the SWIFT Customer Security

Similar documents
Mapping BeyondTrust Solutions to

Secure Access & SWIFT Customer Security Controls Framework

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

PowerBroker Password Safe Version 6.6

Implementing NIST Cybersecurity Framework Standards with BeyondTrust Solutions

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Mapping BeyondTrust Solutions to

Use Cases for Unix & Linux

PowerBroker Auditing & Security Suite Version 5.6

Privileged Account Security: A Balanced Approach to Securing Unix Environments

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

CyberArk Privileged Threat Analytics

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Microsoft Security Management

CIS Top 20 #5. Controlled Use of Administrative Privileges

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ

Automating the Top 20 CIS Critical Security Controls

SECURITY & PRIVACY DOCUMENTATION

SYMANTEC DATA CENTER SECURITY

THE FIVE DEADLY SINS OF PRIVILEGED ACCESS MANAGEMENT

Reinvent Your 2013 Security Management Strategy

10 FOCUS AREAS FOR BREACH PREVENTION

THE TRIPWIRE NERC SOLUTION SUITE

A Technical Solutions Guide for Privileged Password & Session Management Use Cases

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018

Security Fundamentals for your Privileged Account Security Deployment

K12 Cybersecurity Roadmap

Oracle Data Cloud ( ODC ) Inbound Security Policies

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

locuz.com SOC Services

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP

CS 356 Operating System Security. Fall 2013

McAfee epolicy Orchestrator

SWIFT Customer Security Programme

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Tripwire State of Cyber Hygiene Report

Industrial Defender ASM. for Automation Systems Management

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Total Protection for Compliance: Unified IT Policy Auditing

Safeguarding Privileged Access. Implementing ISO/IEC Security Controls with the CyberArk Solution

SWIFT Customer Security Program

SECURITY PRACTICES OVERVIEW

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Cybersecurity Auditing in an Unsecure World

Carbon Black PCI Compliance Mapping Checklist

Teradata and Protegrity High-Value Protection for High-Value Data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

ANATOMY OF AN ATTACK!

EXECUTIVE VIEW. One Identity SafeGuard 2.0. KuppingerCole Report

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

AKAMAI CLOUD SECURITY SOLUTIONS

IT Needs More Control

Security+ SY0-501 Study Guide Table of Contents

How CyberArk can help mitigate security vulnerabilities in Industrial Control Systems

Virtual Machine Encryption Security & Compliance in the Cloud

Device Discovery for Vulnerability Assessment: Automating the Handoff

SecureVue. SecureVue

Security

CoreMax Consulting s Cyber Security Roadmap

CipherCloud CASB+ Connector for ServiceNow

GDPR Update and ENISA guidelines

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

GDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

CyberArk Solutions for Secured Remote Interactive Access. Addressing NERC Remote Access Guidance Industry Advisory

External Supplier Control Obligations. Cyber Security

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Cloud Customer Architecture for Securing Workloads on Cloud Services

Managing the Risk of Privileged Accounts and Passwords

CIS Controls Measures and Metrics for Version 7

Security Diagnostics for IAM

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Manchester Metropolitan University Information Security Strategy

HIPAA Regulatory Compliance

Unlocking the Power of the Cloud

Securing Office 365 with SecureCloud

IT Services IT LOGGING POLICY

Cybersecurity Session IIA Conference 2018

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Best practices with Snare Enterprise Agents

Critical Hygiene for Preventing Major Breaches

Transcription:

TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management

Table of ContentsTable of Contents... 2 Purpose of This Document... 3 What is the?... 3 How BeyondTrust Solutions Help with SWIFT Requirements... 5 Table 1: Summary Mapping of BeyondTrust Solutions to SWIFT Security Control Framework... 5 Table 2: Detailed Mapping of BeyondTrust Solutions to SWIFT Security Controls... 7 Appendix: PowerBroker Privileged Access Management Platform... 19 Product Capabilities within the PowerBroker Privileged Access Management Platform... 19 Conclusion... 21 About BeyondTrust... 21 2

