愛舞吧!.

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 8|回復: 24
打印 上一主題 下一主題

[原創] Interview with the Director of Information Security of PJSC Segezha Group abo...

[複製鏈接]

1

主題

1

帖子

4

積分

新手上路

Rank: 1

經驗值
2
金錢
6
存款
0
警告
0
帖子
1
閱讀權限
10
跳轉到指定樓層
樓主
發表於 2024-11-7 13:53:32 | 只看該作者 回帖獎勵 |倒序瀏覽 |閱讀模式
Forced import substitution in the information technology market poses serious questions for information security services about how to control access rights and user accounts.

How these tasks were solved at PAO Segezha Group using the Indeed AM product was described by Maxim Korolev, Director of Information Security, in an interview on Anti-Malware.

The interview turned out to be very interesting and informative.

For your convenience, we publish part virtual phone number service of the interview below. The full version can be read on Anti-Malware .

How do you think an ideal process for managing access rights and organizational accounts should be structured?
M.K.: Since about 2010, there has been a methodology of "zero trust" - Zero Trust. It implies issuing the minimum necessary rights to access only the information that is needed, and only for the time that is required. In order to implement and support it in a large company, it is necessary to put in a colossal amount of effort. Recently, the automation and digitalization of companies have been going by leaps and bounds, and no one has kept up with them, including information security. Therefore, everyone focused on building a kind of "fence" around. Building internal processes - segmentation, access management, roles, all kinds of checks - is a very labor-intensive matter. As we have already noted, most companies work without implementing these processes, and quite successfully: they do not feel that they have lost any money somewhere, and IT resources are always limited. Therefore, such factors - labor intensity, cost and the lack of obviousness of the result - have led to the fact that these solutions are implemented either in the form of slogans, or not at all.



How do you manage accounts and access rights if you don't have IdM? What is used?
M.K.: I won’t name the products, but it happens in a decentralized manner. In different systems (ERP, BI, system software) we manage accounts and access rights through built-in tools. There are some elements of integration of these systems, but we have not yet achieved centralized role management.

And what about external access control? What are you working with here?
M.K.: We use the Indeed Access Manager product from Indid Company to implement the second authentication factor. All remote users are connected using this product. We are also considering the possibility of using Indeed Privileged Access Manager to verify and control the actions of privileged users — system administrators, which will reduce the risks of internal violations and conduct incident investigations more efficiently.

How long did it take you to implement a multi-factor authentication system and what foreign analogues did you use before?
M.K.: We did not use foreign analogues, but immediately implemented Indeed Access Manager. The implementation took about three months, after which the system entered the stage of industrial operation and works stably.

Why did you choose this particular system?
M.K.: We looked at analogs, cost, compared them, and then decided which system to choose. At that time, there weren’t many options that allowed us to solve the problems we faced.

Among the key requirements that you had for this kind of system, what did you put first, what had to be supported? What was critical for you?
M.K.: The ability to work with the VPNs we use, support for all types of mobile devices used by our employees and contractors; user-friendliness of the interface and reliability of operation were also among the key aspects. Of course, the cost. These are the parameters that determined our choice.

Why was it necessary to support mobile devices? Do you use them as additional authentication factors?
M.K.: Yes, the product is configured to work via push notifications. If we started working via SMS notifications, we would have to install an SMS gateway, pay a subscription fee, and so on. Indid Company has an application for all types of devices, even for exclusive operating systems used, for example, in Honor phones. Accordingly, the user installs the application, configures it in a couple of clicks, and then, when entering our infrastructure via VPN, receives push notifications and confirms that it is him.

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
沙發
發表於 2024-11-7 16:14:20 | 只看該作者
好東西一定要看看!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
板凳
發表於 2024-11-17 15:13:36 | 只看該作者
大家都不容易!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
地板
發表於 2024-11-18 13:13:20 | 只看該作者
論壇有你更精彩!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
5#
發表於 2024-11-20 15:45:33 | 只看該作者
謝謝您的分享!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
6#
發表於 2024-11-20 16:19:45 | 只看該作者
論壇有你更精彩!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
7#
發表於 2024-11-28 09:07:30 | 只看該作者
謝謝您的分享!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
8#
發表於 2024-12-10 11:40:59 | 只看該作者
論壇有你更精彩!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
9#
發表於 2025-1-10 17:33:11 | 只看該作者
謝謝您的分享!

0

主題

0

帖子

12

積分

新手上路

Rank: 1

經驗值
0
金錢
12
存款
0
警告
0
帖子
0
閱讀權限
10
10#
發表於 2025-1-31 17:43:19 | 只看該作者
論壇有你更精彩!
您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

QQ|Archiver|手機版|自動贊助|愛舞吧!.  点击这里给我发消息

GMT+8, 2025-4-22 06:02 , Processed in 0.783395 second(s), 13 queries , File On.

抗攻擊 by GameHost X3.3

© 2001-2017 Comsenz Inc.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |