White paper

Hey, Can I Borrow Your Keys? I'd Like to Trash the Kingdom: Managing Privilege in Unix Based Systems

Few enterprises today operate without some Linux or Unix presence in their data centers. Whether they’re hosting enterprise applications such as Oracle, PeopleSoft and SAP, acting as firewalls and web servers, or performing other tasks, Linux and Unix play a critical role for many businesses. Unfortunately, while the operating system’s decades-old design offers valuable stability and power, it also creates some security and compliance challenges. This paper addresses those challenges and offers real-world solutions to prevent security breaches associated with the "keys to the kingdom".