When it comes to breaches, there are many areas that attackers focus on to try and gain entry to a company’s data. One that is often overlooked by the security team is privileged accounts.
“While many companies manage their privileged accounts and credentials in the same way they do the rest of their entry points, they neglect to differentiate between Privileged Access Management (PAM) and Privileged User Management (PUM). These terms are often mistakenly used interchangeably, and too many data breaches have resulted from bad actors gaining access to the company’s network through privileged accounts,” says Simon Campbell-Young, MD of Credence Security.
PUM, he explains, involves the management of a system’s existing accounts, such as administrator, root, or other administrative service accounts. These accounts are typically built into the application or systems and cannot be removed, and are often limited in number. PAM enables organisations to provide better management of privileged accounts, particularly in terms of granting access.
“PAM allows users to request specific access to applications or systems, as and when they need to – usually when they can’t do what they need to with their current level of access rights. What makes PAM so valuable is the granularity it offers. Access can be restricted to a specific amount of time, and multiple levels of elevated access — such as basic user, power user, administrative user, and system administrator – can be granted,” Campbell-Young says.
“No user should ever have elevated privileges all the time. By keeping access to a minimum, but still providing a way to elevate access when needed, PAM not only streamlines business processes, but reduces overall security risk.”
In contrast, PUM manages accounts and passwords, but doesn’t require a second authentication factor the same way PAM does, he explains. “With PUM, the access is the same for anyone using the account. With PAM, access is specific to the individual and the task they want to do.”
Campbell-Young adds that many companies implement an Identity and Access Management (IAM) solution and assume they can get the same benefits. However, IAM solutions lack the visibility into who has access to systems and they are doing on them.
“This obviously makes it harder to root out malicious insiders, but even more worrying is that privileged accounts are a good entry point for external threats. Because of the levels of access they provide, privileged accounts make access to an organisation’s systems and data easy for bad actors. If they get in, hackers can use these accounts to lock out legitimate users and create ghost accounts and backdoors,” he says.
“This is why PAM solutions have become essential. On their own, IAM and PUM provide good audit capabilities and make it easier to see and manage who is doing what, but PAM determines who can do what. Getting control over user access, permissions and rights is essential in today’s threat environment, and PAM is the only way to ensure this.”
About Credence Security
Established in 1999, Credence Security, a PAN-EMEA specialty distributor, is a leader in cybersecurity, forensics, governance, risk and compliance. With headquarters in Dubai and regional offices in Ankara, Athens, Cape Town, Istanbul, Johannesburg, London and Nairobi, Credence Security is a pure-play provider of security and forensics solutions, to both public and private sector enterprises across Europe, Middle East, Africa and India, through a select network of specialist resellers.
- Why learning and development matters – An empowered employee shares his thoughts | #Insights | Tebogo Sethabela | 21st Century | #ebizradio - October 28, 2021
- Diversity and inclusion in the workplace promotes creativity and productivity | #LunchtimeSeries | #Marketing | #Insights | Kevin Britz | Craig Page-Lee | #Podcast | #ebizradio - October 28, 2021
- Valuable and Purposefully Giving this Social Development Month | Pay It Forward | The Love Trust | #ebizradio - October 27, 2021
- Is the option to work from home inclusive and diverse? | #Insight | #Business | #HR | Devan Moonsamy | ICHAF | #ebizradio - October 27, 2021
- Sharing more about RETT SYNDROME and how you can help! | #BusinessBrunch | Bjorn Salsone | #PayItForward | Rett-SA | #ebizradio - October 26, 2021
- Equality, diversity and inclusion – starts with YOU | #Insights | #Diversity | Pabi Mogosetsi | Universum Global | #ebizradio - October 26, 2021
- Cyber Security Awareness Month Is a Good Time to Review Your Payroll Provider | #Insights | Sandra Crous | PaySpace | #ebizradio - October 26, 2021
- Motoring News of the Week | Diesel and Dust | Tumelo Maketekete | #Motoring | #ebizradio | #Podcast - October 25, 2021
- Robotics in Retail – What does this mean for you and your business? | #Marketing | Kevin Britz | Craig Page-Lee | #Podcast | #ebizradio - October 22, 2021
- The Youth Unemployment Crisis – What is the impact on individuals and the economy | #Insights | Bryden Morton | Chris Blair | 21st Century | #ebizradio - October 20, 2021