Preventing Good People from doing Bad Things Implementing Least Priv

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with

  • PDF / 2,505,878 Bytes
  • 202 Pages / 431 x 649 pts Page_size
  • 75 Downloads / 205 Views

DOWNLOAD

REPORT


John Mutch Brian Anderson

Preventing Good People from Doing Bad Things: Implementing Least Privilege Copyright © 2011 by John Mutch, Brian Anderson All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. ISBN 978-1-4302-3921-5 ISBN 978-1-4302-3922-2 (eBook) Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Lead Editor: Jeffrey Pepper Editorial Board: Steve Anglin, Mark Beckner, Ewan Buckingham, Gary Cornell, Jonathan Gennick, Jonathan Hassell, Michelle Lowman, James Markham, Matthew Moodie, Jeff Olson, Jeffrey Pepper, Frank Pohlmann, Douglas Pundick, Ben Renow-Clarke, Dominic Shakeshaft, Matt Wade, Tom Welsh Coordinating Editor: Jennifer L. Blackwell Copy Editor: Ralph Moore Compositor: Mary Sudul Indexer: SPi Global Cover Designer: Anna Ishschenko Distributed to the book trade worldwide by Springer-Verlag New York, Inc., 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax 201348-4505, e-mail [email protected], or visit www.springeronline.com. For information on translations, please contact us by e-mail at [email protected], or visit www.apress.com. Apress and friends of ED books may be purchased in bulk for academic, corporate, or promotional use. eBook versions and licenses are also available for most titles. For more information, reference our Special Bulk Sales–eBook Licensing web page at www.apress.com/bulk-sales. To place an order, email your request to [email protected] The information in this book is distributed on an “as is” basis, without warranty. Although every precaution has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.

With gratitude to the BeyondTrust team and Brian Anderson for his insightful work on this project and with love to my four children Natalie, Garrett, Annabelle, and Lauren, whose support and love sustain me every day. —John For all of those “insider heroes” who fight to prevent the misuse of privilege on a daily basis in order to help secure precious information assets. —Brian

Contents About the Authors ...........................................................................................................vii Acknowledgments............................................................................................................. ix Introduction ........................................................................................................................... x Chapter 1:

The Only IT