Privileged Access Management can provide partners with greater security not only for their clients but for their own accounts too
In today’s cyber environment, stolen and misused privileged accounts—and the access they afford to sensitive and critical data and hosts—can be used to inflict tremendous damage.
Implementing a PAM tool reduces the likelihood of privileged credentials being compromised or misused in both external breaches and insider attacks. Such tools also help reduce the impact of an attack when it occurs by radically shortening the time during which the organization is unaware that it is under attack or being subverted. Cloud security, anomaly detection, and securing the software development life-cycle also can be addressed with a PAM tool, as can regulatory compliance and operational efficiency.
PAM solutions need to be aware of not only who a user is, but also to which resources they should be granted privileged access. To enhance security even further, strong PAM solutions tend to have their own layers of security capabilities. That is, they will have the ability to limit user access not only by role, but also by other factors such as time and location, ensuring that even a user who has been authenticated only sees the specific resource to be accessed, and only when appropriate. As a quick example, a given user may be granted privileged access to a server to do an update because they have the role of server admin; but the PAM administrators might also limit that privileged access, for business reasons or simply as a security practice, to a two-hour window starting at midnight, for example. Outside of that time frame, even with the login credentials, the user won’t be able to access the server for good or malicious reasons.
Multifactor Atuthentication (MFA) & Privileged Account Management (PAM)
If a user has successfully authenticated to the system, the PAM system will provide the user the privileged access they have been granted. Of course, that’s entirely appropriate, when the user is who they say they are – but potentially disastrous when a privileged user within the system is not who they claim to be.
Strong PAM solutions have safeguards to protect against this very situation. Session management tools, for example, will alert the security team (or automatically kill the session) when the activity undertaken by a privileged user is outside of defined parameters, such as a purported database administrator who suddenly begins to rapidly execute a large number of queries against multiple databases.
But what of the case where a hacker has stolen a DBA’s credentials, gained entrance to the system, and then undertakes activity which does not raise alarms, such as running an occasional query as the legitimate DBA might do?
This is the kind of situation prevented by MFA and PAM solutions working together to truly provide a layered defense in depth. Where strong PAM solutions excel at providing only the appropriate access to privileged users, a strong MFA capability in front of PAM helps to ensure that users are who they say are before they ever reach the point at which privileges must be determined and granted.
It’s a layered strategy that truly helps security teams and administrators create a defense-in-depth – and in today’s networked environments that are subjected to constant probing and hacking attempts, it’s a solid way to increase a firm’s cybersecurity.
(3) Dark Reading
Picture: <a href=’https://www.freepik.es/fotos/negocios’>Foto de Negocios creado por jannoon028 – www.freepik.es</a>