Article

What is privileged access management (PAM)?

Access ManagementPrivileged Accounts
Time to read: 13 minutes

Privileged access management (PAM) is used to control the use of systems and data to protect resources from threats. Combining people, processes, and technology, privileged access management provides visibility into what privileged users (e.g., IT and security administrators, human resources (HR) professionals, and executives) do while accessing restricted resources. Privileged access management also ensures that users with elevated privileges can access the resources they need while preventing misuse of access rights and blocking unauthorized access.

In addition, privileged access management helps IT teams right-size elevated permissions by enforcing the principle of least privilege. This helps organizations reduce their attack surfaces by minimizing the users, accounts, applications, systems, devices (e.g., Internet of Things, or IoT), and computing processes that can access sensitive resources to the least required level to perform their assigned duties.

What are privileges and how are they created?

In terms of enterprise IT, privilege describes the rights granted to an identity, account, or process within a computing system or network that are above the normal access granted. Privileged access management is used to provide authorized users with elevated access and the ability to perform a number of restricted functions, such as:

  1. Access sensitive data or resources
  2. Configure networks or systems
  3. Load device drivers
  4. Open or close ports
  5. Override, or bypass, certain security restraints
  6. Provision and configure accounts and cloud instances
  7. Shut down or restart systems

In some cases, privileges for various user accounts and processes are embedded into applications, cloud management platforms, databases, file systems, hypervisors, and operating systems. Privileges can also be assigned based on the role of privileged users, such as system and network administrators or finance team members. Lastly, privileges can be assigned based business units (e.g., IT, finance, HR) or other criteria such as seniority, time of day, or geographic location.

It is important to grant privileges to authorized users to perform key operational tasks as part of their jobs; however, privileged access is inherently risky.

Privileged access management helps minimize the possibility of misuse or abuse by insiders or attackers who steal privileged access credentials.

Definition of privileged accounts

A privileged account, also referred to as an administrative account, is a login credential (i.e., username and password) that grants access to a server, firewall, cloud service or storage, or another admin account. Privileged access management is used to administer these accounts to ensure that the users requiring access have the requisite privileges.

In most cases, privileged accounts refer to those used by IT teams and resources that use the access to administer and manage the organization’s systems, infrastructure, and software. Privileged accounts can also be granted to other users to access data or systems. Using privileged access management, privileged accounts can be assigned to different entities, including:

  1. Application owners
  2. Database administrators
  3. Help desk workers
  4. IT administrators
  5. Operating systems
  6. Security teams
  7. Services accounts
  8. Third-party contractors

Privileged access management is used to control what users with elevated access can do. In the case of IT, this usually includes administrative tasks, such as:

  1. Accessing sensitive data and systems (e.g., medical records, credit card details, social security numbers, and government files)
  2. Backing up data
  3. Creating and modifying user accounts
  4. Installing software
  5. Updating security settings and patches

Privileged access management is also used to control infrastructure, services, and system accounts on-premise and in the cloud, such as:

  1. Cloud environments
  2. Databases
  3. Endpoints
  4. Operating systems
  5. SaaS applications
  6. Servers
  7. Service accounts

Special types of privileged accounts, known as superuser accounts, can also be controlled with privileged access management. Superuser accounts are referred to as “Root” in Unix/Linux and “Administrator” in Windows systems.

Specialized IT employees use these superuser accounts to execute commands and make system changes. Privileged access management oversees superuser accounts to monitor and log activity as these accounts have vast privileges that can provide:

  1. The ability to render systemic changes across a network (e.g., creating or installing files or software, modifying files and settings, and deleting users and data)
  2. The power to grant and revoke permissions for other users
  3. Unrestricted access to files, directories, and resources with full read, write, and execute privileges

Privileged access management helps prevent and mitigate the effects of human error (e.g., accidentally deleting an important file or mistyping a powerful command) and malicious insider activity.

Types of privileged accounts

Following are examples of the types of privileged accounts found in organizations and typically managed using privileged access management.

Application administrator accounts

Application administrator accounts have full administrative access to specific applications and the data stored in them. They are used to ensure that applications can access required resources to perform automated and updates, as well as database and networking updates. Application administrator accounts also ensure that configuration changes can be made.

