SlideShare a Scribd company logo
1 of 2
Download to read offline
Utility Protects Servers and
Simplifies Compliance with
Access Management
This major South Western Electric & Power Company serves more than 375,000 customers. As
the electric and power provider enters its third century of operations, the company continues to
find innovative ways to provide reliability, service and value to customers and the community.
The Business Challenge
A component of delivering reliable service includes ensuring security over the systems that
manage energy. Several years ago, the utility company’s Energy Management Services
(EMS) group determined that they needed to ensure access controls to the servers that
housed core applications and other sensitive data. The security of these applications and
data were needed to not only reduce the risk of a security breach, but also as part of
achieving FERC and NERC regulatory compliance, specifically around the Cyber Security
Standards (CIP). In particular, the IT team wanted to enforce, down to the individual user
level, exactly who was authorized to access which systems, when, and how, especially for
privileged system users such as system and database administrators. They also needed a
much easier way to consolidate logs of the user access activity for management review and
regulatory audits.
Effective Access Control
Like most IT environments, this utility provider uses a diverse mixture of both UNIX and
Windows servers to run their business. Defining, managing, and enforcing authentication
and authorization rules, automatically, across diverse IT platforms, located across multiple
geographic locations, is a challenge. As well, manually provisioning new user entitlements
to the various servers and removing the entitlements when they leave is time consuming
and error prone.
An equally daunting access management challenge comes via the FERC and NERC
regulations, specifically CIP-003 R5, CIP-005 R2, and CIP-007 R5. The intent of the NERC CIP
Cyber Security Standards is to ensure that all entities responsible for the reliability of the
Bulk Electric Systems in North America identify and protect Critical Cyber Assets that
control or could impact the reliability of the Bulk Electric Systems.
To meet the CIP compliance standards, organizations must be able to prove that they have
the controls in place for authorizing access by individuals to their servers. In particular,
organizations need to focus on managing access to shared accounts (CIP-007, R5.2). Under
CIP, the organization is also required to provide an audit trail of the account usage, and
must review the user activity logs at set intervals during the year.
Manual controls may be utilized in some cases, but it is very labor intensive to effectively
manage and enforce these controls and create meaningful audit reports with the user
activity logs decentralized across the various servers.
CASE STUDY
Copyright © Fox Technologies. FoxT logo is a trademark of Fox Technologies, Inc. Other product and company names noted herein may be the registered
trademarks and trademarks of their respective owners. All rights reserved.
Securing the IT Infrastructure
The electric and power utility company decided to implement the FoxT BoKS ServerControl
solution to centralize the administration, authentication, authorization, and auditing of
their access policies across their UNIX servers.
BoKS ServerControl is implemented to protect servers both in the Corporate and Energy
Management Services business units.
The BoKS provides many benefits to the utility provider including:
• Ability to define and automatically enforce granular authorization and
authentication access rights to improve security over sensitive data;
accounts are defined only on servers where they are needed
• Simplifies overall IT management with consistent user roles, authorization, and
authentication mechanisms across diverse servers
• Reduces the risk of insider fraud with controlled delegation of privileged accounts
including keystroke logging
• Protects data in transit with encryption of network communications
• Simplifies NERC/CIP regulatory compliance. BoKS automatically
consolidates the user activity logs from across the diverse servers and produces a
variety of audit-friendly reports. The consolidated reporting also enables
management to perform the required reviews of access controls and user activities
much faster.
• Reduces the IT administration effort with centralized:
- System administrator provisioning & de-provisioning
- Password management
- SSH management
Summary
Using BoKS ServerControl, the South Western Electric and Power organization is able to
improve the security of the servers that drive their core applications with centralized
administration, authentication, authorization and audit capabilities. The ability to
automatically control access across their diverse server domain not only provides greater
protection of their corporate brand and equity, it also enables the utility provider to meet
the CIP standards within the NERC regulations. With a centralized solution for
administering their granular access control policies, the company is also able to reduce the
effort it takes to both provision users and prepare for internal and regulatory audits,
reducing the overall cost to manage IT systems.
About FoxT
www.foxt.com • sales@foxt.com • 616.438.0840
Fox Technologies, Inc. helps
companies protect corporate
information assets with network
security and access management
software as well as striving to
simplify compliance and stream-
line administration with an
award-winning access manage-
ment and privileged account
control solution. Our access
management software centrally
enforces granular access entitle-
ments in real time across diverse
server environments. To contact
Fox Technologies you can email us
at: sales@foxt.com, or visit our
website: www.foxt.com.

