SlideShare una empresa de Scribd logo
1 de 9
8Must-dos for a Perfect
Privileged Account Management
Strategy
The experts agree: Privileged account management (PAM) is one of the top security
projects for organizations. With that in mind, here's a set of 8 must-dos that every head
of IT should implement to drive a strong PAM program.
Run a fully automated program that regularly
scans your network, detects new accounts, and
adds them to a central vault. To prevent undesired
access, reinforce protection around the vault
with well-known encryption algorithms such as
AES-256.
1. Bring all your privileged accounts under
one roof.
2) Decide who can access what.
Chart well-defined roles with minimum
required access privileges for the members
of your IT team, and ensure that all
activities around the vault are traceable to
authorized employees.
3) Combine something you know with
something you have.
Implement multi-factor authentication for both
PAM administrators and end users to ensure
that the person logging in is who they claim to
be. Knowing a password is no longer enough to
keep sensitive resources secure.
4) Think before you share.
Provide employees or contractors access to
IT assets without disclosing credentials in
plaintext. Allow users to launch one-click
connections to target devices
from your PAM tool's interface, without
viewing or manually entering the
credentials.
5) Start automatically resetting passwords.
Make automatic password resets an integral
part of your PAM strategy. Replace
default, unchanged passwords with strong,
unique passwords that are regularly reset.
6) Foster a need-to-know culture.
Require users to send a request to your
organization's PAM administrator
whenever they need specific account
credentials to access a remote
asset. You can also provision users with
temporary, time-based access to these
credentials, and automatically reset the
credentials once the stipulated time
expires.
7) Let APIs do the talking.
Use secure APIs to allow applications to
query your PAM tool directly and
retrieve privileged account credentials to
communicate with another application or a
remote asset.
8) Make sure everything is audited.
Capture every single user operation and
establish accountability and transparency for all
PAM-related actions. Go a step further and
integrate your PAM tool with an event logging
tool and consolidate PAM activities with other
events from the rest of your
organization to receive intelligent tips about
unusual activities.

Más contenido relacionado

La actualidad más candente

Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
Richard Sullivan
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
Confiz
 

La actualidad más candente (20)

Security testing
Security testingSecurity testing
Security testing
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Secure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior - Trust no input
Secure Code Warrior - Trust no input
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Security Testing Training With Examples
Security Testing Training With ExamplesSecurity Testing Training With Examples
Security Testing Training With Examples
 
Owasp top 10 2017
Owasp top 10 2017Owasp top 10 2017
Owasp top 10 2017
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
Security-testing presentation
Security-testing presentationSecurity-testing presentation
Security-testing presentation
 
Guidelines to protect your APIs from threats
Guidelines to protect your APIs from threatsGuidelines to protect your APIs from threats
Guidelines to protect your APIs from threats
 
Security testing fundamentals
Security testing fundamentalsSecurity testing fundamentals
Security testing fundamentals
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
 
Security testing presentation
Security testing presentationSecurity testing presentation
Security testing presentation
 
Testing Web Application Security
Testing Web Application SecurityTesting Web Application Security
Testing Web Application Security
 
Security testing
Security testingSecurity testing
Security testing
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilities
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
The New OWASP Top Ten: Let's Cut to the Chase
The New OWASP Top Ten: Let's Cut to the ChaseThe New OWASP Top Ten: Let's Cut to the Chase
The New OWASP Top Ten: Let's Cut to the Chase
 

Similar a 8 must dos for a perfect privileged account management strategy

Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
Inprise Group
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relat
LyndonPelletier761
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 

Similar a 8 must dos for a perfect privileged account management strategy (20)

5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise7 IAM Best Practices to Secure Your Enterprise
7 IAM Best Practices to Secure Your Enterprise
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
Implementing Multi-factor Authentication_ A Crucial Step in Cloud Security
Implementing Multi-factor Authentication_ A Crucial Step in Cloud SecurityImplementing Multi-factor Authentication_ A Crucial Step in Cloud Security
Implementing Multi-factor Authentication_ A Crucial Step in Cloud Security
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Discussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relatDiscussion Post an article review (minimum of 200 words) relat
Discussion Post an article review (minimum of 200 words) relat
 
CyberArk
CyberArkCyberArk
CyberArk
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Securing your Machine Learning models
Securing your Machine Learning modelsSecuring your Machine Learning models
Securing your Machine Learning models
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 

Más de ManageEngine

Más de ManageEngine (20)

IT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack toolIT security: PowerShell as a cyberattack tool
IT security: PowerShell as a cyberattack tool
 
There's more than one way to get admin privileges
There's more than one way to get admin privilegesThere's more than one way to get admin privileges
There's more than one way to get admin privileges
 
ManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine's Patch Manager Plus
ManageEngine's Patch Manager Plus
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngine
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk Plus
 
IT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusIT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk Plus
 
IT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusIT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk Plus
 
IT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusIT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk Plus
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Desmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIDesmitificando SNMP Parte-II
Desmitificando SNMP Parte-II
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
 
Desmitificando SNMP
Desmitificando SNMPDesmitificando SNMP
Desmitificando SNMP
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
 
Webinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesWebinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service Catalogues
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
 
VMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual EnvironmentVMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual Environment
 

Último

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Último (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 

8 must dos for a perfect privileged account management strategy

  • 1. 8Must-dos for a Perfect Privileged Account Management Strategy The experts agree: Privileged account management (PAM) is one of the top security projects for organizations. With that in mind, here's a set of 8 must-dos that every head of IT should implement to drive a strong PAM program.
  • 2. Run a fully automated program that regularly scans your network, detects new accounts, and adds them to a central vault. To prevent undesired access, reinforce protection around the vault with well-known encryption algorithms such as AES-256. 1. Bring all your privileged accounts under one roof.
  • 3. 2) Decide who can access what. Chart well-defined roles with minimum required access privileges for the members of your IT team, and ensure that all activities around the vault are traceable to authorized employees.
  • 4. 3) Combine something you know with something you have. Implement multi-factor authentication for both PAM administrators and end users to ensure that the person logging in is who they claim to be. Knowing a password is no longer enough to keep sensitive resources secure.
  • 5. 4) Think before you share. Provide employees or contractors access to IT assets without disclosing credentials in plaintext. Allow users to launch one-click connections to target devices from your PAM tool's interface, without viewing or manually entering the credentials.
  • 6. 5) Start automatically resetting passwords. Make automatic password resets an integral part of your PAM strategy. Replace default, unchanged passwords with strong, unique passwords that are regularly reset.
  • 7. 6) Foster a need-to-know culture. Require users to send a request to your organization's PAM administrator whenever they need specific account credentials to access a remote asset. You can also provision users with temporary, time-based access to these credentials, and automatically reset the credentials once the stipulated time expires.
  • 8. 7) Let APIs do the talking. Use secure APIs to allow applications to query your PAM tool directly and retrieve privileged account credentials to communicate with another application or a remote asset.
  • 9. 8) Make sure everything is audited. Capture every single user operation and establish accountability and transparency for all PAM-related actions. Go a step further and integrate your PAM tool with an event logging tool and consolidate PAM activities with other events from the rest of your organization to receive intelligent tips about unusual activities.