Domain administrator accounts

The highest level of access in a system is given to domain administrator accounts. These accounts can access every workstation and server as well as control system configurations, admin accounts, and group memberships.

Domain service accounts

These are powerful accounts and very complex. Because they are used to connect multiple systems and applications to communicate and provide access to resources (e.g., to access databases, call APIs, and run reports), a change to a domain service account credential breaks connections and can wreak havoc. This makes these credentials susceptible to compromise, since they are rarely, if ever, changed.

Emergency accounts

Sometimes referred to as a “break the glass” account, emergency accounts have privileged access and are meant to be used by unprivileged users when elevated access is needed to restore systems and services in the wake of a critical incident.

Local administrator accounts

A local administrator account has administrative control over specific servers or workstations. This type of privileged access account is commonly created to enable IT to perform maintenance tasks.

Local administrator accounts are powerful; they can be used to create local users and assign user rights and access control permissions, and to take control of local resources by changing the user rights and permissions.

Service accounts

Service accounts are used to facilitate secure interactions between applications and operating systems. The security issue with service accounts is that they can be used in operating systems to execute applications or run programs, but their access is usually either in the context of system accounts (highly privileged accounts without a password) or a specific user account (usually created manually or during software installation). Although service accounts typically are not permitted to log on to systems, they often have passwords that never change, and the accounts do not expire.

Superuser accounts

Superuser accounts are assigned to administrators. This type of account provides users with unrestricted access to the files, directories, and resources they need to do their jobs. Privileged access management oversees their activities, which include installing software, changing configurations and settings, and adding and deleting users and data.

Additional types of privileged accounts

These are just a few of the privileged accounts that organizations should prioritize and secure to reduce the risks of them being compromised and abused. Other types of privileged accounts include:

  1. Accounts used to access security solutions
  2. Firewall accounts
  3. Hardware accounts (e.g., BIOS and vPro)
  4. Network equipment
  5. Root accounts
  6. Wi-Fi accounts

Definition of privileged passwords

Privileged passwords are privileged accounts that give a limited number of users the ability to:

  1. Access critical systems, accounts, and applications (e.g., customer relationship management platforms, operating systems, directory services, social media accounts, IoT devices, and directory services)
  2. Perform restricted functions (e.g., create accounts and allocate access privileges to accounts)
  3. View, edit, or download sensitive information (e.g., customer information, financial data, and intellectual property

Privileged access management helps protect risky privileged passwords, which can be used for potentially devastating lateral movements if compromised.

Privileged passwords associated with human, application, and service accounts are at particular risk. Privileged access management provides monitoring and alerting to ensure that these, as well as human accounts, do not become attack vectors.

Why privileged access management is important

Privileged access management plays a critical role in reducing the risks associated with privileged access accounts. Following are several ways that privileged access management can prevent privileged accounts from being used for malicious activity and how it helps organizations.

Top 5 reasons why privileged access management is important

  1. Equips security teams to identify malicious activities that are the result of privilege abuse.
  2. Ensure that employees have only the necessary levels of access to do their jobs.
  3. Identifies malicious activities linked to privilege abuse.
  4. Provides secure access controls for systems to access and communicate with each other.
  5. Detects anomalous privileged access activities as they occur.

Privileged access management is also important for the following reasons.

Condenses attack surfaces

Privileged access management can protect against internal and external threats by limiting privileges for people, systems, and applications, thereby reducing exploitation opportunities.

Improves visibility

With privileged access management, security teams have a real-time view of users’ access to every application, device, network, and server, including session times. This makes it possible to identify attempts to access unauthorized areas quickly. Privileged access management can also be used to set up alerts when users are not following their typical behavior and flag possible compromised credentials.

Increases productivity

Privileged access management can automate manual tasks, such as password creation and password vaulting. Privileged access management reduces human error, saving teams time on correcting issues, and helps eliminate access issues that arise when users log in from multiple locations and devices.

Integrated access

Privileged access management provides a single dashboard for managing access to enterprise systems, including applications, databases, devices, servers, and workstations. This dashboard can also be used to generate a report that aggregates access data from multiple sources.

Minimizes the impact of a cyber attack

If a data breach does occur or malware gains a foothold, privileged access management helps limit its ability to spread, thereby keeping its reach to a minimum.