Purpose of This Document This guide has been prepared so that IT and security administrators in financial services organizations can quickly understand how BeyondTrust solutions for privileged access management and vulnerability management address the requirements found in the SWIFT Customer Security Controls Framework 1.0, as published on 31 March 2017. What is the? SWIFT s Customer Security Controls Framework describes a set of mandatory and advisory security controls for SWIFT users grouped into three overall objectives Secure Your Environment, Know and Limit Access, and Detect and Respond supported by eight security principles and 27 security controls. For a representation of the framework s objectives and principles, please reference Figure 1 below. According to the framework: Mandatory security controls must be implemented by all users on their local SWIFT infrastructure Advisory controls are based on good practice that SWIFT recommends users to implement. SWIFT requires that users self-attest compliance against the mandatory security controls (it is optional for the advisory controls), with a deadline of January 1, 2018 to submit their selfattestations. This paper includes guidance on both the mandatory security controls and the advisory controls that SWIFT recommends, and how BeyondTrust solutions map into each of 3

them. BeyondTrust solutions therefore address parts of each section using privileged access management (PAM) and vulnerability management (VM) to implement measurable technical controls and manage the requirements. For a summary of these mappings, please see the table in the following section. 4

How BeyondTrust Solutions Help with SWIFT Requirements This section contains summary and detailed tables that demonstrate how BeyondTrust solutions map to SWIFT Security Control requirements. Table 1: Summary Mapping of BeyondTrust Solutions to SWIFT Security Control Framework NOTE: Controls marked with an A or italicized are advisory controls. Applicable BeyondTrust Products Mandatory and Advisory Security Controls BeyondTrust Platform PowerBroker Password Safe PowerBroker for Windows & Mac PowerBroker for Unix & Linux PowerBroker for Networks PowerBroker Identity Services PowerBroker Auditing & Security Suite Retina Vulnerability Management 1 Restrict Internet Access and Protect Critical Systems from General IT Environment 1.1 SWIFT Environment Protection 1.2 Operating System Privileged Account Control 2 Reduce Attack Surface and Vulnerabilities 2.1 Internal Data Flow Security 2.2 Security Updates 2.3 System Hardening 2.4A Back-office Data Flow Security 2.5A External Transmission Data Protection 2.6A Operator Session Confidentiality and Integrity 2.7A Vulnerability Scanning 2.8A Critical Activity Outsourcing 5

Applicable BeyondTrust Products Mandatory and Advisory Security Controls 3 Physically Secure the Environment 3.1 Physical Security 4 Prevent Compromise of Credentials 4.1 Password Policy 4.2 Multi-factor Authentication 5 Manage Identities and Segregate Privileges 5.1 Logical Access Control 5.2 Token Management 5.3A Personnel Vetting Process 5.4A Physical and Logical Password Storage 6 Detect Anomalous Activity to Systems or Transaction Records 6.1 Malware Protection 6.2 Software Integrity 6.3 Database Integrity 6.4 Logging and Monitoring 6.5A Intrusion Detection 7 Plan for Incident Response and Information Sharing 7.1 Cyber Incident Response Planning 7.2 Security Training and Awareness 7.3A Penetration Testing 7.4A Scenario Risk Assessment BeyondTrust Platform PowerBroker Password Safe PowerBroker for Windows & Mac PowerBroker for Unix & Linux PowerBroker for Networks PowerBroker Identity Services PowerBroker Auditing & Security Suite Retina Vulnerability Management 6

