When it comes to breaches, there are many areas that attackers focus on to try and gain entry to a company’s data. One that is often overlooked by the security team is privileged accounts.
“While many companies manage their privileged accounts and credentials in the same way they do the rest of their entry points, they neglect to differentiate between Privileged Access Management (PAM) and Privileged User Management (PUM). These terms are often mistakenly used interchangeably, and too many data breaches have resulted from bad actors gaining access to the company’s network through privileged accounts,” says Simon Campbell-Young, MD of Credence Security.
PUM, he explains, involves the management of a system’s existing accounts, such as administrator, root, or other administrative service accounts. These accounts are typically built into the application or systems and cannot be removed, and are often limited in number. PAM enables organisations to provide better management of privileged accounts, particularly in terms of granting access.
“PAM allows users to request specific access to applications or systems, as and when they need to – usually when they can’t do what they need to with their current level of access rights. What makes PAM so valuable is the granularity it offers. Access can be restricted to a specific amount of time, and multiple levels of elevated access — such as basic user, power user, administrative user, and system administrator – can be granted,” Campbell-Young says.
“No user should ever have elevated privileges all the time. By keeping access to a minimum, but still providing a way to elevate access when needed, PAM not only streamlines business processes, but reduces overall security risk.”
In contrast, PUM manages accounts and passwords, but doesn’t require a second authentication factor the same way PAM does, he explains. “With PUM, the access is the same for anyone using the account. With PAM, access is specific to the individual and the task they want to do.”
Campbell-Young adds that many companies implement an Identity and Access Management (IAM) solution and assume they can get the same benefits. However, IAM solutions lack the visibility into who has access to systems and they are doing on them.
“This obviously makes it harder to root out malicious insiders, but even more worrying is that privileged accounts are a good entry point for external threats. Because of the levels of access they provide, privileged accounts make access to an organisation’s systems and data easy for bad actors. If they get in, hackers can use these accounts to lock out legitimate users and create ghost accounts and backdoors,” he says.
“This is why PAM solutions have become essential. On their own, IAM and PUM provide good audit capabilities and make it easier to see and manage who is doing what, but PAM determines who can do what. Getting control over user access, permissions and rights is essential in today’s threat environment, and PAM is the only way to ensure this.”
About Credence Security
Established in 1999, Credence Security, a PAN-EMEA specialty distributor, is a leader in cybersecurity, forensics, governance, risk and compliance. With headquarters in Dubai and regional offices in Ankara, Athens, Cape Town, Istanbul, Johannesburg, London and Nairobi, Credence Security is a pure-play provider of security and forensics solutions, to both public and private sector enterprises across Europe, Middle East, Africa and India, through a select network of specialist resellers.
- Going Digital against #GBV | MIP partners with TEARS Foundation | Richard Firth | Mara Glennie | #Digital | #ebizradio - October 19, 2021
- Firstwatch announces 2021 initiative to support entrepreneurs | #Entrepreneurs | #PayItForward | #ebizradio - October 19, 2021
- See me, Understand me, Learn with me | #Insight | #Education | The Montessori model enters your home | Madeline Hoban | InHome Montessori - October 19, 2021
- Is your business ready for the new frontier of hybrid working | Business Brunch with Björn | #Entrepreneur | #Technology | Craig Johnson | NSN.CO.ZA - October 19, 2021
- Abundance is not what’s in your wallet | #Insight | #LunchtimeSeries | Kevin Britz | Naomi Basson | #Podcast | #ebizradio - October 18, 2021
- How important is Employer Branding to you and your business? | #Insight | #HR | Pabi Mogosetsi | UNIVERSUM | #Podcast | #ebizradio - October 18, 2021
- Motoring News | Diesel and Dust | Tumelo Maketekete | #Motoring | #ebizradio | #Podcast - October 15, 2021
- How is AI going to affect both Business and the Advertising landscapes? | #Marketing | #LunchtimeSeries | Kevin Britz | Craig Page-Lee | #ebizradio | #Podcast - October 15, 2021
- How do youth actually consume content? | #Entrepreneur | #WordOfMouth | Lindi Tshabangu | Khathutshelo Bapela | #Podcast | #ebizradio - October 14, 2021
- Since SA has have moved to level 1 lock-down, what effect is this having on the markets? | #Insights | #Trading | Zihad Israel | CMTrading | #ebizradio - October 14, 2021