• Complain

Brian Anderson - Preventing Good People from Doing Bad Things: Implementing Least Privilege

Here you can read online Brian Anderson - Preventing Good People from Doing Bad Things: Implementing Least Privilege full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2011, publisher: Apress L. P., genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Brian Anderson Preventing Good People from Doing Bad Things: Implementing Least Privilege
  • Book:
    Preventing Good People from Doing Bad Things: Implementing Least Privilege
  • Author:
  • Publisher:
    Apress L. P.
  • Genre:
  • Year:
    2011
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Preventing Good People from Doing Bad Things: Implementing Least Privilege: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Preventing Good People from Doing Bad Things: Implementing Least Privilege" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

In todays turbulent technological environment, its becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into account the weakest link in their implementation: human nature. Despite all other efforts, people can sway from what they should be doing. Preventing Good People from doing Bad Things drives that concept home to business executives, auditors, and IT professionals alike. Instead of going through the step-by-step process of implementation, the book points out the implications of allowing users to run with unlimited administrator rights, discusses the technology and supplementation of Microsofts Group Policy, and dives into the different environments least privilege affects, such as Unix and Linux servers, and databases. Readers will learn ways to protect virtual environments, how to secure multi-tenancy for the cloud, information about least privilege for applications, and how compliance enters the picture. The book also discusses the cost advantages of preventing good people from doing bad things. Each of the chapters emphasizes the need auditors, business executives, and IT professionals all have for least privilege, and discuss in detail the tensions and solutions it takes to implement this principle. Each chapter includes data from technology analysts including Forrester, Gartner, IDC, and Burton, along with analyst and industry expert quotations. What youll learn Why unlimited administration rights are a bad thing Why least privileges is a good solution Effective implementation of least privileges Least privileges on Unix and Linux servers Issues with Microsofts Group Policy Who this book is for The audience is segmented into three separate categories, all of which are clearly addressed and weighed-in on in each chapter: the auditor, the businessman, and the IT professional. Auditor The first segment are the information technology security auditors. They are the ones responsible for the analysis of technical, physical, and administrative controls in the organization(s) whose security is in question. Their work includes the auditing of data center personnel, computer equipment, all policies and procedures, physical and environmental controls, and back-up procedures. Because their jobs so heavily rely on established protocols for the protection of sensitive information, this segment of the market will find this book a must-read. Their main concern is making sure the companies they are inspecting are in compliance with regulations and are taking the appropriate measures to secure their information and the users accessing them. They will learn how least privilege is the only way to fully satisfy government security regulations, and it will give them necessary and cutting-edge information on how to correctly perform their jobs. Businessperson The second segment are the businesspeople. They are the ones who run the companies requiring least privilege. These individuals are driven by the bottom line, and are ultimately concerned with spending and returns on investment. While they may be interested in security and realize its importance, the motivation behind any decisions is saving the company money. They need this book because it will clearly outline the financial benefits of implementing least privilege. It will explain that, from a business point of view, least privilege is the only way to eliminate the misuse of privilege and avoid the extensive costs of security breaches, expensive audits, help desk costs, and costly hours of IT troubleshooting. They will read it and use it as a reference as they prepare financially for a more secure IT environment. IT Professional The third and final segment are the IT professionals. They are the ones who appreciate security for securitys sake. They understand the implications of a noncompliant environment. They are on the forefront of the companys information environment. They manage users and those users privileges. They download applications, grant privileges to users, process information, store information, program, install software, perform data management, network machines, and manage the networks they create. They need and will read this book because it will expand their understanding of the concept of least privilege and apply it to the environment in which they work. They will learn how to supplement Group Policy to attain least privilege, how to protect their environments, and how to carry security throughout their enterprise. This book will teach them new ways to look at the principle of least privilege, and it will educate them with the information necessary to receive executive and financial backing to the projects that will secure their network. Table of Contents The Only IT Constant is Change Misuse of Privilege is the New Corporate Landmine Business Executives, Technologisst and Auditors Need Least Privilege Supplementing Group Policy on Windows Desktops Servers Are the Primary Target for Insiders and Hackers Alike Protecting Virtual Environments from Hypervisor Sabotage Secure Multi-Tenancy for Private, Public and Hybrid Clouds Applications, Databases, and Desktop Data Need Least Privilege, Too Security Does Not Equal Compliance The Hard and Soft Cost of Apathy Final Thoughts for Least Privilege Best Practices

Brian Anderson: author's other books


Who wrote Preventing Good People from Doing Bad Things: Implementing Least Privilege? Find out the surname, the name of the author of the book and a list of all author's works by series.

Preventing Good People from Doing Bad Things: Implementing Least Privilege — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Preventing Good People from Doing Bad Things: Implementing Least Privilege" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Preventing Good People from Doing Bad Things Implementing Least Privilege - photo 1

Preventing Good People from Doing Bad Things: Implementing Least Privilege

Copyright 2011 by John Mutch, Brian Anderson

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

ISBN-13 (pbk): 978-1-4302-3921-5

ISBN-13 (electronic): 978-1-4302-3922-2

Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.

Lead Editor: Jeffrey Pepper
Editorial Board: Steve Anglin, Mark Beckner, Ewan Buckingham, Gary Cornell,
Jonathan Gennick, Jonathan Hassell, Michelle Lowman, James Markham,
Matthew Moodie, Jeff Olson, Jeffrey Pepper, Frank Pohlmann, Douglas
Pundick, Ben Renow-Clarke, Dominic Shakeshaft, Matt Wade, Tom Welsh
Coordinating Editor: Jennifer L. Blackwell
Copy Editor: Ralph Moore
Compositor: Mary Sudul
Indexer: SPi Global
Cover Designer: Anna Ishschenko

Distributed to the book trade worldwide by Springer-Verlag New York, Inc., 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax 201-348-4505, e-mail .

