Phone Number +1-202-802-9399 (US)


Secure unix root admin accounts to protect against malware attacks and malicious insiders

WHAT’s the challenge?

Unix privileged accounts such as root admin accounts provide substantial power and access to IT systems, yet often lack the security necessary to protect against malware attacks and malicious insiders.

WHY it’s important

Once a hacker or malicious insider has taken over a Unix root admin account, its powerful features allow unfettered access to IT systems that can remain undetected for several months.

HOW we solve it

Thycotic provides comprehensive Privileged Access Management and Security solutions that secure privileged Unix account passwords and enforce a least privilege strategy on these accounts.

Try Secret Server for 30 Days

  • Free Enterprise level support
  • Choose your preferred deployment option
  • The easiest PAM Solution you’ll ever use
Choose your deployment option:
By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.


Unix privileged accounts lack control, security, and accountability

Privileged Unix accounts are a concern for auditors because of their enormous power and simultaneous lack of access control and accountability. In UNIX and Linux, privilege can be established two ways: by using a root account that is a full-access pass on the network, or by using a limited user account and adding sudo access commands as needed to perform specific privileged tasks. Both of these methods present security and compliance issues around managing who has access across multiple UNIX/Linux systems, and also controlling the use of the root accounts.

Managing Unix user accounts a major challenge

Implementing identity access management on Unix can be difficult because either a federated identity system or a bridge to AD is needed to allow the mapping of AD accounts to Unix identities. Some administrators will attempt to manually manage unlinked user accounts per user across multiple Unix environments, or use a synchronization or provisioning tool to do so. Other teams may use generic shared accounts and then control privileged access to those shared accounts. Either way, the solution needs to be manageable and provide irrefutable accountability for who is using the system and what they are doing.

Unix root accounts require a flexible security tool

Root accounts are the most powerful accounts on a Unix system and without a root management and security tool to bring accountability, organizations face several security and compliance risks.

  1. No safety net. For example, if Linux system administration is performed by an admin that is tired or a little careless, there is nothing preventing them from accidentally deleting a system file.
  2. No accountability. If a disgruntled employee uses the account with ulterior motives, there is no way to tell which employee caused the damage.
  3. Transfer of privilege. If an application is executed using a root account, that application gets the full network privilege of root. Because applications can contain vulnerabilities, this creates a vulnerable point of exploitation.

Ideally, the use of Unix root accounts should be limited and utilities such as sudo are in place to raise privilege while keeping the user accountable. In the case of shared accounts, as well as for certain configuration changes, root access is still required. Access to both sudo and the root password need to be controlled, and only one individual should know a password at any point in time to ensure there is accountability for any actions taken using the account. These accounts should also have their passwords rotated on a regular basis to prevent any brute force attacks aimed at hacking passwords.

Thycotic Secret Server enables IT teams to control and monitor who has access to each privileged credential on the network. Secret Server includes automatic password rotation, password length and complexity enforcement, and full accountability through user audit trails and advanced access and oversight controls. The Unix Protection adds allowing for Unix commands to protect Unix systems from unsafe or unauthorized commands.

Endpoint security for

Enforce least privilege on UNIX/Linux root admin accounts

Unix Protection is Thycotic’s privileged access management software that enhances Secret Server security by enforcing a least privilege strategy. Unix Protection enables administrators to build a Unix command allow that limits what users can do with root admin privileged accounts.

  • Increases security with granular control of root credentials to limit privileges while meeting compliance regulations and policies for Unix Superuser Privilege Management (SUPM).
  • Generates reports on what commands users can run to demonstrate compliance for auditors.

Root accounts are a significant vulnerability since even if admins only need access to a few items they gain complete system access to your ‘keys to the kingdom.’

You gain greater control using SSH command allowing

SSH command allowing allows admins to log in as root, but only gives them access to a set of predefined commands. For example IT administrators might be able to restart the database and read log files, but not reset user passwords.

Thycotic Unix Protection provides an integrated Secret Server security solution that enables you to control and monitor the commands superusers can run based on their role and required tasks.

  • Minimizes the use of privileged rights and enforces least privilege policies for super user rights.
  • Replaces siloed unix sudo commands with an enterprise-ready, scalable security solution with audit capabilities.
  • Restricts commands based on defined policies and limited super user permissions, reducing the risk of misuse, abuse or accidental error.
  • Provides complete management, monitoring, recording and secure single-sign-on for Secret Server privileged accounts.

Key benefits for Secret Server customers

  • Ensure privileged accounts are more secure by enforcing least privilege policies for Unix superuser accounts without impacting their productivity.
  • Minimize the risk of data breaches and insider abuse associated with unauthorized access to, or escalated privileges of, Unix super-user accounts.
  • Demonstrate compliance with security policies and regulations by showing auditors that super-user privileges are effectively managed, monitored, controlled, and secure.
  • Enable Unix administrators to centrally manage and provision Unix accounts that are linked to AD.
  • Save time and money by significantly reducing help desk calls and minimizing Unix admin account management issues.

Keep critical, high-value assets safe with multi-layered privileged account protection.

privileged access management

thycotic secret server

Protect your keys to the kingdom with the most powerful and widely adopted privileged access management security solution for the enterprise.

See how to discover, secure, and manage privileged account passwords painlessly >

Try Secret Server for 30 Days

By completing this form you are opting into emails from Thycotic. You can unsubscribe at any time.

Privileged Account Discovery Tools for UNIX

No cost. No kidding. It’s FREE forever!

How do your Privileged Password
practices compare?

Find out now

FREE Privileged Password
Best Practices Benchmark Survey

Take the Survey