Skip to content
Centrify Logo
  • Support
  • Community
  • Contact
  • Login
    • Create an Account
    • Centrify Cloud
    • Support
    • Community
    • Partner Portal
    • Online Training
  • Try it Now
  • Why Centrify
  • Products

    Platform

    • Centrify Identity Platform
    • Identity-as-a-Service
    • Privileged Identity Management
    • MFA Across Your Enterprise
    • Centrify Developer Program

    Products

    • Centrify Identity Service
    • Centrify Privilege Service
    • Centrify Server Suite
     

    Secure Apps

    • Single Sign-on
    • MFA for Apps, VPNs, Endpoints
    • Provisioning and Workflow
    • Enterprise Mobility Management
    • Mac Management
    • App Catalog
     

    Secure Infrastructure

    • Identity Consolidation
    • MFA for Servers
    • Secure Remote Access
    • Identity Broker
    • Shared Password Management
    • Privileged Access Request
    • Privilege Management
    • Auditing
  • Solutions

    Centrify Solutions

    • Cloud and On-Premises Apps
    • Multi-factor Authentication
    • Privileged Access Security
    • Secure Hybrid Cloud
    • Big Data Security
    • Mac and Mobile Management
    • Internal and External Users
    • Regulatory Compliance
    • Federal Compliance
    Get the Report
  • Customers
  • Partners

    Centrify Channel Partner Network

    • Overview
    • Register a Deal
    • Become a Channel Partner
    • Find a Channel Partner
    • Login to Partner Portal
     

    Centrify Alliance Partner Program

    • Overview
    • Refer an Opportunity
    • Become an Alliance Partner
    • View all Alliance Partners
    • OEM Opportunities
  • Company

    About Us

    • Overview
    • Management
    • Customers
    • Investors
    • Blogs
    • Careers
    • Contact Centrify
     

    News and Events

    • Overview
    • Press Releases
    • In the News
    • Events
    • Awards
    • Centrify Connect
    Learn More
  • Try it Now
tonygoulding

From the Cloud

April 30, 2015, by Tony Goulding

CPS Part 3: Shared Privileged Accounts – Who’s Using and Abusing Them?

Audit LogI’ve heard many war stories of critical systems going berzerk, network devices being hijacked, and sensitive data being culled from servers and databases in the data center. Most I can’t recall, since they were shared in a pub over a firkin of ale. But there are many.

Can you relate? Do you have firsthand experience of wading through the vast corpus of system logs trying to find out how it happened? Remember the frustration with cryptic audit entries spread across multiple logs and multiple systems — or no log entries at all, from home grown or legacy apps.

This is the third blog in a series of 3 that explores key capabilities of our Centrify Privileged Service (CPS). In the other two we looked at emergency “break glass” scenario, and a more general remote login without password reveal. In this one, we take a look at CPS’ session recording capability.

Session recording is a centralized function that lives on the Centrify Cloud Connector — a lightweight windows box that acts as a gateway between the remote user and your resources (servers, network devices, legacy apps, shared social network accounts). It performs the actual session management — setting up and tearing down the privileged sessions. As such, this is an ideal place to record every action the user performs when using CPS.

CPS nicely complements its sister product, Centrify Server Suite (CSS). While CSS provides best practice “least privilege” + privilege elevation for the vast majority of privileged login use cases, CPS handles the exceptions, governing access to privileged account passwords where we have no choice but to login as (e.g.) “admin” to a Cisco router. Because it is specifically designed as a SaaS app for the modern hybrid enterprise, it goes much further than traditional on-premises SAPM offerings. It’s designed for scenarios where your infrastructure may be in the cloud as well as on-premises. It also caters for a fractured IT where you have both internal administrators as well as external (e.g., outsourced IT).

So why is session recording so important? Remember CPS is controlling remote access to privileged accounts — accounts that can expose the user to sensitive applications and data such as personally identifiable information (PII), credit card data, protected health information (PHI), your next game-changing drug formula…

So, session recording brings the following benefits:

    • Improving compliance and reducing audit findings by maintaining a detailed forensic recording of shared privileged account sessions
    • Reducing costs by streamlining root cause analysis, breach investigations, and audits
    • Reducing operational overhead by collapsing silos of log events into a centralized view and enabling more rapid analysis with video recordings that are indexed with a list of searchable commands entered by the user
    • Improving security by deterring abuse of privileged accounts (i.e., if a user knows they’re being recorded and their activities are tied back to a real user account, they will be more inclined to behave)

See the video demonstration of CPS session recording below. It also includes a walk through of the CPS configuration to set that all up. If you haven’t already, please check out the prior two blogs (here and here) and accompanying video demos in this series, where I walk through other CPS use-cases — remote server login without password reveal and emergency “break glass” scenario.

You can learn much more about the Centrify Privilege Service here. Take it for a test drive and see how easy it can be achieve that balance of strong security with ease of use.

  • Facebook
  • Twitter
  • Linked In
  • Google+
  • Email

Post navigation

← CPS Part 2: Growth is Good. Or Is It?
Get Real: Why Identity Management is Too Important to Trust to a Generalist →

Centrify Blog

Keep up to date with Centrify and with current IT Security best practices by subscribing to our blogs. Topics include:

  • All Centrify Blogs
  • Centrify Perspective
  • From the Cloud
  • Hot Topics
  • I AM Centrify
  • It's All About Identity
  • Mobile Frontier
  • Partner Corner
  • Twitter
  • Linked In
  • Blog Feed



Tom Kemp Secure Thinking by Tom Kemp

Centrify CEO Tom Kemp, an industry expert in security and infrastructure software, discusses market and technology issues around the disruption occurring in the Identity and Access Management market due to the cloud, mobile and consumerization of IT trends occurring in today's IT environment.

