Privileged activity monitoring through privileged user password management and log management systems
This application claims priority to and is a divisional application of U.S. application Ser. No. 12/790,434 filed May 28, 2010, which application is incorporated herein by reference in its entirety. The invention relates to the field of regulatory and/or corporate policy compliance monitoring/management systems and products. Organizations face increased pressure of maintaining regulatory and/or corporate policy compliance. Many policies (for example, SOX, PCI, GLBA, etc.) require strict management of privileged (typically administrative) accounts. This management includes who has access to these accounts, the purpose for which these accounts are being used and the auditing of the administrative activities while the account was being used. Compliance auditors will ask for proof that these activities are being retained for a certain period of time, actively monitored and acted upon if out of compliance. Thus, an organization may be required to keep track of who is accessing certain system resources and what activities they are performing. However, access to sensitive activities such as modifying configuration files at a system resource is oftentimes restricted to a particular group of physical users such as IT administrators having root access. Typically, such users may login as a privileged user such as the root user using a password dedicated to the root user account. Because more than one physical user may login as the privileged user, it may be difficult to identify the physical user who performed particular activities while logged in as the privileged user. When faced with many hundreds or thousands of servers and millions of administrative/privileged transactions per day this becomes a daunting task for any organization. In some implementations, the invention relates to a system and method for monitoring privileged account access and activities. An access control management sub-system may track the identity of a physical user who was granted privileged access to an enterprise resource (i.e., the user who used the privileged account associated with the enterprise resource) and the timeframe for which the user was granted access. A log management sub-system may track the privileged/administrative activities performed on or associated with the enterprise resource. Uniting these two pieces of data allows the enterprise to associate the physical user with the privileged activity as well as perform automated processes, such as, revoking account privileges. The accompanying drawings, which are incorporated into and constitute a part of this specification, illustrate one or more examples of implementations of the invention and, together with the description, serve to explain various principles and aspects of the invention. Reference will now be made in detail to various implementations of the invention as illustrated in the accompanying drawings. The same reference indicators will be used throughout the drawings and the following description to refer to the same or like items. Enterprise management system 110 may include, among other components, an access control management sub-system 112, a log management sub-system 114, a reporting management sub-system 118, and/or a processor 116. In some implementations, although illustrated in Enterprise management system 110 may include a processor 116, circuitry and/or other hardware operable to execute computer-readable instructions. According to one aspect of the invention, system 100 may include one or more tangible computer-readable storage media configured to store one or more software modules, wherein the software modules include computer-readable instructions that when executed by the processor cause the processor to perform the functions described herein. According to one implementation, enterprise management system 110 may comprise computer hardware programmed with at least one computer application having one or more software modules that enable the various features and functions of the invention. Non-limiting examples of the software modules in the application may include one or more of an access control management sub-system 112, a log management sub-system 114, a reporting management sub-system 118, and/or other modules for performing the features and functions described herein. In some implementations, while In some implementations, each sub-system may include one or more tangible computer-readable storage media configured to store one or more software modules, wherein the software modules include computer-readable instructions that when executed by the processor cause the processor to perform the functions described herein. In some implementations, the sub-systems 112, 114, 118 may be communicatively coupled to one another. Enterprise resources 140, 150, 160 may include one or more tangible computer-readable storage media configured to store one or more agents 140 According to one implementation, access control management sub-system 112 may provide privileged user password management (PUPM) for protecting enterprise resources 140, 150, 160 across platforms and operating systems against illicit, malicious, and non-compliant access. Access control management sub-system 112 may by communicate with one or more agents 140 In one implementation, a user may request to gain privileged access to enterprise resource 140 (i.e., gain access to a privileged account associated with enterprise resource 140 or otherwise login as the privileged user), for example. Enterprise resource 140 may comprise an agent 140 Once the user has privileged access to enterprise resource 140, the user may perform one or more administrative/privileged activities (e.g., administrative maintenance of hardware, software, and information, backup operations, managing user access, and/or other activities) on or associated with the enterprise resource 140. These administrative/privileged activities may be separately monitored and/or logged by agent 140 In one implementation, agent 140 In one implementation, agent 140 According to an aspect of the invention, agents 150 In one implementation, log management sub-system 114 may communicate with one or more agents 140 In one implementation, agent 140 According to an aspect of the invention, agents 150 