Password Overload Syndrome – The Latest Disorder Ravaging The IT Industry
I’ve got password overload syndrome! When I went to see my doctor he quietly admitted it had got him too – as he fumbled to access my notes on-screen? The chap at the pharmacist strangely has it too and neither of them even works in IT! It’s all come down to the fact that we all have too many pin numbers and passwords to remember. Have you ever taken the time to count up how many you use in the course of a day? Have you ever sat in-front of your screen and your mind has gone absolutely blank? If you think you’ve got it bad what about the IT administrative guy who has got hundreds to memorize including the ones that give access to the most sensitive parts of the company. He may just resort to sticking them onto a post-it note, or shoving them into a draw or onto an excel spreadsheet or word document. Hmmm – you can hear those hungry hackers licking their lips at the very thought, and all those aggrieved staff thinking yippee this is the way I’ll get back at my boss.
The backbone of every enterprise infrastructure is a massive network of servers, network devices, and security and other infrastructure that creates the complex communications network, or nerve centre, of a company. Every day, systems, network and security administrators are logging onto these critical infrastructure points for routine maintenance, repair and application of the most updated security patches. Many of them are running around with “root” and “administrator” privileges, either with their personal user or with their commonly used accounts. And they’re losing or forgetting them all the time!
Administrators, like most of us, have the best of intentions, but the more those passwords exchange hands or remain unchanged, the greater the likelihood of a security breach. Also because administrative passwords frequently need to be shared, there is increased risk that they are just left lying around somewhere. This results in administrative passwords becoming widely known and changed less frequently. Since administrative privileges are required for emergency and disaster recovery scenarios, only a reliable password management policy can guarantee that the correct passwords will be promptly available in these time-sensitive circumstances.
It’s surprising how many organisations resort to storing passwords simply around the office on spreadsheets and simple databases. A quick penetration test will show just how easy it is to get at these documents. Mismanagement of administrative passwords is a major cause of security breaches and one of the top reasons for long recovery processes from IT failures.
The problem would be easy to fix if large organisations didn’t demand near-instant access for administrators struggling to keep up with crashes and maintenance, or only employed female administrators. But since this is unlikely to change, companies have to look closely at the way passwords are saved, controlled and managed.
The most effective way to reduce the potential hazards of administrators suffering from “password overload syndrome” is to apply an effective policy, which should at the very least include the following components:
- Centralised administration: Often, different IT groups control different pockets of passwords. It’s important to take steps to create a centralised policy, procedures and enforcement mechanism. Otherwise, there is no way to ensure that each business or technical unit is doing its best to protect the keys to the kingdom.
- Secure storage: Administrative passwords should be securely stored in a way that offers strong authentication, granular access control, encryption and auditing to safeguard every password.
- Worldwide secure availability: At the same time, remote access is also critical. With today’s distributed enterprises, administrators need access beyond network boundaries, where they can securely access and share passwords from anywhere within or outside the enterprise network.
- A dual-control mechanism: This would require two or more administrators to access passwords to the most sensitive or vulnerable servers.
- Routinely change passwords and track history: In addition to secure storage, the only way to ensure the long-term security of passwords is to alter them routinely.
- Intuitive auditing: As passwords are used, changed or added, organisations will need to audit the whereabouts and use of passwords without poring over log files. Regulatory compliance measures are also driving routine auditing and tracking of access to vital systems.
- Disaster recovery plan: Administrative accounts play a major role in recovering from incidents that range from a simple problem to a full off-site disaster recovery. Look into technologies for automated, safe replication of vital administrative information that can guarantee the availability of those accounts in time of need.
- Provide a “safe haven” or vault within the network where all administrative passwords can be securely archived, transferred and shared among IT staff, on-call administrators, as well as administrators in the field.
My advice to my doctor and pharmacist is keep smiling – it’s the best therapy! For those IT guys there is a light and hope at the end of the tunnel – “password overload syndrome” can be beaten with new treatment – it comes down to putting the right measures and products in place for the fog to disappear and a clear conscious to emerge, once it does, they’ll find those passwords are safe and secure tucked up where no-one else can get to them apart from the guys who need to.