6
SECURING PRIVILEGED ACCOUNTS THREE STEPS TO MAXIMIZE PROTECTION WITH MFA

SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

SECURING PRIVILEGED ACCOUNTS THREE STEPS TO MAXIMIZE PROTECTION WITH MFA

Page 2: SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

RSA EBOOK: SECURING PRIVILEGED ACCOUNTS: THREE STEPS TO MAXIMIZE PROTECTION WITH MFA | 2

MFA FOR PRIVILEGED ACCOUNTSHackers are eyeing your privileged accounts—and standard passwords aren’t going to cut it. You need real protection. Multi-factor authentication (MFA) from RSA SecurID® Access protects your most sensitive access points—including servers, network administration, databases, root servers, and firewalls—with powerful security, while allowing your privileged users to do business without frustrating delays.

Through risk and behavior analytics, MFA ensures that every user logging into privileged accounts is legit, while screening out both malicious insiders and external attackers intent on exploiting weak passwords. Organizations are further shoring up privileged access security with privileged access management (PAM) solutions, such as CyberArk. PAM helps isolate, monitor, and safeguard privileged access to critical infrastructure including AWS and Azure consoles.

RSA SecurID Access protects privileged accounts

in three easy steps:

Add MFA to PAM.

Use risk-based authentication.

Streamline governance.

Page 3: SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

RSA EBOOK: SECURING PRIVILEGED ACCOUNTS: THREE STEPS TO MAXIMIZE PROTECTION WITH MFA | 3

MAXIMIZE PROTECTION OF PRIVILEGED ACCOUNTS IN THREE EASY STEPS

MFA IS KEY

Add Multi-Factor Authentication to PAM Even many privileged access password vaults rely on usernames and passwords. But because the information they protect is so critical, it’s important to reinforce that baseline security with a second authentication layer. MFA asks for additional proof that users are who they say they are, then works with PAM solutions to help ensure only that approved users gain access.

KEEP IT SAFE

Use Risk-Based Authentication and Multiple Authentication Options

A sophisticated security solution demands additional authentication whenever risk analytics detect suspicious behavior. MFA offers more than just hardware and software tokens, adding biometrics and one-time passcodes to strengthen security while reducing hassle for legitimate users.

MANAGE IT CENTRALLY

Streamline Governance for Privileged Accounts

Combine PAM with an effective identity governance solution for a unified view of all privileged users, the resources they’re entitled to, and associated access activity. You’ll allow appropriate access privileges—and ensure that they’re managed in a way both consistent with security best practices and compliant with corporate and regulatory requirements.

321

Page 4: SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

RSA EBOOK: SECURING PRIVILEGED ACCOUNTS: THREE STEPS TO MAXIMIZE PROTECTION WITH MFA | 4

MFA FOR PAM

To protect your most valuable assets, you need the strongest possible defense against misuse of privileged accounts. Together, PAM and MFA provide the multiple layers of security essential to that defense. Combining PAM and MFA gives you everything you need to manage credentials securely, step up authentication when risk warrants it, and institute best practices for managing privilege entitlements. The result is a complete approach that allows you to fully protect privileged accounts.

MFA FOR CYBERARK

CyberArk Enterprise Password Vault, a component of the CyberArk Privileged Account Security Solution, is designed to automatically secure, rotate and control access to privileged account passwords, based on flexible organizational policies—

reducing access-based security risks and supporting compliance requirements. RSA SecurID Access secures the CyberArk Enterprise Password Vault with MFA to ensure that only appropriate users access these highly sensitive resources.

Page 5: SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

RSA EBOOK: SECURING PRIVILEGED ACCOUNTS: THREE STEPS TO MAXIMIZE PROTECTION WITH MFA | 5

HOW IT WORKS

RSA SECURID ACCESS

RSA SecurID Access enables businesses to empower employees, partners and contractors to do more without compromising security or convenience. Embracing the security challenges of today’s blended-cloud and on-premises environments, bring-your-own-device trends and mobile policies, RSA SecurID Access ensures that users are who they say they are—and that they get timely, convenient access to the applications they need, from any device, anywhere.

33

2CyberArk requests identity

assurance from RSA (SAML, RADIUS or API)

4ID verified

3RSA challenges

user

User

1User with privileged access is asked for LDAP user credentials

5Access granted

Multi-factor authentication methodsEnterprise Password

Vault

RoutersServers

Workstations

Page 6: SECURING PRIVILEGED ACCOUNTS...Securing Privileged Accounts – Three Steps to Maximize Protection with MFA Subject This e-book tells you how Multi-factor authentication (MFA) from

RSA and the RSA logo are registered trademarks or trademarks of Dell Technologies in the United States and other countries. © Copyright 2018 Dell Technologies. All rights reserved. Published in the USA. 08/18 eBook H17405.

Dell Inc. or its subsidiaries believe the information in this document is accurate as of its publication date. The information is subject to change without notice.

ABOUT RSA

RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. RSA protects millions of users around the world and helps more than 90% of Fortune 500 companies thrive in an uncertain, high-risk world. For more information, visit rsa.com.