Was ist das Prinzip der geringsten Privilegien (PoLP)?

01.02.2022
-Minuten Lesezeit

Einleitung

Das Prinzip der geringsten Privilegien (Principle of Least Privilege, PoLP) wird manchmal auch als Prinzip der minimalen Rechte bezeichnet und ist ein gut durchdachter Ansatz für die Zugriffskontrolle in Unternehmen. Benutzer, Systeme und Prozesse sollten ausschließlich auf diejenigen Netzwerke, Daten und sonstigen Ressourcen Zugriff erhalten, die für das Erfüllen der ihnen zugewiesenen Aufgabe erforderlich sind, und nicht mehr. Die Vernachlässigung dieses Prinzips kann massive Datenschutzverletzungen nach sich ziehen, wie z. B. bei jenem Hacker, der Kundendaten von Target stehlen konnte, indem er die Anmeldeinformationen für das Netzwerk eines Drittanbieters für HLK-Anlagen nutzte.

Warum ist das Prinzip der geringsten Privilegien (PoLP) so wichtig?

Das Risiko, allen Benutzern den gleichen Zugang zu sensiblen Daten und Ressourcen zu gewähren, können sich Unternehmen nicht leisten. Das Prinzip der geringsten Privilegien bietet einen Rahmen, der zum Schutz Ihrer Ressourcen vor Kriminellen, ebenso wie vor böswilligen und zu Fehlern neigenden Insidern beiträgt. Abgesehen von den finanziellen Verlusten und der Schädigung Ihrer Marke können Übeltäter Ransomware installieren, den Betrieb stören und gestohlene personenbezogene Daten für Erpressungen oder andere Verbrechen verwenden. Das Beschränken des Zugriffs auf diejenigen Ressourcen, die ein Benutzer tatsächlich benötigt, verringert das Ausmaß des Schadens, den er anrichten kann.

 

Vorteile des Prinzips der geringsten Privilegien:

 

  • Verkleinerung der Angriffsfläche. Wenn der Zugriff jedes einzelnen Benutzers auf die Ressourcen beschränkt wird, die er für seine spezifischen Aufgaben benötigt, werden Cyberkriminelle bei der Übernahme eines Kontos daran gehindert, auch auf alle weiteren Ressourcen zuzugreifen.

     

  • Begrenzung der Verbreitung von Malware. Malware kann die Systeme häufig nur über einen privilegierten Zugang infizieren. Ohne diesen Zugriff wird eine weitgreifende Attacke vereitelt.

     

  • Einhaltung gesetzlicher Bestimmungen. Für manche Bestimmungen führt kein Weg an einer Anwendung des Prinzips der geringsten Privilegien vorbei, wenn Branchenvorschriften eingehalten und Strafen vermieden werden sollen.

     

  • Stärkung der Rechenschaftspflicht. Durch die Einschränkung von Berechtigungen behalten Sie leichter den Überblick über die Benutzer und Systeme, die Zugriff auf sensible Daten, Netzwerke und andere Ressourcen haben.

     

  • Verbesserung der Leistung und des Nutzererlebnisses. Das Ausschließen unnötiger Benutzer von Systemen und Ressourcen erhöht die Produktivität derjenigen Benutzer, die den Zugang benötigen, und verringert die Verwirrung all derer, die ihn nicht benötigen.

Bewährte Praktiken bei der Anwendung des Prinzips der geringsten Privilegien (PoLP)

Das Einrichten der Parameter für die Umsetzung des Prinzips der geringsten Privilegien erfolgt bereits in der Planungsphase und wird während des gesamten Lebenszyklus Ihres Unternehmens fortgesetzt. Eine Überprüfung der derzeitigen Praktiken und Zugangsbedingungen sind dabei ein guter Ausgangspunkt.

