What are the various access management services that can be used to manage security of the information?

Some of the top privilege-related risks and challenges include:

Lack of visibility and awareness of of privileged users, accounts, assets, and credentials

Long-forgotten privileged accounts are commonly sprawled across organizations. These orphaned accounts may number in the millions, and provide dangerous backdoors for attackers, including, former employees who have left the company but retain access.

Over-provisioning of privileges

If privileged access controls are overly restrictive, they can disrupt user workflows, causing frustration and hindering productivity. Since end users rarely complain about possessing too many privileges, IT admins traditionally provision end users with broad sets of privileges. Additionally, an employee’s role is often fluid and can evolve such that they accumulate new responsibilities and corresponding privileges—while still retaining privileges that they no longer use or require.

All of this privilege excess adds up to a bloated attack surface. Routine computing for employees on personal PC users might entail internet browsing, watching streaming video, use of MS Office and other basic applications, including SaaS (e.g., Salesforce.com, GoogleDocs, Slack, etc.). In the case of Windows PCs, users often log in with administrative account privileges—far broader than what is needed. These excessive privileges massively increase the risk that malware or hackers may steal passwords or install malicious code that could be delivered via web surfing or email attachments. The malware or hacker could then leverage the entire set of privileges of the account, accessing data of the infected computer, and even launching an attack against other networked computers or servers.

Shared accounts and passwords

IT teams commonly share root, Windows Administrator, and many other privileged credentials for convenience so workloads and duties can be seamlessly shared as needed. However, with multiple people sharing an account password, it may be impossible to tie actions performed with an account to a single individual. This creates security, auditability, and compliance issues.

Hard-coded / embedded credentials

Privileged credentials are needed to needed facilitate authentication for app-to-app (A2A) and application-to-database (A2D) communications and access. Applications, systems, network devices, and IoT devices may be shipped and o deployed with embedded, default credentials that are easily guessable and pose substantial risk. Additionally, employees will often hardcode secrets in plain text—such as within a script, code, or a file, so it is easily accessible when they need it.

Manual and/or decentralized credential management

vPrivilege security controls are often immature. Privileged accounts and credentials may be managed differently across various organizational silos, leading to inconsistent enforcement of best practices. Human privilege management processes cannot possibly scale in most IT environments where thousands—or even millions—of privileged accounts, credentials, and assets can exist. With so many systems and accounts to manage, humans invariably take shortcuts, such as re-using credentials across multiple accounts and assets. One compromised account can therefore jeopardize the security of other accounts sharing the same credentials.

Lack of visibility into application and service account privileges

Applications and service accounts often automatically execute privileged processes to perform actions, as well as to communicate with other applications, services, resources, etc. Applications and service accounts frequently possess excessive privileged access rights by default, and also suffer from other serious security deficiencies.

Siloed identity management tools and processes

Modern IT environments typically run across multiple platforms (e.g., Windows, Mac, Unix, Linux) and environments (on-premises, Azure, AWS, Google Cloud)—each separately maintained and managed. This practice equates to inconsistent administration for IT, added complexity for end users, and increased cyber risk.

Digital transformation is massively expanding the privileged attack surface. Here are just a few key ways:

​Cloud and virtualization administrator consoles & environments

AWS, MIcrosoft 365, etc. provide nearly boundless superuser capabilities, enabling users to rapidly provision, configure, and delete servers at massive scale. Within these consoles, users can effortlessly spin-up and manage thousands of virtual machines (each with its own set of privileges and privileged accounts). Organizations need the right privileged security controls in place to onboard and manage all of these newly created privileged accounts and credentials at massive scale.

DevOps environments

The DevOps emphasis on speed, cloud deployments, and automation presents many privilege management challenges and risks. Organizations often lack visibility into privileges and other risks posed by containers and other new tools. Inadequate secrets management, embedded passwords, and excessive privilege provisioning are just a few privilege risks rampant across typical DevOps deployments.