In one implementation, log management sub-system 114 may collect privileged activity information from each enterprise resource 140, 150, 160 via agents 140 According to an aspect of the invention, access control management sub-system 112 and log management sub-system 114 may communicate to provide tighter access control and monitoring of privileged (administrative) activities, and the capability of tracing these activities to a physical user. In one implementation, access control management sub-system 112 may communicate the privileged account access information associated with each enterprise resource 140, 150, 160 to log management sub-system 114. Log management sub-system 114 may store the privileged account access information and the collected privileged activity information from each enterprise resource 140, 150, 160 in central data repository 130. While central data repository 130 in In one implementation, a physical user may be granted privileged access to enterprise resource 140 by access control management sub-system 112 indicating a check-out event. The privileged user may perform administrative activities on or associated with the enterprise resource 140. Agent 140 In some implementations, a second record may, in addition to all the information in the first record, include time of check-in event, privileged user's identity information at time of check-in, enterprise resource identifier at time of check-in, and/or privileged account identifier at time of check-in. A third record may store the privileged activity information. It will be understood that the privileged account access information and privileged activity information may be stored in any other format as long as queries may be run against this information stored in the central data repository, without departing from the scope of the invention. In one implementation, access control management sub-system 112 may track check-out/check-in event times, physical user identity, etc., and log management sub-system 114 may track the privileged activities, etc. Combining (i.e., storing together) these two pieces of information allows for association of a physical user with the privileged activity and also allows for implementation of runtime monitoring features such as revoking root privileges if certain activities are performed. It should be understood that while access control management sub-system 112 and log management sub-system 114 are depicted as being implemented on a single system, they can be implemented on separate systems as long as they can communicate with one another to transfer privileged account access information. In one implementation, queries may be run against central data repository 130 to determine the physical user who was granted access to a privileged account, the timeframe that the physical user was granted access to the privileged account, what privileged activities were performed by the physical user during access to the privileged account, etc. In one implementation, operators (or other users) may interact with the enterprise management system 110 via one or more client devices 120 In one implementation, at least one of client devices 120 In one implementation, operators may utilize the PUPM console, the log management console (or other user interface associated with a client device) to provide requests for information from central data repository 130. Reporting management sub-system 118 may receive these requests for information. The requests may include queries for particular information from central data repository 130. The requests may include one or more parameters, such as, timeframes for which information is desired, enterprise resource ids of enterprise resources for which information is desired, user ids of physical users for which information is desired, privileged activity identifiers of privileged activities for which information is desired, and/or other parameters. Based on the one or more parameters, reporting management sub-system 118 may query central data repository 130 to retrieve the requested information. For example, a request may include a timeframe and a resource id. Reporting management sub-system 118 may query the central data repository based on the timeframe and resource id and may retrieve information regarding the physical users (e.g., user ids) who were granted privileged access to the resource (whose resource id is provided in the request) during the timeframe and/or what privileged activities (e.g., activity identifiers) were performed. In one implementation, a request may include a timeframe and a user id. Reporting management sub-system 118 may query the central data repository based on the timeframe and user id and may retrieve information regarding what enterprise resources (e.g., resource ids) were accessed by the physical user (whose user id is provided in the request) during the timeframe and/or what privileged activities (e.g., activity identifiers) were performed. In one implementation, a request may include a privileged activity identifier. Reporting management sub-system 118 may query the central data repository based on the privileged activity identifier and may retrieve information regarding what physical users (e.g., user ids) performed the privileged activity (whose identifier is provided in the request) and on what enterprise resources (e.g., resource ids). According to an aspect of the invention, such queries are possible because both privileged account access information (including, for example, check-out/check-in event times for privileged access or timeframe for privileged access, physical user identity of user granted privileged access, the resource identity of the resource for which privileged access is granted, etc.) and privileged activity information (including, for example, the privileged activities performed, time/timeframe indicating when the privileged activities were performed) associated with various enterprise resources are stored in central data repository 130. As such, when the central data repository is queried, the privileged account access information and the privileged activity information stored in the repository is queried based on parameters provided in the request, thereby providing for a comprehensive view of privileged account access and activities, wherein activities can be traced to a