Secure Management of Privileged Access and Limit The Risk of Breaches
Traditional peripheral computer security measures - such as software firewalls, DRM, complex password policies, and frequent spins - have proven to have their limits. If an unauthorized user obtains account information and login details, they can easily bypass these traditional systems. Recently, several large-scale cyber attacks have been attributed to unauthorized users taking advantage of privileged user access codes to gain access to an account and then to a network.
Cyber security professionals face a major problem. They must take steps to protect users and manage risk without limiting the productivity
and satisfaction of their customers. With Foxpass, security professionals can control and monitor privileged access management while giving their privileged users the freedom to perform their duties. As part of its privileged access systems, Foxpass organizes
security around the four “A”: Architecture, Authentication, Controlled Access, and Audit.
Architecture: a discrete deployment
Foxpass Privileged Remote Access is designed to operate within an already secure network. Since the client and privileged user connect to
the Foxpass system through outbound connections, there is no need to modify the firewall software. This allows an RDP or
SSH protocol to be extended beyond the LAN connection, without exposing ports or requiring VPN connectivity.
In addition, Foxpass works on all operating systems. Privileged users can connect to Windows systems within a network without having
to launch any software. Foxpass solutions can also be deployed on Mac and Linux operating systems, or any other server/computer
outside of your managed network. Connection to Linux and UNIX systems is done with SSH. Users can even log in on Android or iOS devices.
All remote connections are protected by secure encoding that passes through the Foxpass box. Foxpass can reside in your network and benefit
from the same security measures that you already have in place.
Authentication: take advantage of existing directories
The management of access codes is an essential element of Privileged access management. This is why Foxpass integrates perfectly
with your directories, such as LDAPS and Active Directory. If you change an item in a user's account in Active Directory, Foxpass is
automatically updated.
Additionally, Foxpass can be connected to RADIUS for multi-factor authentication, or to the Kerberos single sign-on system. Finally,
Foxpass privileged users can use a smart card to identify themselves on an external computer.
And that's not all. Foxpass allows privileged users to connect from mobile devices. So you can create a list of authorized devices and
determine the locations on the network from which they can connect. You have made sure that your authentication systems are
perfectly secure. Foxpass makes sure to benefit from these same securities.
Controlled access: set more than 50 permission levels
Foxpass offers over 50 permission levels for users. You can therefore determine a precisely defined level of access for each privileged user.
It is very easy to assign a permission level to a user or a group of users. You can even create master profiles on the Foxpass interface and
use Active Directory to assign users to these profiles. If you move a user from one group to another under LDAPS, the permission level
assigned to that user will be automatically updated.
Instead of granting all-or-nothing access to your users, Foxpass helps you implement best practices for assigning limited privileges to all of
your users. You define which terminals and applications are accessible and decide on the periods or time slots during which they are accessible.
For example, you can allow users to log in instantly, or require notification and permission from an authorized user at the start of each session.
Limit remote access to certain defined terminals.
Configure periods and time slots during which access to given terminals is authorized.
Require notification and authorization of all access.
Prevent any access to unauthorized programs, thanks to the whitelist option of Privileged access management.
Manage your access control policy using group policies.
Audit: create detailed session reports
Foxpass not only helps prevent unauthorized access, but it also gives you detailed information about authorized users, especially when they
are trying to access unauthorized folders.
Foxpass records all sessions centrally. You can thus know who is connecting to which devices, when, and follow the events of each session.
In addition to logged reports, Foxpass keeps a video recording of each session. Thanks to these records, you can trace all the steps that
took place during each remote control session, SSH or Telnet.
It is also possible to export these videos and reports from Foxpass and save them externally for full and detailed traceability.
You can also track session data and configuration changes, using your existing SIEM solutions.
Comments
Post a Comment