Download PDF
BeyondTrust > Case Studies > DCI Exceeds Compliance Requirements for Privilege & Password Management
BeyondTrust Logo

DCI Exceeds Compliance Requirements for Privilege & Password Management

Technology Category
  • Cybersecurity & Privacy - Database Security
  • Cybersecurity & Privacy - Identity & Authentication Management
Applicable Industries
  • Finance & Insurance
Applicable Functions
  • Discrete Manufacturing
  • Quality Assurance
Use Cases
  • Cybersecurity
  • Infrastructure Inspection
Services
  • Software Design & Engineering Services
  • System Integration
The Challenge
In 2010, DCI expanded the scope of their internal auditing requirements to include access related areas such as user privileges, password rotation policies, review of access sessions, and access history. To address compliance requirements, the team also decided to lock down the development, test and internal business servers to protect vast amounts of sensitive data. This meant that they had to fully restrict root access, reset all passwords after each use, and periodically rotate them — whether they were used or not. Even SSH access had to be limited. To fulfill these needs, DCI required a procedure to delegate and authorize specific limited functions on each server, when access was required. They also wanted different login IDs for different functions on each server, plus a workflow whereby two managers could grant access to specific functions at particular times. Activity on the servers also had to be tracked by ID, including the functions allowed by each ID.
About The Customer
DCI is a premier developer of core banking software and technologies, including the award winning iCore360® software used by hundreds of community banks nationwide to securely manage all aspects of bank operations, transaction processing and account information. DCI is an independent, privately-owned company with several bank clients serving as owners, board members and user-group leaders. For over 50 years, this bank-driven ownership and collaborative relationship has differentiated DCI through a more personal approach to technology development and customer care. As a result DCI boasts an impressive track record of technical innovation and client satisfaction.
The Solution
DCI sought a privilege and password management solution that they could efficiently deploy to meet immediate compliance needs, while future-proofing their processes for upcoming financial services regulations. They also required a solution that could accommodate 1,500+ users and support a multitude of access rules and policies across the entire IT environment. DCI selected BeyondTrust PowerBroker for Unix and Linux to delegate portions of privileged accounts on the Solaris, Ubuntu, and SUSE servers, as well as PowerBroker Password Safe to manage the approval process and rotate server passwords. PowerBroker for Unix and Linux has flexible policies that enabled delegation and enforcement of the different IDs, each for a portion of the privileged account functions on each server. A master server handles password requests and updates passwords on all systems. Loggers record all activity on each server. Since the initial policies were established, maintaining the PowerBroker solution has required minimal effort and only occasional updates. PowerBroker Password Safe provided the key to managing privilege passwords at DCI. The appliance was easy to deploy, and the solution now encrypts and rotates all passwords at DCI. It also audits all password use and records all privileged sessions for replay when needed. Password Safe’s workflow capabilities enable IT administrators to schedule and submit requests for passwords required to conduct server maintenance. The required two managers receive alerts and can approve password requests at their convenience. In the end, DCI’s IT administrators can be confident that they will have access to the systems they requested during their maintenance windows.
Operational Impact
  • All server access is limited — even via SSH.
  • The auditors can easily see that procedures are being followed and our IT employees are able to remain productive.
  • Today we are working with our internal auditors to become PCI DSS 3.0 compliant, as requirements and customer needs continue to increase. BeyondTrust continues to facilitate these compliance efforts.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.