Root Access Risk Control for the Enterprise
Commodity controls such as sudo are often used to limit root-level access to specific actions on the basis of an individual user's identity -- but when it comes to enterprise requirements for security or compliance, sudo is often incomplete.
By
Tuesday, October 19th, 2010
Without putting more effective controls on high-privilege access such as Unix or Linux root account, enterprises not only expose the most business-critical IT assets to the most fundamental level of risk, they also expose trustworthy administrators to the consequences of privilege abuse by others. Commodity tools such as sudo often have gaps in the level of control, scalability and support the enterprise realistically needs.