For information on translations, please contact us by e-mail at .

Apress and friends of ED books may be purchased in bulk for academic, corporate, or promotional use. eBook versions and licenses are also available for most titles. For more information, reference our Special Bulk SaleseBook Licensing web page at

The information in this book is distributed on an as is basis, without warranty. Although every precaution has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work.

With gratitude to the BeyondTrust team and
Brian Anderson for his insightful work on this
project and with love to my four children
Natalie, Garrett, Annabelle, and Lauren,
whose support and love sustain me every day.
John

For all of those insider heroes who fight to
prevent the misuse of privilege on a daily basis in
order to help secure precious information assets.
Brian

Contents
About the Authors

John Mutch has been an operating executive and investor in the technology - photo 2John Mutch has been an operating executive and investor in the technology industry for over 30 years and has a long, sustained track record of creating shareholder value through both activities. Since 2008, he has served as chief executive officer (CEO) at BeyondTrust, the industry leader in mitigating insider threats across physical, virtual, and cloud information technology. Prior to joining BeyondTrust, Mutch was a founder and managing partner of MV Advisors, LLC, a strategic block investment firm that provides focused investment and strategic guidance to small- and mid-cap technology companies. Prior to founding MV Advisors, Mutch was appointed by a US bankruptcy court to the board of directors of Peregrine Systems in March 2003. He assisted that company in a bankruptcy workout proceeding and was named president and CEO in July 2003. Mutch ran Peregrine Systems, operating the company under an SEC consent decree, restating five years of operating results and successfully restructuring the company, culminating in a sale to Hewlett Packard for $425 million in December 2005. Prior to running Peregrine, Mutch served as president, CEO, and a director of HNC Software, an enterprise analytics software provider. Under his leadership, the company nearly doubled revenue and successfully spun out Retek in an IPO that returned more than $2.5 billion to shareholders. HNC Software was sold to Fair Isaac Corporation in August 2002 for $825 million. Prior to HNC Software, Mutch spent seven years at Microsoft Corporation in a variety of executive sales and marketing positions. He previously served on the boards of Edgar Online (NASDAQ: EDGR), Aspyra (Amex: APY), Overland Storage (NASDAQ: OVRL), and Brio Software.

Mutch currently serves on the board of Adaptec, Inc. (Nasdaq: ADPT) as a director designee of Steel Partners and the board of Agilysys (Nasdaq: AGYS) as a director designee of Ramius Capital. He holds a Master's in business administration from the University of Chicago and a Bachelor of Science degree from Cornell University, where he serves on the advisory board for the undergraduate school of business.

Brian Anderson brings more than 25 years of global enterprise software and - photo 3Brian Anderson brings more than 25 years of global enterprise software and security industry experience to this book. He has a track record for award-winning branding and product launches, as well as inbound and outbound marketing models to low-touch, scalable, measureable, and predictable results. Anderson is a frequent industry spokesperson and a published author. Since 2009, he has served as chief marketing officer at BeyondTrust, where he is responsible for all aspects of corporate brand development, as well as lead and demand generation to increase awareness and interest in all customer and investor segments.

Prior to BeyondTrust, Anderson served as a serially successful CMO for several venture-funded companies and senior executive at publicly traded companies. At Siderean Software, his branding efforts garnered rave reviews and numerous awards. At Avamar Technologies, his leadership resulted in a huge revenue increase and numerous awards. Avamar was subsequently acquired by EMC. Prior to Avamar, Anderson was program director of marketing for IBM Tivoli Security and Storage, after successfully building industry leader Access360's brand and sales pipeline and positioning for a sale to IBM in 2002. Anderson also served as CMO of HNC Software, and for seven years prior to HNC at FileNet Corporation, culminating in his role as vice president of worldwide corporate marketing. He received his Bachelor of Science degree in computer science from the University of New Orleans.

Acknowledgments

The authors would like to first acknowledge and thank all of the customers, analysts, and industry luminaries who contributed their real-world experiences, observations, stories, and words of wisdom: Mark Diodati, Andras Cser, Sally Hudson, Derek Melber, Darren Mar-Elia, Ian Short, Jim Jaeger, Neil McDonald, Jon Oltsik, Ian Glazer, David Nester, Dale Martinson, William Osler, Keith Lee, Ant Allan, John Sorts, Nicolas Debeffe, Mike Martin, Paulo Pina, Isaac Asimov, and Heraclitus.

We would also like to personally thank Kristen Canady, Nick Kettles, Jim Zeirick, and Hugh Burnham for their invaluable assistance in pulling this book together. Finally we would like to thank the Apress team for their incredible support, encouragement, and responsiveness: Jeffrey Pepper, Jennifer Blackwell and Ralph Moore.

Introduction

Billions of dollars have been spent over the last few decades on corporate information technology (IT) security in order to keep the bad guys out, but it turns out the bigger threat was and always has been found within the network perimeter. The so called insider threat, the trusted employee, contractor, or partner, that can cost an organization more on a daily and/or per-incident basis than any outside hacker could hope for.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Preventing Good People from Doing Bad Things: Implementing Least Privilege»

Look at similar books to Preventing Good People from Doing Bad Things: Implementing Least Privilege. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Preventing Good People from Doing Bad Things: Implementing Least Privilege»

Discussion, reviews of the book Preventing Good People from Doing Bad Things: Implementing Least Privilege and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.