{"id":222636,"date":"2017-06-23T13:09:36","date_gmt":"2017-06-23T17:09:36","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/privileged-user-management-trips-up-nsa-techtarget.php"},"modified":"2017-06-23T13:09:36","modified_gmt":"2017-06-23T17:09:36","slug":"privileged-user-management-trips-up-nsa-techtarget","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/privileged-user-management-trips-up-nsa-techtarget.php","title":{"rendered":"Privileged user management trips up NSA &#8211; TechTarget"},"content":{"rendered":"<p><p>    A recently declassified report revealed the U.S. National    Security Agency failed to fully secure its systems since the    Edward Snowden leaks in 2013.  <\/p>\n<p>    The report detailed the findings of the Department of Defense    inspector general's 2016 assessment of the NSA's security    efforts around privileged user management. The heavily redacted    report was declassified after Charlie Savage, a Washington    correspondent for The New York Times, filed a        Freedom of Information Act lawsuit. The assessment looked    at how the NSA handles     privileged access management, and, according to the report,    the NSA was found wanting.  <\/p>\n<p>    After     Edward Snowden leaked over a million files in 2013, the NSA    began an initiative, dubbed Secure the Net (STN), with seven    privileged user management goals. The inspector general's    assessment found that the NSA met only four out of the seven    goals: developing and documenting a plan for a new system    administration model; assessing the number of system    administrators across the enterprise; implementing two-factor    access controls over data centers and machine rooms; and        implementing two-factor authentication controls for system    administration.  <\/p>\n<p>    According to the report, dated Aug. 29, 2016, not all of the    four privileged user management initiatives were fully met.    \"[The] NSA did not have guidance concerning key management and    did not consistently secure server racks and other sensitive    equipment in the data centers and machine rooms in accordance    with the initiative requirements and policies, and did not    extend two-stage authentication controls to all high-risk    users,\" the report read.  <\/p>\n<p>    Additionally, the assessment found that three of the seven STN    initiatives for strong privileged user management were not    accomplished. The NSA was supposed to \"fully implement    technology to oversee privileged user activities; effectively    reduce the number of privileged access users; and effectively    reduce the number of authorized data transfer agents.\"  <\/p>\n<p>    There were 40 STN initiatives in total, though the assessment    focused on the seven related to privileged access management.    The conclusion reached in the assessment was, while the NSA was    successful in part, it \"did not fully address all the specifics    of the recommendations.\"  <\/p>\n<p>    Learn     everything you need to know about privileged access    management in the enterprise  <\/p>\n<p>    Find out     how to manage and monitor privileged user accounts  <\/p>\n<p>    Test your privileged user management knowledge     with this quiz  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/searchsecurity.techtarget.com\/news\/450421367\/Privileged-user-management-trips-up-NSA\" title=\"Privileged user management trips up NSA - TechTarget\">Privileged user management trips up NSA - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A recently declassified report revealed the U.S. National Security Agency failed to fully secure its systems since the Edward Snowden leaks in 2013. The report detailed the findings of the Department of Defense inspector general's 2016 assessment of the NSA's security efforts around privileged user management <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/privileged-user-management-trips-up-nsa-techtarget.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-222636","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/222636"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=222636"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/222636\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=222636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=222636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=222636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}