More Related Content

What's hot

FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexera
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network SecurityMithilDoshi1
 
Document Management System SharePoint
Document Management System SharePoint Document Management System SharePoint
Document Management System SharePoint i2econsulting
 
21 CFR Part 11 Compliance
21 CFR Part 11 Compliance21 CFR Part 11 Compliance
21 CFR Part 11 ComplianceAITalent
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CloudIDSummit
 
SharePoint And 21 CFR Part 11 Share Fest
SharePoint And 21 CFR Part 11   Share FestSharePoint And 21 CFR Part 11   Share Fest
SharePoint And 21 CFR Part 11 Share Festpaulkfenton
 
Health Insurance Case Study
Health Insurance Case StudyHealth Insurance Case Study
Health Insurance Case StudyWilliam Estright
 
Viewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCBViewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCBakeophila
 
Phoenix Claims Insurance Software Platform
Phoenix Claims Insurance Software PlatformPhoenix Claims Insurance Software Platform
Phoenix Claims Insurance Software Platformdavidhzsl
 
InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...
InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...
InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...AVEVA
 
How Balabit helps to comply with iso 27001 (infographics)
How Balabit helps to comply with iso 27001  (infographics)How Balabit helps to comply with iso 27001  (infographics)
How Balabit helps to comply with iso 27001 (infographics)Sectricity
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Achieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFAchieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFpaulkfenton
 
Benefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing SoftwareBenefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing SoftwareSteven M Richard
 
Interoperability with HMI Systems Enables Leaner Asset Management
Interoperability with HMI Systems Enables Leaner Asset ManagementInteroperability with HMI Systems Enables Leaner Asset Management
Interoperability with HMI Systems Enables Leaner Asset ManagementeRPortal Software Group
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 

What's hot (20)

FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
 
Client Server Network Security
Client Server Network SecurityClient Server Network Security
Client Server Network Security
 
Co p
Co pCo p
Co p
 
Document Management System SharePoint
Document Management System SharePoint Document Management System SharePoint
Document Management System SharePoint
 
Vmworld 2005-sln241
Vmworld 2005-sln241Vmworld 2005-sln241
Vmworld 2005-sln241
 
21 CFR Part 11 Compliance
21 CFR Part 11 Compliance21 CFR Part 11 Compliance
21 CFR Part 11 Compliance
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
SharePoint And 21 CFR Part 11 Share Fest
SharePoint And 21 CFR Part 11   Share FestSharePoint And 21 CFR Part 11   Share Fest
SharePoint And 21 CFR Part 11 Share Fest
 
Health Insurance Case Study
Health Insurance Case StudyHealth Insurance Case Study
Health Insurance Case Study
 
Viewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCBViewfinity Privilege Management Support for FDCC & USGCB
Viewfinity Privilege Management Support for FDCC & USGCB
 
Phoenix Claims Insurance Software Platform
Phoenix Claims Insurance Software PlatformPhoenix Claims Insurance Software Platform
Phoenix Claims Insurance Software Platform
 
InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...
InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...
InduSoft Web Studio and Meeting FDA 21 CFR Part 11 Regulations for Food, Beve...
 
How Balabit helps to comply with iso 27001 (infographics)
How Balabit helps to comply with iso 27001  (infographics)How Balabit helps to comply with iso 27001  (infographics)
How Balabit helps to comply with iso 27001 (infographics)
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Achieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMFAchieving a 21 CFR Part 11 Compliant eTMF
Achieving a 21 CFR Part 11 Compliant eTMF
 
Benefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing SoftwareBenefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing Software
 
Interoperability with HMI Systems Enables Leaner Asset Management
Interoperability with HMI Systems Enables Leaner Asset ManagementInteroperability with HMI Systems Enables Leaner Asset Management
Interoperability with HMI Systems Enables Leaner Asset Management
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
21 CFR part 11 Overview
21 CFR part 11 Overview21 CFR part 11 Overview
21 CFR part 11 Overview
 
Migration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris WhitepaperMigration and Security in SOA | Torry Harris Whitepaper
Migration and Security in SOA | Torry Harris Whitepaper
 

Viewers also liked

Control graphics using nelson rules by luis daniel
Control graphics using nelson rules by luis danielControl graphics using nelson rules by luis daniel
Control graphics using nelson rules by luis danielDaniel Fg
 
Open data and reuse: Issues and challenges for cultural institutions
Open data and reuse: Issues and challenges for cultural institutionsOpen data and reuse: Issues and challenges for cultural institutions
Open data and reuse: Issues and challenges for cultural institutionsAna Alvarez Lacambra
 
