In our last blog, we introduced and expanded our analysis of how organizations keep
So, where do you start your PAM strategy?
A review of policies and associated controls should be at the top of the agenda. Does the strategy meet the expectations from the business and board level and whoever else may be concerned about financial damages and loss of reputation?
At a minimum, policies should address:
You want to clearly identify guidelines and standards that support the access management models rightsized for your organization.
The current state stream of the strategy involves:
Once the current state is completed, the target state model needs to be defined. The differences between the current and target state will serve as inputs to the gap analysis, which will drive the content for the strategic roadmap.
For the definition of the target state, the following should be considered:
The strategy also offers an opportunity to define the advanced state of your privileged access security or privileged access intelligence.
For the roadmap, one of the most crucial exercises is to determine the priority of each use case and the equivalent capabilities. By using set formulas, one can evaluate complexity versus values versus qualitative risks.
Now You’ve Got to Manage it
At this point in the strategy you have defined what you have and what you need to do to ensure your privileged accounts are under control. You now need to make sure that you have solutions in place to support your needs and that you’ve established an effective governance model to manage the program over the long term.
Selecting a PAM: Take the time to create your use cases based on your priorities and perform a bakeoff against selected PAM products. Too often organizations make quick selections which can lead to deception during deployment. Once again, PAM solutions are extremely complex so take your time throughout the process.
PAM Governance: An effective and comprehensive strategy will support the establishment of a solid PMO structure/governance model and will amplify the support from executive management. Organizations that implement an IAM governance structure and model can manage the complexity and reduce or eliminate churn (productivity loss) resulting in economies of scale. As a leading practice, organizations implement a centre of excellence which becomes a core part of the governance structure. An IAM governance model provides a communication vehicle to broadcast strategic messages and reduces the risk of dimensioned support (and budget) in subsequent phases of the program journey by keeping key stakeholders aligned along the way.
Now that the privileged accounts are under control, the next and final instalment of our blog will address the third part of the roadmap and review the advanced capabilities of Privileged Access Management. We will also introduce the term "Privileged Access Intelligence (PAI)" the advanced phase of the privileged accounts strategic roadmap that allows us to watch the watchers.
To continue the conversation about PAM strategies and managing user accounts, feel free to leave a comment below.
To learn more about Online Business Systems’ Risk, Security and Privacy practice click here.
Part Three of this blog is available here.