How Thycotic Scales PAM to Meet the Needs of Large Enterprises · PDF filePAM to Meet the...

5
How Thycotic Scales PAM to Meet the Needs of Large Enterprises [email protected] https://cm-alliance.com +44 203 189 1422 @cm_alliance The Scalability Misconception Often, in a large enterprise, availability is the primary requirement associated with a tier 1 service, like privileged access management (PAM) Furthermore, the service’s success is measured by its uptime and the ability to service customer requests on time. To add to this set beliefs, vendors tend to sell their wares by focusing on attributes like blazingly fast discovery of new credentials or ability to manage fifty thousand credentials. Consequently, by the time the purchase is completed, the customer is often left with an over configured array of expensive hardware and or licences. Given that almost 100 percent of all successful cyber-attacks require some sort of privilege escalation to succeed it’s no surprise that virtually every security standard, from NIST, ISO 27001 to UK Government’s ISO equivalent, requires that organisations focus on the management of privileged users and the myriad of related effective permissions. Successfully managing users with destructive capabilities can be a challenge for any organisation. However, compared to their counterparts, large enterprises face additional challenges including that of scalable infrastructure that must be able to cope with complex, geographically dispersed systems and users. Executive Summary Thycotic’s focus on enterprise scalability and manageability along with their relentless drive to create an operationally friendly system provides the appropriate mix for the large enterprise seeking to adopt a robust PAM solution to securing and managing the threat from privileged users.

Transcript of How Thycotic Scales PAM to Meet the Needs of Large Enterprises · PDF filePAM to Meet the...

How Thycotic Scales PAM to Meet the Needs of Large Enterprises

[email protected] https://cm-alliance.com +44 203 189 1422 @cm_alliance

The Scalability Misconception

Often, in a large enterprise, availability is the primary requirement associated with a tier 1 service, like privileged access management (PAM) Furthermore, the service’s success is measured by its uptime and the ability to service customer requests on time. To add to this set beliefs, vendors tend to sell their wares by focusing on attributes like blazingly fast discovery of new credentials or ability to manage fifty thousand credentials. Consequently, by the time the purchase is completed, the customer is often left with an over configured array of expensive hardware and or licences.

Given that almost 100 percent of all successful cyber-attacks require some sort of privilege escalation to succeed it’s no surprise that virtually every security standard, from NIST, ISO 27001 to UK Government’s ISO equivalent, requires that organisations focus on the management of privileged users and the myriad of related effective permissions.

Successfully managing users with destructive capabilities can be a challenge for any organisation. However, compared to their counterparts, large enterprises face additional challenges including that of scalable infrastructure that must be able to cope with complex, geographically dispersed systems and users.

Executive Summary

Thycotic’s focus on enterprise scalability and manageability along with their relentless drive to create an operationally friendly system provides the appropriate mix for the large enterprise seeking to adopt a robust PAM solution to securing and managing the threat from privileged users.

How Thycotic scales PAM to meet the Needs of Large Enterprises

The Scalability Misconception

The Struggle

A PAM system’s primary objective must be to increase the overall security posture of a business by managing all aspects, behavioural and procedural, of privileged users. However, there are several competing forces and often disparate set of needs when it comes to selecting a solution.

Disjointed program management and the inability to define clear operational requirements feeds into the age old, narrow-minded “we have the CPU horsepower” narrative.

The Impact

Although such beefed up infrastructure is capable of handling excessive workloads the abundance of CPU power rarely lends to any direct or indirect reduction in cyber-attacks or of lowering the organisation’s risk posture. Furthermore, large implementations of any product often end up being over engineered in the name of future growth leading to over what we call “solution liability”; complicated designs and operationally complex solutions. As a matter of fact, this additional overhead often leads to an increase in unnecessary errors and incidents.

FIGURE 1

The struggle, sometimes even an aggressive conflict of opinions, between different business units pulling the requirements in their own “direction.”

SECURITY STRATEGY TEAM WANTS

No operational responsibilityTheir own set of requirements

Most secure systemPrefer blackbox system—operates on their own

OPERATIONAL TEAM WANTS

Easy-to-manage, not overly complex productEasy-to-learn and teach new staff

Dashboards—only useful onesDon’t like Blackbox solutions

PROCUREMENT / PROJECT WANTS

Affordable value for moneyCompliance dashboards galore

Dashboards—all of themBlackbox is preferred

How Thycotic scales PAM to meet the Needs of Large Enterprises

True Scalability

For a PAM product to be truly scalable it must not only meet the baseline requirements of infrastructure resilience (as depicted in figure 2) but also possess key attributes that, in combination, increase the overall security maturity of an organisation.