Team Building - Telephone Pictionary
Team Building - Telephone PictionaryTeam Building - Telephone Pictionary
Team Building - Telephone PictionaryAndrew Tarvin
 
Big data & analytics for banking new york lars hamberg
Big data & analytics for banking new york   lars hambergBig data & analytics for banking new york   lars hamberg
Big data & analytics for banking new york lars hambergLars Hamberg
 
Team Building - Line Up
Team Building - Line UpTeam Building - Line Up
Team Building - Line UpAndrew Tarvin
 
那些你知道的,但還沒看過的 Big Data 風景
那些你知道的,但還沒看過的 Big Data 風景那些你知道的,但還沒看過的 Big Data 風景
那些你知道的,但還沒看過的 Big Data 風景Etu Solution
 
Summary of Insights Learned from the Data Science Program Team Training
Summary of Insights Learned from the Data Science Program Team TrainingSummary of Insights Learned from the Data Science Program Team Training
Summary of Insights Learned from the Data Science Program Team TrainingFred Chiang
 
轉兌數據的價值 — 從導購到策購
轉兌數據的價值 — 從導購到策購轉兌數據的價值 — 從導購到策購
轉兌數據的價值 — 從導購到策購Fred Chiang
 
資料價值 — 一位資料產品經理的視野
資料價值 — 一位資料產品經理的視野資料價值 — 一位資料產品經理的視野
資料價值 — 一位資料產品經理的視野Fred Chiang
 
資料科學團隊人才培育分享 ─ 以 DSP 為例
資料科學團隊人才培育分享 ─ 以 DSP 為例資料科學團隊人才培育分享 ─ 以 DSP 為例
資料科學團隊人才培育分享 ─ 以 DSP 為例Fred Chiang
 
12.15.16 Dissertations: Publishing & Copyright Workflow
12.15.16 Dissertations: Publishing & Copyright Workflow12.15.16 Dissertations: Publishing & Copyright Workflow
12.15.16 Dissertations: Publishing & Copyright WorkflowRachael Samberg
 
02.16.17 Licensing Your Research Data for Reuse
02.16.17 Licensing Your Research Data for Reuse02.16.17 Licensing Your Research Data for Reuse
02.16.17 Licensing Your Research Data for ReuseRachael Samberg
 
Digitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher Rahmen
Digitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher RahmenDigitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher Rahmen
Digitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher RahmenEllen Euler
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with HadoopPhilippe Julio
 

Viewers also liked (15)

Nelson rules
Nelson rulesNelson rules
Nelson rules
 
Control graphics using nelson rules by luis daniel
Control graphics using nelson rules by luis danielControl graphics using nelson rules by luis daniel
Control graphics using nelson rules by luis daniel
 
Open data and reuse: Issues and challenges for cultural institutions
Open data and reuse: Issues and challenges for cultural institutionsOpen data and reuse: Issues and challenges for cultural institutions
Open data and reuse: Issues and challenges for cultural institutions
 
Team Building - Telephone Pictionary
Team Building - Telephone PictionaryTeam Building - Telephone Pictionary
Team Building - Telephone Pictionary
 
Big data & analytics for banking new york lars hamberg
Big data & analytics for banking new york   lars hambergBig data & analytics for banking new york   lars hamberg
Big data & analytics for banking new york lars hamberg
 
Team Building - Line Up
Team Building - Line UpTeam Building - Line Up
Team Building - Line Up
 
那些你知道的,但還沒看過的 Big Data 風景
那些你知道的,但還沒看過的 Big Data 風景那些你知道的,但還沒看過的 Big Data 風景
那些你知道的,但還沒看過的 Big Data 風景
 
Summary of Insights Learned from the Data Science Program Team Training
Summary of Insights Learned from the Data Science Program Team TrainingSummary of Insights Learned from the Data Science Program Team Training
Summary of Insights Learned from the Data Science Program Team Training
 
轉兌數據的價值 — 從導購到策購
轉兌數據的價值 — 從導購到策購轉兌數據的價值 — 從導購到策購
轉兌數據的價值 — 從導購到策購
 
資料價值 — 一位資料產品經理的視野
資料價值 — 一位資料產品經理的視野資料價值 — 一位資料產品經理的視野
資料價值 — 一位資料產品經理的視野
 
資料科學團隊人才培育分享 ─ 以 DSP 為例
資料科學團隊人才培育分享 ─ 以 DSP 為例資料科學團隊人才培育分享 ─ 以 DSP 為例
資料科學團隊人才培育分享 ─ 以 DSP 為例
 