physical user. In one implementation, based on the retrieved information, it may be determined whether any non-compliant activity has been performed by a user and/or on a particular resource. In other words, seamless auditing compliance and investigations of privileged account access and activities may be performed. In one implementation, chained queries may be performed by reporting management sub-system 118. For example, a first query may query the central data repository based on a user id (provided in a request). Based on the query, information regarding what enterprise resources were accessed by the physical user (whose user id is provided in the request) and/or what privileged activities were performed maybe retrieved. If further investigation of the activities performed the user is desired, a second request and/or query may be generated/received which may query the central data repository to retrieve any past activity performed by the user from one or more enterprise resources that were accessed by the user. Reporting management sub-system 118 may generate reports based on the retrieved information that may be viewed by the operators via client devices 120 In operation 202, account access information may be received from agents 140 In operation 208, a request to retrieve data from the central data repository may be received. The request may be received by access control management sub-system 112, log management sub-system 114, or other component of system 110 as appropriate. In some implementations, the request includes a query or other request to obtain at least a portion of the account access information or the privileged activity information. In some implementations, the request includes one or more of the physical user identifier, a resource identifier identifying the at least one enterprise resource, and the one or more privileged activities. In other words, the request may be a query that provides one or more pieces of information such as, for example, (1) a user having privileged access to a resource, (2) a resource identifier, and/or (3) privileged activities that occurred in an enterprise in order to obtain, for example, (1) what privileged activities were performed while the user had privileged access, (2) what users had privileged access to the resource and what activities were performed during such access, and/or (3) who performed the privileged activities and from which resources. As would be appreciated, the foregoing are non-limiting examples listed for illustrated purposes only. Different combinations of information may be included and/or sought by the request. In some implementations, the request includes a physical user identifier that identifies a physical user who was granted privileged access. In these implementations, the request may seek to obtain what activities were performed by the physical user and/or on which machines these activities were performed. In some implementations, the request includes a resource identifier that identifies an enterprise resource. In these implementations, the request may seek to identify users who had privileged access to the particular enterprise resource and/or identify the activities those users performed during the privileged access. In some implementations, the request includes an activity identifier that identifies privileged activities that occurred in an enterprise. In these implementations, the request may seek to identify the physical users that performed the privileged activities and/or the enterprise resources from which such activities were performed. In operation 210, the first timeframe or the second timeframe associated with the one or more of the physical user identifier, a resource identifier identifying the at least one enterprise resource, and the one or more privileged activities included with the request may be identified, based on the information in the data repository for example. In the foregoing example where the request included or otherwise identified the particular enterprise resource, the first timeframe associated with when and/or for how long a physical user was granted privileged access to the particular enterprise resource may be identified. Likewise, the second timeframe associated with particular activities that occurred on the particular enterprise resource may be identified. In operation 212, in response to the request, the identified first timeframe or the second timeframe may be compared with the other of the first timeframe or the second timeframe. For example, when the first timeframe is identified as described above in relation to operation 210, the first timeframe associated with users having privileged access may be compared to timeframes associated with privileged activity occurring at the particular enterprise resource in order to determine, for example, what activities occurred at the particular enterprise resource during a timeframe (e.g., the second timeframe) that coincides with the first timeframe. Likewise, when the second timeframe is identified as described above in relation to operation 210, the second timeframe associated with privileged activity that occurred may be compared to timeframes (e.g., the first timeframe) associated with physical users who had privileged access at the particular enterprise resource in order to determine, for example, who had privileged access to the resource coinciding with the second timeframe. In operation 214, the requested information based on the comparison may be retrieved from the central data repository. Because the first timeframe may be associated with the time during which and/or timeframe for which a physical user was granted privileged access to an enterprise resource and the second timeframe may be associated with the time during which privileged activities occurred, by comparing the two timeframes, the physical user and the privileged activities may be associated with one another. In this manner, tight integration between otherwise disparate systems of access control and activity management may be achieved. As previously noted, existing systems fail to provide this capability because such information was typically managed/stored separately if at all. Implementations of the invention may be made in hardware, firmware, software, or various combinations thereof. The invention may also be implemented as