What is PAM (Privileged access management)

Privileged access management (PAM) is an identity security solution that helps protect organizations against cyber threats by monitoring, detecting, and preventing unauthorized privileged access to critical resources.

  • cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) accounts

  • a central goal is the enforcement of least privilege

  • a PAM best practice is to only use these administrator accounts when absolutely necessary

  • Privileged account passwords are often referred to as “the keys to the IT kingdom,”

types of privileged accounts

  • Local administrative accounts: Non-personal accounts providing administrative access to the local host or instance only.

  • Domain administrative accounts: Privileged administrative access across all workstations and servers within the domain.

  • Break glass (also called emergency or firecall) accounts: Unprivileged users with administrative access to secure systems in the case of an emergency.

  • Service account: Privileged local or domain accounts that are used by an application or service to interact with the operating system.

  • Active Directory or domain service accounts: Enable password changes to accounts, etc.

  • Application accounts: Used by applications to access databases, run batch jobs or scripts, or provide access to other applications.

why need pam

  • Lack of visibility and awareness of of privileged users, accounts, assets, and credentials

  • Over-provisioning of privileges : IT admins traditionally provision end users with broad sets of privileges.

  • Shared accounts and passwords or decentralized credential management

  • or decentralized credential management

  • Lack of visibility into application and service account privileges

best practices

  • Establish and enforce a comprehensive privilege management policy: how accounts are provisioned/de-provisioned

  • Identify and bring under management all privileged accounts and credentials

  • Enforce least privilege over end users, endpoints, accounts, applications, services, systems, etc

    • Remove admin rights on endpoints

    • Remove all root and admin access rights to servers and reduce every user to a standard user

    • Remove unnecessary privileges

    • Eliminate standing privileges (privileges that are “always-on”) wherever possible

      • Privileged access for human users should always expire

    • Limit privileged account membership to as few people as possible

    • Minimize the number of rights for each privileged account

  • Enforce separation of privileges and separation of duties: read, edit, write, execute, etc

  • Segment systems and networks

  • Enforce password security best practices

  • Monitor and audit all privileged activity

  • Implement dynamic, context-based access

    • determine how much and for how long privilege can be provisioned

  • Implement privileged threat/user analytics

Last updated