura.com.ua/products/access-management-pam/

What Is Privileged Access Management (PAM)? https://heimdalsecurity.com/blog/privileged-access-management-pam/

Secure, Control & Audit Privileged Session Activity https://www.wallix.com/privileged-access-management/session-manager/

What is IT/OT convergence? Everything you need to know https://www.techtarget.com/searchitoperations/definition/IT-OT-convergence

Magic Quadrant for Privileged Access Management https://www.gartner.com/doc/reprints?id=1-27MYWKG6&ct=211012&st=sb

KuppingerCole Leadership Compass PAM 2021 https://lp.cyberark.com/kuppingercole-leadership-compass-pam-2021.html

Downloads


Abstract views: 655

Published

2022-06-30

How to Cite

Romaniuk, O. ., Skladannyi, P., & Shevchenko, S. (2022). COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(16), 98–112. https://doi.org/10.28925/2663-4023.2022.16.98112

Most read articles by the same author(s)

1 2 3 4 > >>