Enterprise account manager with double safekeeping feature
Double safekeeping, or the two-man rule, has long been an established control mechanism for ensuring high levels of security during critical operations because the process requires the involvement of two or more authorized personnel when accessing sensitive resources.
Now Lieberman Software Corporation is extending double safekeeping to privileged identity management in the latest version of its Enterprise Random Password Manager (ERPM) product.
ERPM can now break up static and dynamic privileged account passwords into as many different segments as required by an organization’s IT policies. Each password segment is assigned to an authorized user (or group) at the appropriate time, in a fully audited manner.
In practice, an IT manager may have one segment of the password, while an IT administrator may obtain another segment separately. Together both parties have the entire password, but neither person would need to disclose their part to anyone else. Delegation, along with the splitting and assembly of passwords, is accomplished automatically and configured on an account-by-account basis for all types of passwords, including privileged passwords.
ERPM is a privileged identity management product that automatically locates every privileged account in the IT infrastructure, frequently updates each account’s password with a unique and complex value, and then deploys the password changes wherever they are used in the data center. By controlling and auditing access to these accounts, ERPM helps secure an organization’s most crucial proprietary data.
“When implemented, ERPM’s double safekeeping functionality prevents any one individual from having all of the credentials for the powerful privileged accounts that can access an organization’s most sensitive data and IT resources,” said Philip Lieberman, President and CEO of Lieberman Software. “Some regulatory compliance requirements, such as BASEL II, are now requiring organizations to store and retrieve sensitive information – including passwords – in multiple parts so that no one person can maintain key secrets individually.”