 

Einführung eines Zero Trust-Sicherheitsansatzes

Das Sicherheitskonzept des Zero Trust basiert auf der Philosophie, dass Unternehmen niemandem vertrauen und alles überprüfen sollten, da zu jeder Zeit externe und interne Bedrohungen bestehen. Authentifizierung und Autorisierung sind wichtige Schritte bei der Beschränkung des Zugriffs und zum Schutz der Ressourcen. Bei der Authentifizierung müssen die Nutzer ihre Identität nachweisen. Bei der Multi-Faktor-Authentifizierung (MFA) müssen Benutzer zwei oder mehr Authentifizierungsfaktoren angeben, so dass Hacker mit kompromittierten Anmeldedaten davon abgehalten werden, in Ihr System einzubrechen. Nach der Authentifizierung der Benutzer verwenden Unternehmen die Autorisierung, um mithilfe des PoLP den Zugriff auf Ressourcen zu steuern, die den Benutzern rollenbasiert oder individuell zugewiesen werden können.

 

 

 

 

Es gibt Lösungen für das Identitäts- und Access-Management (IAM), mit denen sich Authentifizierungs- und Autorisierungsrichtlinien für Mitarbeiter, Kunden und Partner erstellen lassen.

 

Verwendung von Privileged Access Management (PAM)-Lösungen zur Steigerung der Sicherheit

Privilegierte Konten sind ein bevorzugtes Ziel für Cyberkriminelle, da sie mit Administratorberechtigung einen umfassenderen Zugriff auf Daten, Netzwerke, Systeme und andere Ressourcen und deren Kontrolle erhalten. Lösungen für das Privileged Access Management (PAM) ermöglichen Unternehmen das Überwachen, Absichern und die Kontrolle des Zugriffs auf Ressourcen durch privilegierte Konten. Um diesen Zugriff weiter einzuschränken, können für bestimmte Projekte oder Zeiträume Just-in-Time-Berechtigungen (JIT) festgelegt werden. PAM-Lösungen (Privileged Access Management) werden in Verbindung mit IAM-Lösungen (Identitäts- und Access-Management) eingesetzt, da sich diese gegenseitig unterstützen und ergänzen.

 

Absicherung der Anwendungsprogrammierschnittstelle (API)

Eine Anwendungsprogrammierschnittstelle (API) dient der Kommunikation zwischen Computern oder Anwendungen, wird aber als Schwachstelle der Cybersicherheit leicht übersehen. Es gefährdet die Ressourcen, wenn Unternehmen und Programmierer während der Entwicklung keine Sicherheitsprotokolle zur Verfügung haben. Vier Punkte der Top 10 für API-Sicherheit des Open Web Application Security Projects (OWASP) (darunter die ersten beiden Punkte) beziehen sich direkt auf das Fehlen von Zugriffskontrollregeln und starker Authentifizierung.

Kontinuierliche Audits

Lassen Sie nach der anfänglichen Implementierung nichts mehr durchs Netz schlüpfen. Häufige Überprüfungen von Benutzern, Konten, Prozessen und Systemen sorgen dafür, dass diese nur auf die benötigten Ressourcen zugreifen können. Mitarbeiter wechseln ihren Arbeitsplatz, Drittanbieter und Partner wechseln, Systeme werden aktualisiert oder ersetzt – Durch kontinuierliche Sicherheitsaudits können Sie den Überblick über Privilegien behalten, die widerrufen oder aktualisiert werden müssen.

Beispiele für bewährte Anwendungspraktiken des Prinzips der geringsten Privilegien (PoLP)

Es gibt zahlreiche Beispiele dafür, wie sichergestellt werden kann, dass die Nutzer nur die Ressourcen erhalten, die sie benötigen:

 

  • Ein Mitarbeiter des Vertriebsteams hat Zugriff auf das Customer Relationship Management (CRM)-System, aber nicht auf vertrauliche Personalakten.

     

  • Ein Zeitarbeitnehmer, der für die Dateneingabe eingestellt wird, kann zwar Informationen in bestimmten Dateien ergänzen, aber weder Formeln ändern, noch Dateien herunterladen oder auf andere Dateien zugreifen.