TABLE 2: DETAILED MAPPING OF BEYONDTRUST SOLUTIONS TO SWIFT SECURITY CONTROLS This table provides greater detail on how each BeyondTrust product maps into the SWIFT framework. Mandatory and Advisory Security Controls 1 Restrict Internet Access and Protect Critical Systems from General IT Environment 1.1 SWIFT Environment Protection Control Objective: Ensure the protection of the user's local SWIFT infrastructure from potentially compromised elements of the general IT environment and external environment. PowerBroker Password Safe contains proxy technology for secure RDP and SSH access into a secure zone, and the capabilities to replay and alert on privileged session activity into the zone. PowerBroker for Unix & Linux enables separation of the management workstation and the managed server to provide secure access into a zone and can limit activity to specific users and applications that reside on remote resources. PowerBroker for Networks enables the separation of the management workstation and the managed device to provide secure access into a zone and can limit activity to specific users and commands that reside on remote devices. 1.2 Operating System Privileged Account Control Control Objective: Restrict and control the allocation and usage of administrator-level operating system accounts. The BeyondTrust Platform is designed to manage privileges and control access to administrator level operating accounts with complete reporting, auditing, and session playback of user activity. PowerBroker Password Safe manages privileged passwords and session activity associated with administrator-level access to resources. PowerBroker for Windows & PowerBroker for Mac deliver privilege management for servers and endpoints eliminating the need to provide administrator level credentials to users performing administrator-level tasks. 7

PowerBroker for Unix & Linux removes the need for root access through a reliable, granular and flexible least privilege solution. PowerBroker for Networks removes the need for root access to devices of multiple types through a reliable, granular and flexible set of least privilege rules and policies. PowerBroker Identity Services brings Active Directory (AD) authentication and Group Policy to Unix & Linux systems (including Mac OS X). A single account for access to Windows, Unix and Linux simplifies user management. PowerBroker Auditing & Security Suite is designed to monitor all changes in Active Directory, Group Policy, File Systems, Exchange, and MS SQL to report on potential privilege abuse. 2 Reduce Attack Surface and Vulnerabilities 2.1 Internal Data Flow Security Control Objective: Ensure the confidentiality, integrity, and authenticity of data flows between local SWIFT-related applications and their link to the operator PC. The BeyondTrust Platform is designed to provide secure access between applications, operators, and the resulting reports, event management, configuration, and session playback recordings. PowerBroker Password Safe implements a secure connection between operators and applications using proxy technology for SSH and RDP directly in the platform. PowerBroker for Unix & Linux implements a secure connection between operators and applications using a jump host to provide confidentiality and integrity of sessions executed by users on a host. 8

PowerBroker for Networks implements a secure connection between operators and commands using a jump server to provide confidentiality and integrity of sessions executed by users on a target device. 2.2 Security Updates Control Objective: Minimize the occurrence of known technical vulnerabilities within the local SWIFT infrastructure by ensuring vendor support, applying mandatory software updates, and applying timely security updates aligned to the assessed risk. The BeyondTrust Platform centralizes information regarding missing security updates and vulnerabilities from all BeyondTrust solutions, including network scanning, agent technologies, and third-party connectors and third-party vulnerability data imports. PowerBroker for Windows contains patented real-time vulnerability assessment technology that can report on missing security updates through the BeyondTrust platform as users execute applications and operating system tasks. Retina Vulnerability Management can identify vulnerabilities and missing security updates across any network connected device using network scanning and agent-based assessment technologies. 2.3 System Hardening Control Objective: Reduce the cyber-attack surface of SWIFTrelated components by performing system hardening. The BeyondTrust Platform provides the aggregation and reporting of system hardening assessments performed by the Retina vulnerability management solution family. This identifies configuration anomalies that could be leveraged in a cyber-attack. PowerBroker for Windows and PowerBroker for Mac provide system hardening by removing administrative rights, implementing application control, and enforce privilege management to prevent unauthorized hardening changes. 9

PowerBroker for Unix & Linux supplements system hardening by restricting the ability of users to make unauthorized changes that could affect system hardening. PowerBroker for Networks supplements system hardening by restricting the commands that users can execute that could be used to make unauthorized changes affecting system hardening. Retina Vulnerability Management performs system hardening assessments against resources using industry standards from NIST, Microsoft, CIS, DISA, and many others. 2.4A Back-office Data Flow Security Control Objective: Ensure the confidentiality, integrity, and mutual authenticity of data flows between back office (or middleware) applications and connecting SWIFT infrastructure components. 2.5A External Transmission Data Protection Control Objective: Protect the confidentiality of SWIFT-related data transmitted and residing outside of the secure zone. 2.6A Operator Session Confidentiality and Integrity Control Objective: Protect the confidentiality and integrity of interactive operator sessions connecting to the local SWIFT infrastructure. Not Applicable Not Applicable The BeyondTrust Platform is designed to protect the confidentiality and integrity between applications, operators and the resulting reports, event management, configuration, and session playback recordings of all operator sessions. 10