computer-readable instructions stored on a tangible computer-readable storage medium which may be read and executed by one or more processors. A computer-readable storage medium may include various mechanisms for storing information in a form readable by a computing device. For example, a tangible computer-readable storage medium may include optical storage media, flash memory devices, and/or other storage mediums. Further, firmware, software, routines, or instructions may be described in the above disclosure in terms of specific exemplary aspects and implementations of the invention and performing certain actions. However, it will be apparent that such descriptions are merely for convenience, and that such actions may in fact result from computing devices, processors, controllers, or other devices executing firmware, software, routines or instructions. Other embodiments, uses and advantages of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification should be considered exemplary only, and the scope of the invention is accordingly intended to be limited only by the following claims. A system and method is provided for allowing seamless auditing compliance and investigations of privileged account access and activities. Account access information and privileged activity information may be stored in a central data repository. The central data repository may be queried to determine who was granted access to a privileged account, the timeframe that the access was granted, and/or what actions were performed by the user who was granted access. 1. A computer-implemented method for monitoring one or more privileged activities in an enterprise, the method executed by one or more processors configured to perform a plurality of operations, the operations comprising:
receiving, by an access control management sub-system, account access information, wherein the account access information includes at least one physical user identifier identifying a physical user who has been granted privileged access to at least one enterprise resource, and at least one timeframe for which the physical user was granted privileged access; receiving, by a log management sub-system, privileged activity information, wherein the privileged activity information includes one or more privileged activities performed at the at least one enterprise resource; communicating the account access information to the log management sub-system by the access control management sub-system; and storing, by the log management sub-system, the account access information and the privileged activity information in a central data repository, wherein the privileged activities are activities which require an administrative access level, wherein the privileged access is the administrative access level required for the privileged activities, wherein the storing further comprises storing, in the central data repository, at least two records including one or more portions of the account access information, and a third record including the privileged activity information, and wherein a first record of the at least two records comprises one or more of a check-out event time that indicates a time when the physical user was granted privileged access, an identity of the physical user at check-out event time, an enterprise resource identifier to which privileged access is granted at check-out event time, and a privileged account identifier at check-out event time. 2. The computer-implemented method of 3. The computer implemented method of wherein the at least one timeframe for which the physical user was granted privileged access includes at least one check-out event time and at least one check-in event time, wherein the check-out event time indicates a time when the physical user was granted privileged access, and wherein the check-in event time indicates the time when the physical user ended the privileged access. 4. The computer-implemented method of receiving a request for particular information from the central data repository, wherein the request includes one or more of the physical user identifier, a resource identifier identifying the at least one enterprise resource, and the one or more privileged activities; and querying the account access information and the privileged activity information stored in the central data repository to retrieve the particular information based on the request. 5. The computer-implemented method of identifying that the at least one timeframe for which the physical user was granted privileged access that is included in the account access information is associated with the one or more of the physical user identifier, the resource identifier identifying the at least one enterprise resource, and the one or more privileged activities included with the request; identifying that a second timeframe for which the one or more privileged activities were performed that is included in the privileged activity information is associated with the one or more of the physical user identifier, the resource identifier identifying the at least one enterprise resource, and the one or more privileged activities included with the request; in response to the receiving the request, comparing the identified at least one timeframe with the second timeframe; and querying the account access information and the privileged activity information stored in the central data repository to retrieve the particular information based on the comparison. 6. The computer-implemented method of determining, based on the queried account access information, the physical user identifier that identifies the physical user who was granted privileged access to the at least one enterprise resource identified by the resource identifier; and determining, based on the queried privileged activity information, the one or more privileged activities that occurred at the at least one enterprise resource identified by the resource identifier. 7. The computer-implemented method of determining, based on the queried account access information, the at least one enterprise resource for which the physical user identified by the physical user identifier included in the request was granted privileged access; and determining, based on the queried privileged activity information, the one or more privileged activities that occurred at the determined enterprise resource. 8. The computer-implemented method of determining, based on the queried privileged activity information, the at least one enterprise resource where the one or more privileged activities identified by the at least one privileged activity identifier occurred; and determining, based on the queried account access information, the physical user identifier identifying the physical user who was granted privileged access to the determined at least one enterprise resource. 9. A computer-implemented system for monitoring one or more privileged activities in an enterprise, the system comprising:
