Management of privileged access to cloud platforms

Management of privileged access to cloud platforms

Share post

New ThycoticCentrify solution for control and management of privileged access to cloud platforms. Companies are increasingly relocating their internal applications to the cloud.

ThycoticCentrify, a leading provider of cloud identity security solutions that emerged from the merger of the leading Privileged Access Management (PAM) providers Thycotic and Centrify, enables AWS billing accounts and IAM accounts with its new cloud provider solution (Identity and Access Management) and AWS EC2 instances centrally and in real time.

Internal applications are more in the cloud

Companies are increasingly relocating their internal applications to the cloud. They often choose a “lift-and-shift” approach to migrate virtual machines (VMs) and applications to their preferred cloud provider. At the same time, they often create several different AWS accounts for each application project or department. In addition, each AWS account has its own master / billing account, IAM user accounts, and service accounts. Finally, there are the accounts of the virtual machines (VMs) to support an application.

Managing AWS master / billing account credentials is difficult because people are involved in any modification. In addition, AWS best practice recommends configuring multi-factor authentication (MFA) for an account that is controlled by AWS service enforcement. While automation tools can integrate new AWS EC2 instances into Privileged Access Management (PAM), operations, employees and auditors need a way to ensure and validate that all hosted virtual machines are recorded and properly secured.

Cloud provider solution for AWS

ThycoticCentrify's cloud provider solution for AWS addresses these problems by extending a number of existing PAM functions to continuously and automatically discover all AWS EC2 instances and thus ensure full visibility of the instances even in elastic auto-scaling Ensure groups. AWS master / billing accounts are securely stored in a password vault for emergencies. Interactive access to AWS accounts through the AWS Management Console, AWS CLI, SDKs, and APIs is tightly controlled. AWS IAM accounts and associated access keys are eliminated or secured in a vault to reduce the attack surface. At the same time, federated single sign-on based on the Security Assertion Markup Language (SAML) is a more secure and low-maintenance alternative. Continuous and automatic EC2 discovery and post-discovery processes ensure complete and precise transparency. As a result, EC2 instances and their privileged accounts are immediately secured and managed centrally.

Advantage: scalable cloud solution

“The cloud offers enormous advantages when it comes to scalability and availability. But it has also created new vulnerabilities for cyber attackers, which arise from inconsistent controls and the resulting problems in identity management, ”says Özkan Topal, Sales Director at ThycoticCentrify. “Our cloud provider solution for AWS provides real-time visibility into cloud workloads as they are added and removed. The management of privileged passwords and identities is automated. This ensures that administration and access controls are enforced and that complexity and risks are reduced at the same time. "

Özkan Topal, Sales Director at ThycoticCentrify (Image: ThycoticCentrify).

The basis of the cloud provider solution is a cloud-native spoke architecture (hub and spoke), grouped around the Centrify platform and Centrify gateway connectors, which use few resources. These integrate the cloud workloads into the Centrify platform. The offering can also automatically provision Centrify clients on discovered Windows and Linux instances for granular access control, auditing and the visual recording of sessions. It is also possible to log in without a password using ephemeral certificates from the Centrify platform via "Use My Account".

ThycoticCentrify's cloud provider solution is initially available for AWS and will soon be extended to Microsoft Azure and other cloud provider platforms.

More at Centrify.com

 


About ThycoticCentrify

ThycoticCentrify is a leading provider of cloud identity security solutions that enable digital transformation on a large scale. ThycoticCentrify's industry-leading Privileged Access Management (PAM) solutions reduce risk, complexity and cost while protecting enterprise data, devices and code in cloud, on-premises and hybrid environments. More than 14.000 leading companies around the world, including more than half of the Fortune 100, trust ThycoticCentrify. Customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Whether human or machine, in the cloud or on-premises - with ThycoticCentrify, privileged access is secure.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more