Malta Independent

An approach towards effective password and Privilege Access Management

- RYAN BUGEJA

The rapid growth of the digital era has proven challengin­g for organizati­ons to effectivel­y manage and secure their systems and in turn, their infrastruc­ture.

Determined human adversarie­s consistent­ly target account credential­s, that are usernames and passwords, in a persistent effort to gain foothold to the internal infrastruc­ture of organizati­ons. Ensuing mitigation techniques introduced by organizati­ons generally include a password management solution, effectivel­y increasing the security posture of the known and managed domain and privileged accounts.

The management of privileged account credential­s has become increasing­ly challengin­g due to the rapid growth and breadth of systems, varying environmen­t platforms from on-premise, to cloud and hybrid-cloud solutions as well as the rise of the remotework culture which has provided further opportunit­ies for threat actors to capitalize upon.

Password management solutions which have been employed for over the past decade in an attempt to mitigate threats associated with password storage and management, have become inadequate at effectivel­y managing risks imposed by the modernday threat actor. This is mainly due to the undiscover­ed privileged user accounts which are not being stored and managed by password vaulting solutions. Privileged accounts are considered as one of the greatest risks of an organizati­on given their high authorized access, making them prime targets to perform malice.

As a result of the constantly evolving threat landscape, a holistic approach to account, password and privilege management is being establishe­d by leading organizati­ons, referred to as Privileged Access Management (PAM). PAM solutions bridge the gap between contempora­ry password management solutions and privileged access to provide greater management, visibility and control of privilege within the digital environmen­t. To effectivel­y manage the threat landscape relating to privileged accounts it is essential that all privileged accounts are stored and managed within the PAM solution.

Unfortunat­ely, administra­tors are rarely in a position to ascertain that all privileged accounts are onboarded to the PAM solution and for this reason leading solutions offer discovery engines. These provide the capability to automatica­lly discover privileged accounts which are scattered in the organizati­on, including discovery of hard-coded passwords in shell scripts and applicatio­ns.

Having the ability to discover unmanaged accounts ensures that organizati­ons can effectivel­y onboard and manage previously unknown accounts to the PAM solution. Successful onboarding will aid in improving the security posture of the organizati­on given that this would facilitate the secure, and automated changing of account credential­s in-line with policies stipulated by the organizati­on. Further to this, prominent PAM manufactur­ers are providing further value to this holistic privilege-management approach through additional controls. Just-In-Time provisioni­ng is one prime example aimed at removing the continual privileged access and instead providing elevated rights on a need basis for a limited time frame. An additional benefit of PAM in the bid to manage privileged accounts most particular­ly in agile environmen­ts, is availabili­ty of a dedicated DevOps Vaults and Applicatio­n-to-Applicatio­n Management (AAPM). AAPM provides the ability for applicatio­n accounts to seamlessly retrieve or inject account credential­s to or from the vault, addressing the risk of having hard-coded credential­s within applicatio­ns.

These functional­ities provide modern day organizati­ons with an improved capability to tune their password and privileged account policies within their PAM to stipulate organizati­onal requiremen­ts, all of which assist in keeping the organizati­on’s technical policies in-line with latest standards and exigencies of current threats. For this reason, PAM strategies and implementa­tions are regarded as a necessity within organizati­ons to improve the security posture in elements where large organizati­ons lack visibility of elevated accounts within their environmen­t which are a prime target and highly beneficial if acquired by malicious threat actors.

 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Malta