     

  • Ein Kunde hat Zugang zu den Informationen, die er für den Kauf von Produkten und die Pflege seiner Daten benötigt, aber nicht mehr.

 

In diesem Video erfahren Sie, wie das remote Arbeiten der Menschen während der Pandemie die Einführung von Zero Trust-Sicherheit vorangebracht hat.

Hello, everyone.
I'm Rob Otto from Ping Identity.
And I'm here today with Ben Bulpett from SailPoint.
We want to talk about the new normal of working from home.
Hi, Ben, always good to see you again.
>> So good to see you as well.
And obviously a shame that we can't be face to face in these strange times, but great to have a chat with you this morning.
>> Yeah, it does feel like a while since the last time when I saw you or anybody else in person, really, but as you say, here's hoping that.
[LAUGH] >> Yeah.
>> That we might get back to that at some point.
That said, though, Ben, I mean, remote working really is becoming the new normal for a vast majority of organizations.
Here at Ping Identity, we've obviously been speaking to a number of our customers and a number of prospects around this new paradigm, this new model.
And there are certainly challenges that these organizations face.
So I'm sure you've probably heard of some.
>> Yeah, so look, I think the statistic is something like 16% of workers prior to COVID were working from home.
I think currently, the statistics say it stands at 84%.
So the shift of that remote working challenge that organizations have had to do in the, what, three, four months has been quite phenomenal.
Are they gonna be coming back to this traditional office-based environment?
They've demonstrated that they can work from home.
They've demonstrated that they can be proficient and efficient as well.
So I think we're gonna see this working remotely, this adoption of Zoom, which has obviously now become a verb in the English language, something that's gonna be here to stay, I think.
>> This, of course, does tend to reinforce things that we've been talking about for some time.
It puts a lot of strain on some of the more traditional ways in which application access is enabled and, of course, in which applications are secured.
A lot of organizations today work on the assumption that the people who need to access things are in a known location.
They're in the office.
And as a result, you have that, if you like, that safety net of the secure perimeter that organizations can use as a proxy in order to determine who should be allowed to access things.
Obviously, we're both in the identity and access management space.
And this is a message for us that's been a part of our standard discourse for many years now that organizations really need to be focusing on the identity of those individuals.
They need a security policy that starts with a strongly verified and a strongly authenticated identity in order to ensure that the correct users are able to access the correct things, right?
>> The challenge I think organizations face is that the identity and the perimeter that they previously secured is now actually coming down to the individual identities in their organization.
You and I, Rob, have talked about the concept of Zero Trust, and I think Zero Trust has never been more appropriate in what has happened.
You need to now know who has got access to what applications, what they're doing with that access.
Is it appropriate?
And actually then be able to audit that and clearly demonstrate to the auditors and the regulatory bodies that you are in compliance and you do have control of your application and your data.
What we've seen with COVID is a bit of a break glass approach, where we've had companies just sort of give access and they've got people online to be productive.
They now have to go back and put this identity governance and this access control in place to sort of ensure that they have got controls.
Because as people do transition back into this new way of working and say, well, actually, I'm not gonna come back to work.
I'm not gonna spend time on the 6:30 train just to get into London.
I think the whole concept of identity governance and putting in a Zero Trust approach around that is gonna become critical.
And something that I know you and I have spoken about for the last couple of years as a strategy that organizations need to start to adopt.
>> Yeah, absolutely right.
So I think something you've touched on there is really important around productivity.
And obviously, in the identity security space, this tends to be one of the things that we speak to organizations about a lot is: where exactly is that trade-off between employee productivity as opposed to security?
So again, what becomes really important is it starts obviously with understanding who your users are, ensuring that you are able to correctly identify those users.
And secure their access in such a way that respects the principle of Zero Trust, respects things like least privilege access and allows you to enforce defense in depth.
So one of the things that we're seeing as becoming really important is the ability, while still enabling remote access and while doing so in a way that moves towards Zero Trust, but that doesn't make decisions based purely on the user's location.
We do still need to try and find mechanisms to improve their productivity.