a log management sub-system; and an access control management sub-system configured to:
receive account access information, wherein the account access information includes at least one physical user identifier identifying a physical user who has been granted privileged access to at least one enterprise resource, and at least one timeframe for which the physical user was granted privileged access; and communicate the account access information to the log management sub-system, wherein the log management sub-system is configured to:
receive the account access information from the access control management sub-system; receive privileged activity information, wherein the privileged activity information includes one or more privileged activities performed at the at least one enterprise resource; and store the account access information and the privileged activity information in a central data repository, wherein the privileged activities are activities which require an administrative access level, wherein the privileged access is the administrative access level required for the privileged activities, wherein the log management sub-system is further configured to store, in the central data repository, at least two records including one or more portions of the account access information, and a third record including the privileged activity information, and wherein a first record of the at least two records comprises one or more of a check-out event time that indicates a time when the physical user was granted privileged access, an identity of the physical user at check-out event time, an enterprise resource identifier to which privileged access is granted at check-out event time, and a privileged account identifier at check-out event time. 10. The computer-implemented system of 11. The computer implemented system of wherein the at least one timeframe for which the physical user was granted privileged access includes at least one check-out event time and at least one check-in event time, wherein the check-out event time indicates a time when the physical user was granted privileged access, and wherein the check-in event time indicates the time when the physical user ended the privileged access. 12. The computer-implemented system of receive a request for particular information from the central data repository, wherein the request includes one or more of the physical user identifier, a resource identifier identifying the at least one enterprise resource, and the one or more privileged activities; and query the account access information and the privileged activity information stored in the central data repository to retrieve the particular information based on the request. 13. The computer-implemented system of identify that the at least one timeframe for which the physical user was granted privileged access that is included in the account access information is associated with the one or more of the physical user identifier, the resource identifier identifying the at least one enterprise resource, and the one or more privileged activities included with the request; identify that a second timeframe for which the one or more privileged activities were performed that is included in the privileged activity information is associated with the one or more of the physical user identifier, the resource identifier identifying the at least one enterprise resource, and the one or more privileged activities included with the request; in response to the receiving the request, compare the identified at least one timeframe with the second timeframe; and query the account access information and the privileged activity information stored in the central data repository to retrieve the particular information based on the comparison. 14. The computer-implemented system of determine, based on the queried account access information, the physical user identifier that identifies the physical user who was granted privileged access to the at least one enterprise resource identified by the resource identifier; and determine, based on the queried privileged activity information, the one or more privileged activities that occurred at the at least one enterprise resource identified by the resource identifier based on the comparison. 15. The computer-implemented system of determine, based on the queried account access information, the at least one enterprise resource for which the physical user identified by the physical user identifier included in the request was granted privileged access; and determine, based on the queried privileged activity information, the one or more privileged activities that occurred at the determined enterprise resource based on the comparison. 16. The computer-implemented system of determine, based on the queried privileged activity information, the at least one enterprise resource where the one or more privileged activities identified by the at least one privileged activity identifier occurred; and determine, based on the queried account access information, the physical user identifier identifying the physical user who was granted privileged access to the determined at least one enterprise resource based on the comparison. CROSS-REFERENCE TO RELATED APPLICATIONS
TECHNICAL FIELD
BACKGROUND
SUMMARY
BRIEF DESCRIPTION OF THE DRAWINGS
DESCRIPTION OF EXEMPLARY IMPLEMENTATIONS


CPC - классификация
GG0G06G06FG06F1G06F11G06F11/G06F11/3G06F11/34G06F11/343G06F11/3438G06F11/347G06F11/3476G06F2G06F21G06F21/G06F21/3G06F21/31G06F21/6G06F21/60G06F21/604G06F22G06F222G06F2221G06F2221/G06F2221/2G06F2221/21IPC - классификация
GG0G06G06FG06F1G06F11G06F11/G06F11/3G06F11/34G06F2G06F21G06F21/G06F21/3G06F21/31G06F21/6G06F21/60HH0H04H04LH04L2H04L29H04L29/H04L29/0H04L29/00Цитирование НПИ
700/9719/313