Key Attributes of Thycotic’s Secure Scalable System

Thycotic’s approach maps to our own requirement based approach when it comes to selecting a suitable and scalable product. These requirements can be summarised as:

Operationally Friendly

It is our opinion that for a product to be truly effective in increasing an organisation’s security maturity and reducing the overall risk exposure, it must be easy to manage and run by the operational teams and offer operational utility. These teams, often working as either the Security Operations Centre (SOC) or Network Operations Centre (NOC) are the day to day staff who operate, tweak, configure and optimise the product.

TECHNOLGY

Database

High

Availability

Operating

System

Hardware

Product

Vendor

Cloud

THYCOTIC’S SCALABILITY MATRIX

• Synchronisation

• Aways on

• Easy to recover

• Ability to operate over different geographies

• True active-active setup

• Maintain context and state information

• Ability to cope with enterprise-scale load

• Secure OS with vendor support for patches

• Easy to manage

• Configured to cope with enterprise-scale load

• Built-in redundancy

• Flash memory to support various database operations

• Scalable application to cope with:

- Constant discovery

- Large set of credentials (over 300,000)

• Distributed infrastructure

• Ability to operate in varying infrastructure

configurations (satellite offices, low bandwidth)

• Designed for Cloud and Hybrid configurations

• Compatible with different Cloud providers

FIGURE 2

Creating and applying consistent policies to newly discovered credentials

Ensuring consistent revocation and attestation procedures

Ability to integrate with asset discovery and other enterprise grade tools

Easily configure and tweak APIs and specific product attributes

For example, we would expect administrator and operational teams to face certain challenges including:

How Thycotic scales PAM to meet the Needs of Large Enterprises

Thycotic Secret Server

Thycotic Secret Server seems to strike the right balance between being operationally friendly to run and offering sufficient, easy-to-access, features to cater for the advanced user base. The ability for existing resources to tweak and optimise the product offers cost benefits as an organisation does not have to turn to cost prohibitive professional services for minor configuration requests.

“The top reasons why we chose Thycotic was because it was easy to deploy, operate and maintain. The logging and reporting capabilities, the ability to store any type of credential, and its friendly,

customizable user interface were also key factors in our decision.”

- Nay Doummar, Adobe Cloud Operations Engineer

Resource Optional

We regularly find that, over time, organisations end up having to hire more full time or contract resources to manage one or more components in large-scale implementations. Thycotic has designed their solution, including the important database component, to operate within existing resource constraints. Put another way, many of Thycotic’s clients have absorbed the management and day-to-day running of the solution without having to increase resources.

Figure 3 describes some of the risks of not focusing on these soft requirements. An overly complex product will, over time, lead to increase in errors and incidents eventually crossing the organisation’s risk appetite threshold. This often results in a business having to increase their employee count to support the reduction of errors and incidents. In our opinion, Thycotic offers a consistent user experience that is operations focused and requires very little or no material increase in existing operational teams. Thycotic’s manageability and utility will help organisations keep a tab on their human-error related data breaches.

FIGURE 3

How Thycotic scales PAM to meet the Needs of Large Enterprises

About the Author

Amar SinghCyber Management Alliance CEO & Founder

Amar Singh is an industry thought leader, founder of Cyber Management Alliance Ltd and not-for-profit Give01Day. Amar is an experienced cyber, information security & data privacy practitioner, a senior C-Level Executive and an expert in

Information risk management. Amar is a UK Government GCHQ certified trainer and has created three cyber training courses including GCHQ Certified Course titled Cyber Security & Privacy Essentials for business executives (CSPE), the Cyber Incident Planning & Response Course (CIPR) for mid-senior managers and a more technical Anatomy of Cyber Threats & Attacks course.

Amar is a mentor & trusted Advisor to FTSE 100 Firms, start-ups & incubator funds and Chair of ISACA Security Advisory Group. Author, writer, Industry speaker & presenter. Amar is regularly invited to speak and share his insights by some of the largest and most respected organisations in the world including the BBC, The Economist’s Intelligence Unit, The Financial Times, SC Magazine, InfoSec Magazine, Computer Weekly, The Register and the Al-Jazeera English Channel, The Irish Tech Magazine and many more.

[email protected] https://cm-alliance.com +44 203 189 1422 @cm_alliance

ConclusionThycotic’s focus on enterprise scalability and manageability along with their relentless drive to create an operationally friendly system provides the appropriate mix for the large enterprise seeking to adopt a robust PAM solution to securing and managing the threat from privileged users.

About Cyber Management Alliance Ltd

Founded by Amar Singh, Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber risk management. Cyber Management Alliance was founded with three primary objectives:

• To jointly help its clients achieve their strategic goals of reducing organisational risk exposure to cyber threats by leveraging CMA’s global cyber resource pool.

• To provide elite, specialised training to businesses across the information security, cyber incident response and privacy domains.

• Become a long term and reliable consultancy partner to its clients.