Things like not always making them go through a multi-factor authentication challenge for everything that they access.
I'm not sure if you're having similar conversations to those with your customers.
>> Yeah, look, we've had a number of conversations with organizations who are sort of now engaging in a more, what I would define as an executive engagement level conversation around identity governance.
How do you get your data back?
How do you ensure that you minimize that access?
How do you ensure that you control the people who have been accessing your systems are done correctly?
So this whole concept of trust no one, don't trust the network, and don't trust any device, I think is gonna become more critical.
And I would actually say that firstly, organizations need to put a really strong access control and governance process in place.
Get control of the access, get control of the identity, put that Zero Trust in place.
So for us, our conversation is actually do more, get secure, become more paranoid, get control.
Once you've got that and you've got your staff and you've got your policies, then start to let that go.
We're not advocating in any way, shape, or form at the moment that people should let their policies lapse or sort of be lenient with them.
Because I think the challenge is gonna be as the join or move or leave process kicks in and as we probably have more leavers than we do joiners.
>> Ben, look, I think you're absolutely spot on here.
You need to be in control.
You need to be able to show those important things around access governance as you've said.
Making absolutely sure that you know who's coming and making absolutely sure that those people are getting access to the right things.
I think the other thing that's interesting in what you've sort of brought up is that organizations more than ever are going to need to be more agile in the space.
I mean, we've seen, probably for most organizations within the course of two or three weeks, an event that meant they had to completely turn upside down everything that they did in terms of how their workforce is able to do the simplest thing, which is log in the morning and access their applications.
>> I think the reality is this is going to be the new normal.
As I said before, when you had that massive shift in such a short space of time with people working from home and actually trying to be and I think demonstrating productivity.
And you've seen organizations announced by Facebook and Google, this is gonna be the way that they encourage their staff to be.
So I think this is going to be a fundamental industrial shift that we've seen.
But rather than happen over the years that we typically experienced, it took ten years for the iPhone to sort of become really embedded in today's cultural society.
This has happened in three months.
And I think organizations need to adapt their security and access control and governance policies because this is going to be how it is.
And the firewall and that controlled environment around their perimeter, around their offices are fundamentally disappearing.
And they've got to be prepared to be adaptable and agile, but also have all the correct governance, security policies, and access controls in place to give their ability to allow their users and their employees to come in.
But more importantly, to continually demonstrate to the regulator and to the industrial bodies that they're a part of that they have control over who's got access, how they got access, and what they're doing with that.
Those three questions are gonna become board level conversations that auditors and CEOs will be asking CISOs: I need to have answers to that.
Because that is exactly how I'm gonna be asked by the committees, by the shareholders.
Have we got control of that?
And do we actually know who's got access to our systems and what they're doing?
>> It's interesting, though, as you say, this becomes a new way of working.
Many of those office-based roles are transitioning to remote and are probably going to stay remote for some time to come, perhaps forever.
What this really means, though, is that any investment now in a platform or series of platforms that allows strong identity-based governance and access really does become a strategic investment for organizations.
And they're going to reap rewards from those investments in the years to come.
It is obviously really important, though, that the tools that we use and the platforms that we put in place are able to allow us that agility over time.
Our access control systems need to be adaptable, need to be agile enough to recognize their changing behavior.
And to adapt themselves so that the first time I log in from home from an IP address that hasn't been seen before, of course, I should be prompted for a multi-factor authentication step up.
But the tenth time that I do that, if it's happening every day at the same time, the application really needs to be smart enough to adapt to figure out, well, this is now a normal pattern of behavior for Rob.
So we're going to step down that friction, or we're going to increase his productivity by not making him do the fingerprint swipe on his phone every morning.
>> One of the concepts that we've talked about is this role or this capability called dissolving entitlements.
