Security for Privileged Accounts Using Break-Glass Technique
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 3)Publication Date: 2014-03-30
Authors : Arun.S Mohanasundarm.A Bhoopathi Siva.K;
Page : 210-216
Keywords : Access control; Break-glass; Database; Administration; Security;
Abstract
Break-glass within computing is a term used to describe the act of checking out a system account password for use by a human. It is generally used for highest level system accounts such as root for unix or SYS/SA for database. These accounts are highly privileged and not in themselves individualized to a specific human, so instead break-glass limits them by the password time duration, with the aim of controlling and reducing the account’s usage to that which is necessary. Break-glass has been examined in a number of publications applied to medical systems. What is currently missing is an accurate translation of original break-glass concepts, especially applied to high security environments such as banking. This paper will provide a description of how break-glass is evolving into a broader method of time-based access control mechanism. Finally how time-based access control and break-glass can be varied adaptively based on threat level is proposed.
Other Latest Articles
- A NEW APPROACH TO IMPROVE BUSINESS USING SEO TECHNIQUES?
- Error Detection in Decoding of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes
- National interests: altruism socio-economic interventions
- The analysis is conducted to activity of the largest corporations of world in 2013 by model of innovative market
- System-modeling synergistic campaign social policy in terms of European integration
Last modified: 2014-03-14 19:10:17