Vulnerabilities / Threats
10/19/2011
08:48 AM
50%
50%

Are Your IT Pros Abusing Admin Passwords?

One in four IT professionals know of a coworker who has used privileged credentials to snoop. Worse, 25% of superuser passwords don't pass basic security test.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
One in four IT professionals say they know of at least one IT co-worker at their business who's used privileged login credentials to inappropriately access sensitive information. Furthermore, 42% report that IT staff freely share passwords and access to multiple business systems and applications.

Those findings come from a survey of 300 IT professionals--two-thirds of them working for businesses with 10,000 or more employees--recently conducted by Lieberman Software, which sells privileged identity management software.

When it comes to securing systems, experts recommend using long, random passwords that mix character types (uppercase and lowercase letters, symbols, and numbers), never reusing a password, and changing passwords with some frequency. But many end users fail to follow those recommendations unless faced with systems that automatically enforce password rules.

Interestingly, the survey found that the same holds true for many businesses' IT departments. In particular, 25% of survey respondents said that at least some of the superuser passwords that grant all-access rights to hardware, applications, or databases were less complex than the business' end-user password policies required. Furthermore, since many of these superuser passwords were shared freely between employees, spotting inappropriate, administrator-level access to sensitive data and tracing it back to the person responsible would be difficult.

[The feds are cracking down to force companies to disclose security breaches. Learn more: SEC Mandates Cyber Incident Reporting.]

Password sharing, however, arguably masks a bigger challenge, which is the sheer number of systems with which IT personnel must interact on a daily basis. Notably, the survey found that half of IT managers are asked to remember passwords to 10 or more systems. In such a scenario, aren't password management shortcuts inevitable?

"The issue has to do with the proliferation of systems, and the IT groups not having the resources to manage what's on their plate," said Philip Lieberman, president and CEO of Lieberman Software, in an interview. "This is an issue involving lack of adoption of technology, but also a lack of awareness at a senior level as to how bad the problem has gotten."

Many IT departments also take shortcuts when it comes to handling hardware and software that ships with well-known, default passwords. "Let's say you buy 20 switches from Hewlett-Packard, these switches come with a default account and password, and IT might install all of them and leave them with the factory defaults," he said. "Or say you buy Cisco switches and change their password, but you change all the switches to have the same password. So when someone leaves the company, or a device ends up on eBay, someone has the password to every switch. Or if a hacker breaks into one machine, figures out the password by cracking one hash, they get the password to all of the machines."

A related challenge is that administrator-level passwords may be changed infrequently, if at all. For example, 48% of survey respondents reported that privileged account passwords at their business had remained unchanged for at least 90 days. As a result, former employees may still know the passwords to key systems.

Might a failure to change passwords put a business in violation of various regulations, such as Sarbanes-Oxley, or the Payment Card Industry Data Security Standard? In general, regulations leave password policy specifics up to the business. That said, many auditors will advocate meeting regulatory requirements via an IT governance framework, such as COBIT (for control objectives for information and related technology), which recommends a number of password-related security measures, including changing initial passwords immediately upon first access.

"Some organizations take the auditor's report seriously," said Lieberman. "Others play shadow puppets and say we've done the best we can do. Others view it simply as a cost, and say, we'll take the risk."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
10/24/2011 | 9:37:20 PM
re: Are Your IT Pros Abusing Admin Passwords?
Keeping track of super user accounts is important for security. I know of situations where people who had no business with admin rights were able to access things they shouldn't have using accounts that may have had a purpose when they were created but basically had been forgotten about instead of retired (eg, former employees who left the business, guest accounts, etc).
Brian Prince, InformationWeek contributor
TFoire
50%
50%
TFoire,
User Rank: Apprentice
10/19/2011 | 9:02:31 PM
re: Are Your IT Pros Abusing Admin Passwords?
Thanks for your comment Ralph.

However, fast user switching seems like a good idea until you get so many people logged on the your system that it is unusable. We have the choice of either disabling FUS or having an admin periodically visiting all these stations and logging users off.
Ralph124
50%
50%
Ralph124,
User Rank: Apprentice
10/19/2011 | 8:47:44 PM
re: Are Your IT Pros Abusing Admin Passwords?
LINUX, Windows (Vista) and OS-X all allow switching users from a locked screen. I suggest updating clients. If Windows is more secure than your current system, you need to do some work.
TFoire
50%
50%
TFoire,
User Rank: Apprentice
10/19/2011 | 5:46:40 PM
re: Are Your IT Pros Abusing Admin Passwords?
Passwords are shared because, more often or not, they have to be.

For example: We have shared computers throughout our hospital. HIPAA requires systems to be locked when not in use so we have GP set to lock them automatically. The problem is that only the current user or an administrator can unlock the system. Usually the current user is nowhere in sight. The choice is to give users admin privileges, share passwords or use products like Unlock Administrator ( http://www.e-motional.com/ULAd... ) give regular users the ability to unlock systems. The first option is bad, the second debatably worse and the third is not free. Pick your poison.

T
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.