Look, if someone's not accessing a particular application or a particular file share or a particular team shared site, the application and the identity governance platform should start to take away that access.
With the capabilities of machine learning and an AI, we know what their access is.
We know what they have access to.
That can be stored into the identity governance and the access manager platform.
And then when they come back on to log onto that system two, three, four, five weeks later, they can be challenged.
And they can be, say, well, you haven't logged on to this.
We know what entitlements you had.
We know what access you had, but we're now gonna challenge you.
Because actually what we want to do is minimize and mitigate that risk.
Historically, people have logged into their machines when they've walked into the office between 9 to 5:30.
Well, now, people are working longer.
Maybe I'm gonna log in at 7:30 at night.
I've taken the dog for a walk, played with the kids, put them to bed.
And now I wanna log in.
Well, if I do that the first time, I want the system to challenge me.
I wanna be challenged by that because those entitlements that we typically see between 9 to 5 are now coming in at a different time.
I wanna challenge, I just wanna make sure who you are by asking you not only what you know, but also challenge you with something that you have.
And I think that's where the governance and the access tools that you and I talk about through Ping and SailPoint start to come in.
Which actually is we build in AI and machine learning into our platforms.
Have they got the right entitlement rights or do we need to look at the role that they're undertaking?
Is it something that we need to perhaps put a new policy in?
And I think that's where you start to see this autonomous identity, this whole capability of AI and machine learning.
That's gonna be the next evolution of this governance platform, which again, will further support the concept of Zero Trust.
Because the machines and the AI will start to put even more security around it, but actually you start to make decisions that are safe and secure, but again, fully authenticable.
>> Absolutely, the benefits of a strong security approach based on the concepts of identity and access management, of strong identity governance, of strong and adaptive access.
Not only do they allow organizations to cope with an unprecedented, if that comes along, such as the COVID-19 pandemic, which nobody really had much warning at all.
But certainly, they start to enable an organization to be a lot more agile in terms of how and where their workforce is deployed and where they access from.
And essentially, it's an investment in future proofing your business, allowing you to handle these new scenarios that might come up.
Any closing thoughts from yourself, Ben?
>> Yeah, look, I gave an interesting talk once about the free solo climb by Alex Arnold, who did the climb on the El Capitan without any ropes or harnessing.
I thought it was a fascinating insight into any individual, but very, very, applicable to our industry.
Everyone sort of looks at Alex and the way he climbed it and it wasn't that amazing.
But what people didn't realize is that he had a whole team around him.
He practiced that.
He had the best equipment available to him.
He tried, and there was even a story that the night before he climbed the free solo, he climbed up, dried some of the rock, made sure the chalk markings were on the rock for his footings.
But what was the most important thing is that he achieved that through working with the best teams and using the best tools and the best equipment that was available to him.
And what SailPoint and Ping have given and have clearly demonstrated by combining our technologies by taking a joint, combined, integrated approach.
We give people the best tools, the best equipment, the best chance of success at protecting their environment.
And for me, that's gonna be critical.
It's not about one-size-fits-all.
It's about having the best team, the best equipment, and the best integrated solutions that allow organizations to mitigate and protect themselves against this new way of working, this new norm that's gonna probably be here at least for the next 6, 12, 18 months.
And maybe, as I said, maybe we'll never go back to the 6:30 journey on the train with the trains packed.
Maybe people will start to sort of embrace a slightly more work/life balance because we clearly demonstrated that we can be as productive, as capable, and as efficient working from home.
>> Absolutely, thank you so much, Ben.
Again, yeah, really just to reiterate that, organizations can feel they'll be in really safe hands with Ping Identity and SailPoint.
Both organizations with a really long and proud track record of focus in this industry.
Ben, thank you so- >> Thank you, as always, good to see you, and catch up soon for a beer, hopefully.
>> Absolutely, let's hope so.
Do take care.
Thank you, Ben.
>> Cheers, mate, thanks, bye.
>> Bye.
Diesen Artikel teilen:
Verwandte Ressourcen

Starten Sie jetzt

Kontaktieren Sie uns

sales@pingidentity.com

Erfahren Sie, wie Ping Ihnen helfen kann, sichere Erlebnisse für Mitarbeiter, Partner und Kunden in einer sich schnell wandelnden digitalen Welt zu bieten.