Skip to the content.

Privileged Access Management

Principle of Least Privilege

The Principle of Least Privilege dictates that users or programs should be granted the minimum access essential to fulfill their functions. Access is restricted to the specific systems and programs required for their designated job or tasks.

PAM

To ensure confidentiality, integrity, and availability of information, the Principle of Least Privilege is employed through Privileged Acces Management. Users receive access only to essential items, limiting exposure.

Use Case

This example emphasizes the importance of PAM in enhancing security by transitioning from static to just-in-time access.

Key Points

The scenario at ABC, Inc., highlights the risks of excessive privileges leading to a ransomware attack and underscores the need for controlled access.

Privileged Accounts

Privileged accounts extend beyond regular user permissions, catering to diverse roles such as systems administrators, IT support, security analysts, and project-specific teams. Delegated authority must align with trustworthiness, as misuse can harm the organization.

Classes of Privileged Users

Delegation Considerations

Risk Mitigation Measures

Trust Verification

Audit Enhancement

Segregation of Duties

Segregation of Duties (SoD)

Segregation of duties (SoD) ensures that no single person has control over an entire high-risk transaction. It divides transactions into parts, necessitating different individuals for each segment to prevent fraud and errors.

Two-Person Integrity

The two-person rule mandates at least two individuals to be present simultaneously in an area, ensuring increased security, reducing insider threats, and providing assistance during emergencies.

Separation of duties ensures that sensitive administrative tasks are split among multiple individuals to minimize the risk of misuse or fraud.

Authorized Versus Unauthorized Personnel

Authorization Process Overview:

Authentication ensures the subject’s legitimacy, and authorization determines their allowed actions. This is typically governed by a security matrix indicating pre-approved access levels.

How Users Are Provisioned

User Account Provisioning and Changes:

Provisioning new user accounts or altering privileges is essential in various scenarios:

Note:


Back to main page