PROTECTING ASSETS AGAINST INSIDER THREATS
GOALS AND OBJECTIVES
Control over the actions of IT-service suppliers within the information systems at a rented data processing center.
Implementation of a subsystem for monitoring the activities IT service providers.
- A Privileged Access Management (PAM) solution by IT BASTION to provide information security control and monitoring over the activities IT service providers activities.
The implemented security control and monitoring solution enables MSP Corporation to record remote access sessions in text log format and video for RDP, VNC, SSH, and SFTP protocols, as well as HTTP and HTTPS protocols through a dedicated terminal server.
With the help of Privileged Single Sign-On technology, the security control and monitoring solution acts as a single-entry point for IT system administrators, identifying sessions even when a common account is used. Passwords for all accounts are stored in encrypted form and automatically changed according to password policy, offering protecting against compromise and transfer to third parties. The information collected by the system serves as an evidence base in the investigation of suspected IT and information security breaches.
Control over privileged users’ access
Control over privileged users’ access through a dedicated terminal server
Privileged Single Sign-On
Single-entry point for IT administrators