WHITEPAPER Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls Executive Brief Contents Implementing NIST Information Security Standards and Controls ................................................ 2 BeyondTrust Alignment to NIST Controls ....................................................................................... 2 Unified Privileged Access Management to Reduce Risk ................................................................. 5 About BeyondTrust ......................................................................................................................... 6 Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls 1 © March 2017. BeyondTrust Software, Inc. Implementing NIST Information Security Standards and Controls US Government organizations operate highly complex information systems that are targets of extreme value to malicious actors. Keeping these information systems secure is a critical task for agency information technology professionals. Various mandates, like FISMA, have been implemented to achieve a level of cybersecurity consistency across government systems, and to speed the adoption of best practices government wide. To assist agencies in successfully navigating the complex task of securing their environments and achieving compliance with these mandates, NIST has created a system of publications to guide organizations through implementation of these best practices. Organizations first determining the agency security category through FIPS 199. Then, in a customized way, employing appropriate baseline security controls from NIST SP800-53 provides agencies the flexibility to bring into line the implementation of these controls with their organizational missions, business requirements and information systems. By following the guidance in these two publications organizations will be on the path to achieving the mandatory FISMA standards as described in FIPS 200, “Minimum Security Requirements for Federal Information and Information Systems”. NIST notes that the security controls in NIST SP800-53 are technology and policy neutral. This means that the security controls and control enhancements focus on the fundamental safeguards and countermeasures necessary to protect information during processing, while in storage and during transmission1. This approach provides agencies with the ability to select the solutions that best align to their organizational goals and needs. BeyondTrust Alignment to NIST Controls For the purpose of this brief we will explore a high-level overview of nine (9) NIST security control families and how BeyondTrust capabilities support the adoption of the controls directly related to privileged access and vulnerability management. Implementing NIST SP800-53 guidance is designed to be a strategic modular implementation of controls and best practices. The information that follows is organized by control family so that you can easily reference the area of most interest to your organization today, and reference back as you continue to implement other control families. The first control within each control family addresses the establishment of policy associated with the focus area of the control. This policy in turn drives the detailed execution of the other controls in the family. BeyondTrust Privileged Access Management and Vulnerability Management solutions provide several ways to support the controlled implementation of policies, along with best practice and recommendations to control the policies as they are being updated across these control families. Various BeyondTrust solutions address multiple controls associated with privilege access management and vulnerability management across these control families, helping agencies realize the benefits of a multi-tiered security strategy to create information systems that are more resilient in the face of inside and external threats. 1 National Institutes of Technology Special Publication 800-53.r4 April 2013 Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls 2 © March 2017. BeyondTrust Software, Inc. NIST Security Control Families Access Control (AC) BeyondTrust Features and Capabilities • • • • • Audit and Accountability (AU) • • • • Security Assessment and Authorization (CA) • • • • • The BeyondTrust IT Risk Management Platform provides visibility and knowledge through granular host and network based access control across organizational entities. The platform allows strict management of access control within given boundaries. This includes IP range system access and command control. BeyondTrust privileged access management and vulnerability management solutions are designed around the principle of least privilege. They provide the controls required to dictate a user’s access rights, allowable application launches, as well as the rights associated with those applications. In addition, all actions attempted or taken by end-users can be reported for addition analysis and forensics. Patented privilege elevation capabilities grant privileges to applications and tasks – not users – without providing administrator credentials. Apply policies across Windows and Mac endpoints for maximum flexibility. Role Based Access Controls (RBAC) can be implemented by roles based on individual or group membership. Privileged role assignments may be monitored, logged, and revoked when roles change within the organization The BeyondTrust IT Risk Management Platform acts as a security information and event management platform for BeyondTrust Privileged Access Management and Vulnerability Management solutions, providing centralized logging with audit and reporting capabilities. With a fully integrated vulnerability scanner, the platform can also consume data from other scanner tools. It offers an advanced threat analytics feature that analyzes and pinpoints anomalies within the data collected from BeyondTrust solutions as well as third party feeds. These clusters can help identify patterns indicating malicious activity. Once authenticated by the solution, all actions performed by an individual are audited. These audit logs can be reviewed to quickly trace all actions that were performed by that individual during that session or previous sessions. The reporting feature allows for quicker and easier ways to summarize audit data, targeting the most meaningful information quickly and easily based on internal and external filters. BeyondTrust privilege management solutions provide controls allowing or denying a privilege task. Command control is based on a user's role within the organization or through an internal or externalized workflow process. The BeyondTrust IT Risk Management Platform, Retina, PowerBroker for Unix & Linux and PowerBroker for Windows all allow for security compliance checks before privilege commands or events are executed. BeyondTrust privileged access management and vulnerability management solutions provide control and audit across supported platforms and information systems. This provides a detailed audit trail and detailed asset information to assist in the security assessment. These solutions provide a mechanism to perform continuous monitoring based on the organization's defined metrics. In addition, they include a comprehensive audit and reporting console to help organizations determine what controls have been implemented and produce an executive style report to assist in assessing security controls effectiveness. Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls 3 © March 2017. BeyondTrust Software, Inc. Configuration Management (CM) • • • Identification and Authentication (IA) • • • • Incident Response (IR) • • • Risk Assessment (RA) • • • System and Communication Protection Policy and Procedures (SC) • Retina, the BeyondTrust vulnerability management solution, can scan and report against configuration compliance benchmarks. This can help validate changes have been applied to systems. This solution can scan and enumerate attributes about a system (i.e. Software, software version, machine name, and more). The resulting information can be used for tracking and reporting. The PowerBroker PAM platform can be configured to allow/block the execution/installation of applications based on their signature and can block the execution of specifically unauthorized applications. BeyondTrust privileged access management and vulnerability management solutions associate a user with the actions taken by him/her. This user can be uniquely identified and reported on for further analysis and/or forensics. BeyondTrust PowerBroker Password Safe provides varied password policies, taking into consideration complexity, lifetime as well as prohibiting re-use of old passwords. Passwords can also be managed long term with restricted access/use to authorized individuals and services. Password Safe can ensure that the same person, accessing multiple devices is issued separate passwords for each respectively. Through policy, the user can be granted access with or without knowledge of the current credentials. BeyondTrust PowerBroker Identity Services can allow for single sign-on to multiple systems across multiple platforms, reducing the risk and requirement for multiple accounts. BeyondTrust privileged access management and vulnerability management solutions provide detailed session monitoring, including keystroke logging, to record all actions attempted or taken by end-users. This level of detail supports post incident forensics to determine the extent of impact and help identify steps needed to remediate damage. Solutions support systems such as syslog, Simple Network Management Protocol (SNMP) and email alerting when certain events are reported. Event details are included by default when alerts are generated. The BeyondTrust support center helps with the configuration and interpretation of events and alerts generated by BeyondTrust products. The BeyondTrust IT Risk Management Platform includes an enterprise-class network security scanner that incorporates a very broad and deep array of vulnerabilities and target assets definitions. The platform will perform vulnerability and access scans across an environment and help tie risk scores to the various items found. Scans can be performed on a scheduled basis and ad hoc. The IT Risk Management Platform will process all information discovered by the security scanner and will enumerate software, platform, and configurations, and compare the findings against known vulnerabilities and best practices, as well as provide a vulnerability impact report. Role-based access control is utilized when disseminating reporting and analytic information. BeyondTrust privileged access management and vulnerability management solutions support implementation of granular, targeted policies to allow or prohibit information system use and administration. Any allowed or prohibited access can be audited and/or alerted on for further analysis. Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls 4 © March 2017. BeyondTrust Software, Inc. • • System and Information Integrity (SI) • • • • • • These solutions work in-line with security isolation function and auditing, which allows for a layered approach to security. BeyondTrust products can be used independently (modular) or in unison, increasing the auditing and intelligence data from one another. PowerBroker Password Safe provides secure end-to-end session communication between targeted systems utilizing one-time use session IDs to connect targeted systems. This model prevents unauthorized or repetitive use of granted access. The BeyondTrust IT Risk Management Platform collects vulnerability, configuration, and privileged account usage information which can be used during the implementation of the security assessment. The platform can assist with the identification, reporting and remediation of flaws in information systems and assist with the deployment of security patches. It provides many vulnerability trending reports that assist in measuring time between identification and remediation. Advanced threat analytics features analyze and pinpoint anomalies within the data collected from BeyondTrust Privileged Access Management and Vulnerability Management solutions as well as third party feeds. These clusters can help identify patterns indicating malicious activity PowerBroker for Windows, together with The BeyondTrust IT Risk Management Platform, evaluates all recorded application data for the presence of known malicious code. This information is used in real-time, at application launch to deny/quarantine and report on further attempts to execute this software throughout the enterprise BeyondTrust PowerBroker PAM solutions scan, monitor and alert on changes to many attributes of the information system. This can be centrally managed via the solution's central management console, the BeyondTrust IT Risk Management Platform. These solutions can help implement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions. Unified Privileged Access Management to Reduce Risk Controlling and monitoring privileged access is extremely important to mitigating the risks posed by insider threats, preventing data breaches, and meeting compliance requirements. But security and IT leaders have to walk a fine line between protecting the organization’s critical data to ensure business continuity, and enabling users and administrators to be productive. Disparate, disjointed tools deployed and managed in silos leave gaps in coverage over privileged access. This legacy model is expensive, difficult to manage, and requires too much time to show any meaningful risk reduction. PowerBroker delivers the complete spectrum of privileged access management solutions. From establishing and enforcing least privilege on endpoints and servers, to securing enterprise credentials, BeyondTrust unifies best-ofbreed capabilities into a single, integrated platform that acts as a central policy manager and primary reporting interface. Leveraging vulnerability data from BeyondTrust’s Retina and other solutions provides a complete picture of privileged system and asset security – including for network, cloud and virtual assets. This zero-gap coverage reduces risk by ensuring that no assets are left unprotected. This unified approach enables agencies to take advantage of a modular approach, adding products and capabilities as each access control is implemented. Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls 5 © March 2017. BeyondTrust Software, Inc. BeyondTrust Privilege and Vulnerability Management solutions are unified by the BeyondTrust management, reporting and threat analytics platform. About BeyondTrust BeyondTrust® is a global security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We give you the visibility to confidently reduce risks and the control to take proactive, informed action against data breach threats. And because threats can come from anywhere, we built a platform that unifies the most effective technologies for addressing both internal and external risk: Privileged Access Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your organization goes. BeyondTrust's security solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com. Aligning BeyondTrust Solution Capabilities to NIST SP800-53 Controls 6 © March 2017. BeyondTrust Software, Inc.
© Copyright 2026 Paperzz