12.15.16 Dissertations: Publishing & Copyright Workflow
12.15.16 Dissertations: Publishing & Copyright Workflow12.15.16 Dissertations: Publishing & Copyright Workflow
12.15.16 Dissertations: Publishing & Copyright Workflow
 
02.16.17 Licensing Your Research Data for Reuse
02.16.17 Licensing Your Research Data for Reuse02.16.17 Licensing Your Research Data for Reuse
02.16.17 Licensing Your Research Data for Reuse
 
Digitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher Rahmen
Digitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher RahmenDigitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher Rahmen
Digitalisierungsprojekte in Kulturerbeeinrichtungen & ihr rechtlicher Rahmen
 
Big Data Analytics with Hadoop
Big Data Analytics with HadoopBig Data Analytics with Hadoop
Big Data Analytics with Hadoop
 

Similar to Utility Protects Servers and Simplies Compliance with Access Management

SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Balancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsBalancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsPapitha Velumani
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldEMC
 
APIGATEWAY in Microservices
APIGATEWAY in MicroservicesAPIGATEWAY in Microservices
APIGATEWAY in MicroservicesIRJET Journal
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecturegulimran
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platformabelsonp
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfAgaram Technologies
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxkkhhusshi
 
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesNetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesCoreTrace Corporation
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)Open Source Consulting
 
Final Project.pptx
Final Project.pptxFinal Project.pptx
Final Project.pptxsheinhtet6
 
Delivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkDelivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkBenjamin Eggerstedt
 
RMC: Real-Time Monitoring and Controlling Approach on Networks
RMC: Real-Time Monitoring and Controlling Approach on  NetworksRMC: Real-Time Monitoring and Controlling Approach on  Networks
RMC: Real-Time Monitoring and Controlling Approach on NetworksIOSR Journals
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 

Similar to Utility Protects Servers and Simplies Compliance with Access Management (20)

SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Balancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactionsBalancing performance accuracy and precision for secure cloud transactions
Balancing performance accuracy and precision for secure cloud transactions
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined World
 
APIGATEWAY in Microservices
APIGATEWAY in MicroservicesAPIGATEWAY in Microservices
APIGATEWAY in Microservices
 
Service Oriented Architecture
Service Oriented ArchitectureService Oriented Architecture
Service Oriented Architecture
 
Cybercom Enhanced Security Platform
Cybercom Enhanced Security PlatformCybercom Enhanced Security Platform
Cybercom Enhanced Security Platform
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Data warehouse system
Data warehouse systemData warehouse system
Data warehouse system
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical UtilitiesNetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
NetSpi Whitepaper: Hardening Critical Systems At Electrical Utilities
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
 
Final Project.pptx
Final Project.pptxFinal Project.pptx
Final Project.pptx
 
Delivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent NetworkDelivering Application Analytics for an Application Fluent Network
Delivering Application Analytics for an Application Fluent Network
 
Client server computing
Client server computingClient server computing
Client server computing
 
RMC: Real-Time Monitoring and Controlling Approach on Networks
RMC: Real-Time Monitoring and Controlling Approach on  NetworksRMC: Real-Time Monitoring and Controlling Approach on  Networks
RMC: Real-Time Monitoring and Controlling Approach on Networks
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 

More from Ryan Gallavin

Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare SystemsIntegris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare SystemsRyan Gallavin
 
FoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentFoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentRyan Gallavin
 
BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare Ryan Gallavin
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...Ryan Gallavin
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementRyan Gallavin
 
Sudo is no longer enough
Sudo is no longer enoughSudo is no longer enough
Sudo is no longer enoughRyan Gallavin
 
BoKS ServerControl version 7.0
BoKS ServerControl version 7.0BoKS ServerControl version 7.0
BoKS ServerControl version 7.0Ryan Gallavin
 

More from Ryan Gallavin (7)

Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare SystemsIntegris Health Care: BoKS ServerControl Use Case for Healthcare Systems
Integris Health Care: BoKS ServerControl Use Case for Healthcare Systems
 
FoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications DocumentFoxT BoKS ServerControl Full Specifications Document
FoxT BoKS ServerControl Full Specifications Document
 
BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare BoKS ServerControl Health System Use Case: Integris Healthcare
BoKS ServerControl Health System Use Case: Integris Healthcare
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Sudo is no longer enough
Sudo is no longer enoughSudo is no longer enough
Sudo is no longer enough
 