Protects against attacks by terminated employees

By making it easy to automatically remove access for terminated employees, privileged access management helps eliminate security gaps that occur when terminated employees retain access to systems.

Satisfies cyber insurance requirements

In response to the scope and cost of ransomware attacks, many cyber insurance policies mandate the use of privileged access management. This is because privileged access management controls have proven effective in reducing risk and neutralizing cyber threats.

Mitigates the weakest security link – humans

Experts agree that humans represent the weakest link in security efforts, especially as related to access. Privileged access management can prevent privileged users from abusing or misusing their level of access.

Privileged access management mitigates the potential risk from privileged users by ensuring they only have the minimum access needed to do their jobs; it also helps identify and link malicious activities to privilege abuse.

Supports compliance programs

Privileged access management can help achieve and verify compliance. It facilitates the implementation and enforcement of the principle of least privilege, which is a compliance requirement for a number of regulations, including the Federal Information Security Management Act (FISMA), the Health Insurance Portability and Accountability Act of 1996 (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), and the Sarbanes-Oxley Act (SOX).

In addition, privileged access management records and logs all activities related to critical IT infrastructure and sensitive information, which provides data needed for compliance audits.

Threat vectors to privileged accounts and passwords

Privileged access management is an effective tool to neutralize threats that exploit privileged accounts and passwords. The most common ones involve lateral movement through networks to find a dormant or orphaned account that can be used escalate privileges.

Agents that utilize threat vectors to access privileged accounts and passwords include the following (some of whom are not acting with ill intent but simply make mistakes that lead to privileged account escalation):

  1. Accidental insiders (i.e., user errors)
  2. Hackers
  3. Malicious insiders
  4. Partners

Privileged access management provides effective defenses against weaknesses in privileged access allocation, including:

  1. Hardcoded and embedded credentials used for applications, systems, network devices, and IoT devices
  2. Lack of awareness of privileged accounts
  3. Over-provisioning of privileges
  4. Poor password management practices
  5. Remote access
  6. Shared admin accounts
  7. Third-party vendor access

Privileged access management best practices

Following is an overview of the most commonly cited privileged access management best practices.

  1. Avoid perpetual privileged access
  2. Create a complete inventory of all privileged accounts and credentials
  3. Determine baselines for privileged user behavioral activity (PUBA) and monitor deviations
  4. Document where and how privileged accounts are used and by whom
  5. Enforce least privilege for all end users, endpoints, accounts, applications, services, and systems, including all on-premises, cloud, and hybrid deployments, eliminating any default and standing privileges
  6. Establish and enforce a comprehensive privilege management policy
  7. Implement strong password security protocols, such as:
  8. Monitor and audit all privileged activity
  9. Provide just-in-time access
  10. Require separation of privileges and separation of duties
  11. Remove default admin rights
  12. Segment systems and networks
  13. Take advantage of privileged access management automation
  14. Use activity-based access control
  15. Use dynamic, context-based access
  16. Use privileged access management to implement and maintain related security policies
  17. Centralizing the security and management of all credentials (e.g., application passwords, privileged account passwords, and SSH keys)
  18. Mandate the use of strong passwords
  19. Update privileged passwords regularly
  20. Ban password sharing

Privileged access management and enhancing security

The use of privileged access is inherently risky. Privileged access management enables organizations to allow users to have elevated access without compromising security or increasing attack surfaces. It enhances security and helps security teams improve productivity and streamline operations.

Take control of your cloud platform.

Learn more about SailPoint Identity Security.

Mark and Sumit

S1 : E2

Identity Matters with Sumit Dhawan, Proofpoint CEO

Join Mark McClain and Sumit Dhawan to understand the future of cybersecurity and how security teams can support CISO customers in the midst of uncertainty.

Play podcast
Mark and Ron

S1 : E1

Identity Matters with Ron Green, cybersecurity fellow at Mastercard

Join Mark McClain and Ron Green to understand the future of cybersecurity and the critical role identity security plays in safeguarding our digital world.

Play podcast
Dynamic Access Roles

Dynamic Access Roles

Build the next generation role and access model with dramatically fewer role and flexibility

View the solution brief