PowerBroker Password Safe implements a secure connection between operators and applications using proxy technology for SSH and RDP directly in the platform using secure protocols and storage procedures. PowerBroker for Windows and PowerBroker for Mac are privilege management solutions that manage administrative access to applications and operating system tasks and help ensure that applications running with elevated privileges have high integrity. PowerBroker for Unix & Linux provides a confidential and secure session to resources with high integrity for appropriate access to applications, scripts, and tasks executed during normal operations. PowerBroker for Networks provides a confidential and secure session to resources with high integrity for appropriate access to commands, scripts, and tasks executed during normal operations. 2.7A Vulnerability Scanning Control Objective: Identify known vulnerabilities within the local SWIFT environment by implementing a regular vulnerability scanning process. The BeyondTrust Platform aggregates vulnerability assessment information for reporting and patch management from Retina s agent based and network scanning solutions. It is also capable of ingesting third party vulnerability data from other solutions to provide a central console regardless of source. PowerBroker for Windows provides patented real-time vulnerability assessments based on user interaction with the operating system and applications. 11

Retina Vulnerability Management can detect and report on vulnerabilities across the entire enterprise using network scanning and agent-based vulnerability assessment technologies. 2.8A Critical Activity Outsourcing Control Objective: Ensure protection of the local SWIFT infrastructure from risks exposed by the outsourcing of critical activities. The BeyondTrust Platform can report of resource changes from ports, services, shares, software, and users that may indicate inappropriate access and exposed risks when resources are shared with external parties. PowerBroker Password Safe can manage contractor and outsourced access to secure zones via context aware policy, segmentation, and reporting on all activity. 2.9A Transaction Business Controls Control Objective: Restrict transaction activity to validated and approved counterparties and within the expected bounds of normal business. 3 Physically Secure the Environment 3.1 Physical Security Not Applicable Control Objective: Prevent unauthorized physical access to sensitive equipment, workplace environments, hosting sites, and storage. Not Applicable 4 Prevent Compromise of Credentials 12

4.1 Password Policy Control Objective: Ensure passwords are sufficiently resistant against common password attacks by implementing and enforcing an effective password policy. PowerBroker Password Safe can enforce password complexity through assignments of random passwords at user defined frequency based on policy and usage. Retina Vulnerability Management can assess the local password policies assigned to resources, including complexity for Windows and non- Windows assets (based on SCAP hardening assessments). 4.2 Multi-factor Authentication Control Objective: Prevent that a compromise of a single authentication factor allows access into SWIFT systems, by implementing multi-factor authentication. The BeyondTrust Platform supports multifactor authentication for managing policies, reviewing events and sessions, and generating reports for all privileged access and vulnerability management solutions. PowerBroker Password Safe supports multi-factor authentication for password and session access. PowerBroker for Windows supports multi-factor authentication for privileged application access. 5 Manage Identities and Segregate Privileges 5.1 Logical Access Control Control Objective: Enforce the security principles of need-toknow access, least privilege, and segregation of duties for operator accounts. The BeyondTrust Platform provides complete management capabilities for all of BeyondTrust s privileged management and least privileged solutions. PowerBroker Password Safe enforces logical access to resources based on policies, context aware parameters, and provides separation of duties by restricting privileged password and session access. PowerBroker for Windows and PowerBroker for Mac provide least privilege access to applications and operating system tasks on servers and endpoints. 13

PowerBroker for Unix & Linux provides least privilege access and separation of duties based on policies and segregating user access to applications and resources. PowerBroker for Networks provides least privilege access and separation of duties based on policies and segregating user access to network devices. PowerBroker Identity Services allows for segregation of privileged access to Unix and Linux resources based on assignments in Active Directory Groups. PowerBroker Auditing & Security Suite monitors changes to Active Directory to ensure assignments and revocation of account access is performed appropriately and in a timely manner. 5.2 Token Management Control Objective: Ensure the proper management, tracking, and use of connected hardware authentication tokens (if tokens are used). 5.3A Personnel Vetting Process Not Applicable Control Objective: Ensure the trustworthiness of staff operating the local SWIFT environment by performing personnel vetting. 5.4A Physical and Logical Password Storage Control Objective: Protect physically and logically recorded passwords. Not Applicable The BeyondTrust Platform provides capabilities for password storage, rotation, and application to application API s for secure password storage. 14

