Are your privileged accounts under control? This seems like a straightforward question
Privileged Accounts Types
Before moving forward, what we are referring to when it comes to privileged and high-risk accounts? The following table provides a definition of the various privileged accounts organized by two categories: interactive and non-interactive.
Account Type |
Definition |
Privileged User Accounts – Non-Interactive |
|
Service |
Accounts used by a service or application to interact with the operating system. For the Windows platform, they come in two flavors: local or domain. |
Application |
Application accounts are also non-interactive in nature as they are used by the applications to run various services such as scripts, jobs, and access databases. Frequently, the password will be hardcoded within the scripts or jobs. |
Privileged User Accounts – Interactive |
|
Shared |
Local administrative accounts used by two or more administrators. Commonly used on several services such as *NIX or Windows servers, mainframes, databases, directories, middleware, SAN, NAS, and network devices. |
Local Administrative |
Privileged accounts interacting with the local host such as *NIX, Windows, or Mainframe servers |
Domain administrative |
Same as local accounts but are given privileges across all servers within a Windows domain. |
Emergency |
Emergency or break-glass accounts are used by non-privileged or non-administrative users to perform an administrative task. |
PAM! PIM! PUM!
As several data breaches focus on accessing privileged accounts, how can you get your privileged accounts under control? Fear not, PAM! PIM! PUM! are coming to the rescue. Basically, these three acronyms all mean the same thing, but different vendors choose to use different terms. From here on, we will use PAM as our term, but for those interested, they are defined as:
PAM – Privileged Access Management
PIM – Privileged Identity Management
PUM – Privileged User Management
Most Fortune 500 companies have some mix of PAM technologies but oftentimes they approach the issues from a more tactical point of view instead of strategically. Therefore, where do you start with such an important domain as privileged access? Let’s run down some of the important capabilities and principles that should become essential priorities:
Taking a Strategic Approach
Most organizations have significant gaps and weaknesses within their privileged accounts realm that provide a plethora of opportunities to potential attack vectors. For example,
To truly get a handle on privileged accounts, organizations need to allow themselves the opportunity to step back and shift their focus from a tactical approach and implement a PAM strategy that supports a prioritized roadmap and program.
Getting privileged access under control should be approached as a journey which starts with a great vision and includes directions to avoid the common pitfalls of failed projects. Without a strategy and a plan, organizations run the risk of responding tactically – they solve one potential problem, without understanding their true requirements, security priorities, and IT goals. This is where a Privilege Access Security strategy comes into the mix.
A Privileged Access Security strategy will span several years and have multiple phases. The strategy document is not a static deliverable, but rather a dynamic document that needs to be reviewed annually or after each phase. Business objectives change and technologies continue to evolve at breakneck speed, continual updates are required to prevent the prioritized roadmap from becoming stale.
The likelihood of a successful identity management strategy implementation improves when managed as a phased-in program. It is no different for PAM and associated security technologies, they should not be approached as a quick fix.
In part two of this blog we will look at where you should start building your PAM strategy and discuss some important points to keep in mind.
To continue the conversation about PAM strategies and managing user accounts, feel free to leave a comment below.
To learn more about Online Business Systems’ Risk, Security and Privacy practice click here.
You can read Part Two and Three of this blog here and here.