| With the rapid development of the information technology, IT not only creates benefits and convenience but also brings great risks for companies. Information security has been paid more and more attention in IT operation lately. However, the management of privileged passwords is considered as one of the most crucial part of the enterprise IT security architecture. Today, many security incidents such as the passwords leakingã€the accounts sharing occur from time to time. It’s also difficult to audit the access and operation log on passwords. All of those will bring great secure risks to corporations. In order to prevent internal and external security threats more effectively, and meet the information security regulations from the government and the industry. It’s necessary to build a privileged accounts automated security management system.On the basis of the in-depth investigation on the domestic and foreign regulations on to the management of privileged passwords, a privileged accounts automated security management system is designed and built for managing all the privileged accounts entirely. This thesis puts forward the system requirements, designs the system architecture and the functional modules. Afterwards, the main functions modules of this system such as the Password Vaultã€Central Password Managementã€Password Vault Web Access are further explained in detail. This privileged accounts management system can enforce the policy of passwords, automatically complete the applicationã€distribution and modification of passwords. One-time pad comes truth. Any administrator will be no longer allowed to operate under the unauthorized condition. At the same time, all the operations of the privileged passwords also are audited in order to promote the internal security management in this system.For security, this thesis designs the technology on information security and the emergency treatment process. Under the technical control and the process management, the privileged passwords security comes truth for the availabilityã€integrity and confidentiality of the systems. |