PowerBroker Password Safe is designed to securely store passwords, automatically manage them, and provide complete attestation reporting for their usage and session activity. Retina Vulnerability Management can assess targets for poor password storage hygiene as a part of its vulnerability assessment capabilities. 6 Detect Anomalous Activity to Systems or Transaction Records 6.1 Malware Protection Control Objective: Ensure that local SWIFT infrastructure is protected against malware. The BeyondTrust Platform contains an analytics engine called Clarity that compares the file, process, and service hash results from various BeyondTrust solutions for potential malware. PowerBroker for Windows and PowerBroker for Mac collect hash information from applications that are executed and sends the results to the BeyondTrust Platform for malware analysis. Retina Vulnerability Management sends the hash information from processes and services gathered during credentialed scans to the BeyondTrust platform for malware analysis. 6.2 Software Integrity Control Objective: Ensure the software integrity of the SWIFTrelated applications. The BeyondTrust Platform aggregates all privileged activity occurring on hosts to alert and report on all privilege changes that could affect the software integrity of applications in scope. PowerBroker for Windows and PowerBroker for Mac manage privileges required to make changes on a resource and ensure that the software integrity of applications cannot be compromised due to lax privileges or inappropriate file changes. 15

PowerBroker for Unix & Linux manages privileges required to make changes on a resource and ensure that the software integrity of applications cannot be compromised due to inappropriate privileges or inappropriate file changes. PowerBroker for Networks manages privileges required to make changes on a resource and ensures that the software integrity of devices cannot be compromised due to inappropriate privileges. 6.3 Database Integrity Control Objective: Ensure the integrity of the database records for the SWIFT messaging interface. 6.4 Logging and Monitoring Control Objective: Record security events and detect anomalous actions and operations within the local SWIFT environment. Not Applicable The BeyondTrust Platform provides logging and monitoring for all privileged access, session recordings, and assessed vulnerabilities. PowerBroker Password Safe provides logging and monitoring for all privileged password access and privileged sessions. PowerBroker for Windows and PowerBroker for Mac provide logging and monitoring for all privileged application and operating system access on end points and servers. PowerBroker for Unix & Linux provides logging and monitoring for all privileged application, script, and command access on managed resources. PowerBroker for Networks provides logging and session monitoring for all privileged scripts and command access on managed devices. 16

PowerBroker Auditing & Security Suite provides logging and monitoring of all changes to Active Directory, File Systems, Exchange, and Microsoft SQL within Windows environments. Retina Vulnerability Management can assess whether operating system and application logs are configured correctly for the collection of information to meet these requirements. This can be done using native audits and security hardening assessments depending on the platform. 6.5A Intrusion Detection Control Objective: Detect and prevent anomalous network activity into and within the local SWIFT environment. 7 Plan for Incident Response and Information Sharing 7.1 Cyber Incident Response Planning Control Objective: Ensure a consistent and effective approach for the management of cyber incidents. 7.2 Security Training and Awareness The BeyondTrust Platform can forward all privilege and vulnerability management results to third party solutions to provide advanced correlation and detection of intrusion events. This information includes events from BeyondTrust Clarity a cluster mapping-based analytics engine that can identify abnormal user behavior and outlier risks associated with intrusion detection. The BeyondTrust Platform provides a single pane of glass for the collection of privileged activity and vulnerability assessments needed for forensics in a cyber incident response plan. Control Objective: Ensure all staff are aware of and fulfil their security responsibilities by performing regular security training and awareness activities. 7.3A Penetration Testing Control Objective: Validate the operational security configuration and identify security gaps by performing penetration testing. Not Applicable The BeyondTrust Platform aggregates vulnerability assessment results used in penetration testing reconnaissance and integrates with leading commercial penetration testing tools to automate actions. 17

