How Secure is your sudo? - The Good, the Bad, and the Ugly of Privileged Identity Management (PIM)
Unix/Linux OS users have passionately embraced either implementing open source privileged identity management solutions (i.e., sudo), commercial solutions that are more user friendly, or not implementing anything at all. Though highly disputed, the fact of the matter is that both solution-types do work and both bring high-value depending upon the IT environment that it is managing.
This white paper will illustrate certain positive situations where open source solutions like sudo often work in smaller scale enterprises. However, this white paper will also spotlight red flags that relate to larger companies or companies experiencing significant IT growth. CISOs managing large IT environments, combined with the “many eyes” in the open source community, are consistently discovering that sudo creates security, compliance and productivity challenges to large enterprises seeking to protect critical assets. By stepping back and looking at the good, the bad and the ugly of the sudo solution, enterprises will learn that sudo represents an illusion of control over access to a company’s critical assets.