Approved access to systems has always been a basic security foundation since the dawn of computing technology. Identity and access management (IAM) strategies address the large attack surface, whereas privileged access management (PAM) strategies address the smaller but higher risk attack surface. Privileged credentials allow access to critical information and controls – the ultimate hacker prize. Every cybersecurity professional knows that basic access is good, but privileged access is gold. The vast majority of cyberattacks use compromised privileged credentials to gain access to systems; PAM solutions are a critical layer of defense.
Organizations that attempt to implement a PAM solution often have misconceptions and engage a vendor prematurely, looking at only the technical aspects without understanding the foundations and justifications required to be successful.
There are some fallacies surrounding the implementation and operationalization of PAM that organizations need to better understand as they modernize and secure their infrastructure to reduce risk and improve operational efficiency. These fallacies include:
The average user has always been a vulnerability for an organization’s overall security, but an organization’s privileged accounts are even more of a target because of their heightened level of access to sensitive data. Vulnerabilities surrounding privileged access can be accidentally, or even maliciously exploited. Privileged access management is not only necessary to achieving increased security, but also saves money. Additionally, if an organization has any compliance requirements, PAM can be leveraged to address compliance needs such as SOX, PCI-DSS, etc.
A few things to consider when starting the PAM journey:
Info-Tech’s suggestions for strategic PAM implementation are that organizations should choose a solution that is minimally intrusive and disruptive to users and works with them. Acknowledging this process may take time: start by obtaining the support of admins by letting them know it will make their lives easier through automated process. Next, let stakeholders know the organization’s overall security will improve and the business will save money in the process. Keep the implementation smooth by not overcomplicating the solution.
Many mainstream PAM vendors, like BeyondTrust, Thycotic, and Cyberark, offer robust PAM solutions that address internal, cloud, and hybrid environments.
For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.