BoKS ServerControl version 7.0
BoKS ServerControl version 7.0BoKS ServerControl version 7.0
BoKS ServerControl version 7.0
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Utility Protects Servers and Simplies Compliance with Access Management

  • 1. Utility Protects Servers and Simplifies Compliance with Access Management This major South Western Electric & Power Company serves more than 375,000 customers. As the electric and power provider enters its third century of operations, the company continues to find innovative ways to provide reliability, service and value to customers and the community. The Business Challenge A component of delivering reliable service includes ensuring security over the systems that manage energy. Several years ago, the utility company’s Energy Management Services (EMS) group determined that they needed to ensure access controls to the servers that housed core applications and other sensitive data. The security of these applications and data were needed to not only reduce the risk of a security breach, but also as part of achieving FERC and NERC regulatory compliance, specifically around the Cyber Security Standards (CIP). In particular, the IT team wanted to enforce, down to the individual user level, exactly who was authorized to access which systems, when, and how, especially for privileged system users such as system and database administrators. They also needed a much easier way to consolidate logs of the user access activity for management review and regulatory audits. Effective Access Control Like most IT environments, this utility provider uses a diverse mixture of both UNIX and Windows servers to run their business. Defining, managing, and enforcing authentication and authorization rules, automatically, across diverse IT platforms, located across multiple geographic locations, is a challenge. As well, manually provisioning new user entitlements to the various servers and removing the entitlements when they leave is time consuming and error prone. An equally daunting access management challenge comes via the FERC and NERC regulations, specifically CIP-003 R5, CIP-005 R2, and CIP-007 R5. The intent of the NERC CIP Cyber Security Standards is to ensure that all entities responsible for the reliability of the Bulk Electric Systems in North America identify and protect Critical Cyber Assets that control or could impact the reliability of the Bulk Electric Systems. To meet the CIP compliance standards, organizations must be able to prove that they have the controls in place for authorizing access by individuals to their servers. In particular, organizations need to focus on managing access to shared accounts (CIP-007, R5.2). Under CIP, the organization is also required to provide an audit trail of the account usage, and must review the user activity logs at set intervals during the year. Manual controls may be utilized in some cases, but it is very labor intensive to effectively manage and enforce these controls and create meaningful audit reports with the user activity logs decentralized across the various servers. CASE STUDY
  • 2. Copyright © Fox Technologies. FoxT logo is a trademark of Fox Technologies, Inc. Other product and company names noted herein may be the registered trademarks and trademarks of their respective owners. All rights reserved. Securing the IT Infrastructure The electric and power utility company decided to implement the FoxT BoKS ServerControl solution to centralize the administration, authentication, authorization, and auditing of their access policies across their UNIX servers. BoKS ServerControl is implemented to protect servers both in the Corporate and Energy Management Services business units. The BoKS provides many benefits to the utility provider including: • Ability to define and automatically enforce granular authorization and authentication access rights to improve security over sensitive data; accounts are defined only on servers where they are needed • Simplifies overall IT management with consistent user roles, authorization, and authentication mechanisms across diverse servers • Reduces the risk of insider fraud with controlled delegation of privileged accounts including keystroke logging • Protects data in transit with encryption of network communications • Simplifies NERC/CIP regulatory compliance. BoKS automatically consolidates the user activity logs from across the diverse servers and produces a variety of audit-friendly reports. The consolidated reporting also enables management to perform the required reviews of access controls and user activities much faster. • Reduces the IT administration effort with centralized: - System administrator provisioning & de-provisioning - Password management - SSH management Summary Using BoKS ServerControl, the South Western Electric and Power organization is able to improve the security of the servers that drive their core applications with centralized administration, authentication, authorization and audit capabilities. The ability to automatically control access across their diverse server domain not only provides greater protection of their corporate brand and equity, it also enables the utility provider to meet the CIP standards within the NERC regulations. With a centralized solution for administering their granular access control policies, the company is also able to reduce the effort it takes to both provision users and prepare for internal and regulatory audits, reducing the overall cost to manage IT systems. About FoxT www.foxt.com • sales@foxt.com • 616.438.0840 Fox Technologies, Inc. helps companies protect corporate information assets with network security and access management software as well as striving to simplify compliance and stream- line administration with an award-winning access manage- ment and privileged account control solution. Our access management software centrally enforces granular access entitle- ments in real time across diverse server environments. To contact Fox Technologies you can email us at: sales@foxt.com, or visit our website: www.foxt.com.