Retina Vulnerability Management performs reconnaissance for penetration testing initiatives and integrates with leading penetration testing tools to automate potential exploitation. 7.4A Scenario Risk Assessment Control Objective: Evaluate the risk and readiness of the organization based on plausible cyber-attack scenarios. Not Applicable 18

Appendix: PowerBroker Privileged Access Management Platform The PowerBroker Privileged Access Management Platform is an integrated solution to provide control and visibility over all privileged accounts and users. By uniting best of breed capabilities that many alternative providers offer as disjointed tools, the PowerBroker platform simplifies deployments, reduces costs, improves system security and closes gaps to reduce privileged risks. Product Capabilities within the PowerBroker Privileged Access Management Platform The PowerBroker platform includes the following individual best-of-breed products that are fully integrated into the platform itself. For how these products map into the SWIFT framework please reference the detailed chart earlier in this document. PowerBroker Password Safe PowerBroker Password Safe is an automated password and privileged session management solution offering secure access control, auditing, alerting and recording for any privileged account from local or domain shared administrator, to a user s personal admin account (in the case of dual accounts), to service, operating system, network device, database (A2DB) and application (A2A) accounts even to SSH keys, cloud, and social media accounts. Password Safe offers multiple deployment options, broad and 19

adaptive device support, with session monitoring, application password management and SSH key management included natively. PowerBroker for Windows PowerBroker for Mac PowerBroker for Unix & Linux PowerBroker for Sudo PowerBroker for Networks PowerBroker for Windows (PBW) is a privilege management solution that mitigates the risks of cyber-attacks as a result of users having excessive rights. By removing admin rights, protecting the integrity of critical files, and monitoring user behavior, PBW protects organizations without impacting end-user productivity. PowerBroker for Mac reduces the risk of privilege misuse by enabling standard users on Mac OS to perform administrative tasks successfully without entering elevated credentials. PowerBroker for Unix & Linux is a least privilege solution that enables IT organizations to eliminate the sharing of credentials by delegating Unix and Linux privileges and elevating rights to run specific Unix and Linux commands without providing full root access. PowerBroker for Sudo provides centralized policy, logging, and version control with change management for multiple sudoers files. The solution simplifies policy management, improves log security and reliability, and increases visibility into entitlements. This makes it easier for you to securely manage on low-priority servers or in areas where completely replacing sudo is not feasible. PowerBroker for Networks is an agentless privilege management solution that controls, audits, monitors and alerts on activity on network devices, enabling organizations of all sizes to reduce cybersecurity risks and achieve privilege management at scale. PowerBroker Identity Services Retina CS PowerBroker Identity Services centralizes authentication for Unix, Linux, and Mac environments by extending Active Directory s Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to non-windows platforms, PowerBroker provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Retina CS is a vulnerability management software solution designed from the ground up to provide organizations with context-aware 20

vulnerability assessment and risk analysis for making better privileged access management decisions. The BeyondTrust Platform capabilities The PowerBroker platform is built on the shared capabilities found in BeyondInsight, our IT risk management platform. Common components centralized for all products in BeyondInsight include asset and account discovery, threat, vulnerability and behavioral analytics, reporting and connectors to third-party systems, and central management and policy. Conclusion By partnering with BeyondTrust, organizations can address their compliance and security requirements as defined in the, leaving fewer gaps, better controlling access to customer data, and improving efficiency over their privileged access management and vulnerability management practices. In addition, if your organization currently adheres to the NIST Cybersecurity Framework, ISO 27002, or PCI DSS, please reference Appendix E in the SWIFT framework guide. This will enable you to expedite the documenting and enforcing of compliance due to overlaps with those regulations. BeyondTrust can provide whitepapers covering these requirements as well to properly cross reference initiatives within your organization and with BeyondTrust solutions. About BeyondTrust BeyondTrust is a global security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: privileged access management and vulnerability management. Our solutions grow with your needs, making sure you maintain control no matter where your organization goes. BeyondTrust's security solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com. 21