TwitterFollow Tom on Twitter

Recent Posts


barryscott
Supply Chain Risk: Time to Focus on Partners Ahead of GDPR Deadline

By Barry Scott , April 25, 2018
in “Hot Topics”


Introducing Centrify Identity Services for HashiCorp Vault

By David McNeely , April 17, 2018
in “Centrify Perspective”


Secure the Vote with Zero Trust

By Tom Kemp , April 16, 2018
in “Secure Thinking by Tom Kemp”


Trends to look for next week at RSA Conference 2018

By Corey Williams , April 12, 2018
in “Centrify Perspective”


benrice
Centrify Zero Trust Security Partners in the Spotlight at RSA Booth 501

By Ben Rice , April 11, 2018
in “Hot Topics”

Our Bloggers

  • barryscott

    Barry Scott

    CTO, EMEA
  • benrice

    Ben Rice

    Vice President, Worldwide Business Development
  • Bill Mann

    Chief Product Officer
  • Corey Williams

    Senior Director, Product Management and Marketing
  • Greg Cranley

    Vice President Federal & Public Sector Sales
  • Jonathan Bensen

    Director, Product Management
  • Michelle Plato

    Senior Product Marketing Manager.
  • Rhonda Shantz

    CMO
  • Teresa Chen

    Director, Product Marketing
  • tonygoulding

    Tony Goulding

    Director, Technical Marketing
→ See All Bloggers

Popular Tags

  • Active Directory (71)
  • Adaptive MFA (29)
  • Analytics (11)
  • App gateway (4)
  • Apple (6)
  • Application Security (8)
  • Application to Application Password Management (4)
  • Audit (8)
  • authentication (6)
  • AWS (21)
  • Big data (12)
  • byod (5)
  • CASB (2)
  • Centrify (6)
  • centrify connect (4)
  • Centrify Express (9)
  • centrify identity service (37)
  • Centrify Infrastructure Services (3)
  • Centrify Privilege Service (45)
  • Centrify Server Suite (24)
  • Certificate Management (4)
  • CIS (2)
  • Cloud (79)
  • Cloud Identity (40)
  • Compliance (14)
  • Compliance Audit (28)
  • contextual authentication (2)
  • Customer Success (7)
  • cyberconnect (3)
  • data breach (30)
  • Enterprise Mobility Management (EMM) (33)
  • Federal compliance (14)
  • Federation (5)
  • forrester (14)
  • Gartner (6)
  • GDPR (6)
  • google apps (5)
  • Governance (3)
  • Group Policy (10)
  • Hadoop (13)
  • HeartBleed (3)
  • HSPD-12 (2)
  • Hybrid IT (6)
  • IaaS (5)
  • identity (24)
  • Identity Analytics (4)
  • Identity and Access Management (IAM) (76)
  • Identity as a Service (IDaaS) (62)
  • Identity Broker (3)
  • Identity Management (92)
  • identity platform (35)
  • iOS (2)
  • IoT (4)
  • iPhone (2)
  • just enough privilege (3)
  • just in time privilege (2)
  • Least Privilege (48)
  • Mac (8)
  • Mac OS X (37)
  • macos (2)
  • MFA (137)
  • mobile (7)
  • Mobile Device Management (MDM) (36)
  • Mobile Security (72)
  • Mobile World Congress (3)
  • Multi-factor Authentication (161)
  • Next-Gen Access (5)
  • NIST (3)
  • NIST 800-171 (2)
  • NoSQL (2)
  • Office 365 (25)
  • Outsourced IT (3)
  • PAM (2)
  • Partners (45)
  • Password (91)
  • Password Management (81)
  • Password Reset (9)
  • PCI (2)
  • ponemon (16)
  • Privilege Elevation (3)
  • privileged access management (4)
  • Privileged Access Security (37)
  • Privileged Identity Management (163)
  • provisioning (4)
  • Risk-based Access Control (2)
  • Role-based Access Control (13)
  • RSA (3)
  • SaaS (70)
  • SAML (32)
  • Samsung KNOX (14)
  • SAP (3)
  • SAPM (9)
  • Secure remote access (2)
  • Security (35)
  • Security Breaches (47)
  • Security Insights (26)
  • ServiceNow (6)
  • Shadow IT (2)
  • Shared Account Password Management (19)
  • Single Sign-On (SSO) (155)
  • smart card (2)
  • Smart Card Authentication (8)
  • sso (2)
  • VPN (3)
  • Windows Privilege (2)
  • zero trust security (29)
1.669.444.5200
Contact Us
  • Twitter
  • Linked In
  • YouTube
  • Facebook

Products

  • Application Services
  • Endpoint Services
  • Infrastructure Services
  • Analytics Services
  • Federal CAC Reader
  • Pricing
  • Free Trials

Company

  • About Us
  • Blogs
  • Management
  • News and Events
  • Investors
  • Careers
  • Contact

Services

  • Overview
  • Professional Services
  • Training

Support

  • Support Portal Login
  • Support Plans
  • Centrify Trust
  • Cloud Status

Communities

  • Centrify
  • Developer
  • Express

Developers

  • Overview
  • APIs
  • Direct Audit SDK
  • Direct Manage SDK
  • SAML Toolkits

Resources

  • White Papers
  • Case Studies
  • Webinars
  • Solution Briefs
  • Documentation

©2018 Centrify Corporation. All rights reserved. Privacy Policy Terms of Use Site Map