Edge Computing & IoT devices

Edge networks are expanding to serve data faster where it is needed. The access to and from these devices--as well as the devices themselves (often IoT) must all be secured. And despite the pervasiveness of IoT, IT teams still struggle to discover and securely onboard legitimate devices at scale. Compounding this issue, IoT devices commonly have severe security drawbacks, such as hardcoded, default passwords and the inability to harden software or update firmware. Moreover, they may not have enough processing capability on which to run antivirus (AV) software. PAM has a pivotal role to play in IoT & edge security.

Hackers, malware, partners, insiders gone rogue, and simple user errors—especially in the case of superuser accounts—comprise the most common privileged threat vectors.

External hackers covet privileged accounts and credentials, knowing that, once obtained, they provide a fast track to an organization’s most critical systems and sensitive data. With privileged credentials in hand, a hacker essentially becomes an “insider”—and that’s a dangerous scenario, as they can easily erase their tracks to avoid detection while they traverse the compromised IT environment.

Hackers often gain an initial foothold through a low-level exploit, such as through a phishing attack on a standard user account, and then achieve lateral movement through the network until they find a dormant or orphaned account that allows them to escalate their privileges.

Unlike external hackers, insiders already start within the perimeter, while also benefitting from know-how of where sensitive assets and data lie and how to zero in on them. Insider threats take the longest to uncover—as employees, and other insiders, generally benefit from some level of trust by default, which may help them avoid detection. The protracted time-to-discovery also translates into higher potential for damage. Many of the most catastrophic breaches in recent years have been perpetrated by insiders.

The more privileges and access a user, account, or process amasses, the greater the potential for abuse, exploit, or error. Implementing privilege management not only minimizes the potential for a security breach occurring, it also helps limit the scope of a breach should one occur. Implementing PAM best practices (removing admin rights, enforcing least privilege, eliminating default/embedded credentials, etc.) are also an important piece of enterprise IT systems hardening.

One differentiator between PAM and other types of security technologies is that PAM can dismantle multiple points of the cyberattack chain, providing protection against both external attack as well as attacks that make it within networks and systems.

PAM confers several chief benefits, including:

  • A condensed attack surface that protects against both internal and external threats: Limiting privileges for people, processes, and applications means the pathways and entrances for exploit are also diminished.

  • Reduced malware infection and propagation: Many varieties of malware (such as SQL injections, which rely on lack of least privilege) need elevated privileges to install or execute. Removing excessive privileges, such as through least privilege enforcement across the enterprise, can prevent malware from gaining a foothold, or reduce its spread if it does.

  • Enhanced operational performance: Restricting privileges to the minimal range of processes to perform an authorized activity reduces the chance of incompatibility issues between applications or systems, and helps reduce the risk of downtime.

  • Easier to achieve and prove compliance: By curbing the privileged activities that can possibly be performed, privileged access management helps create a less complex, and thus, a more audit-friendly, environment.

  • Help satisfy cyber insurance requirements: In recent years, ransomware attacks and ransom payouts have hurt the bottom lines, and threatened the viability, of the cyber insurance industry. Cyber insurers appreciate that PAM controls reduce risk and stop threats, and thus, are powerful tool in reducing cyber liability. Today, many cyber insurers mandate PAM controls to renew or obtain new cyber liability coverage. Cyber insurance requirement checklists that are part of, or precede the insurance application process, commonly call out a number of specific controls, such as “Has a PAM system to manage privileged access and accounts."

Additionally, many compliance regulations (including HIPAA, PCI DSS, FDDC, Government Connect, FISMA, and SOX) require that organizations apply least privilege access policies to ensure proper data stewardship and systems security. For instance, the US federal government’s FDCC mandate states that federal employees must log in to PCs with standard user privileges. Multiple NIST frameworks, including those for implementing zero trust principles (zero trust architectures and zero trust network access), also emphasize the need for PAM.

The more mature and holistic your privilege security policies and enforcement, the better you will be able to prevent and react to insider and external threats, while also meeting compliance mandates.

Here is an overview of the most important PAM best practices:

1. Establish and enforce a comprehensive privilege management policy: The policy should govern how privileged access and accounts are provisioned/de-provisioned; address the inventory and classification of privileged identities and accounts; and enforce best practices for security and management.

2. Identify and bring under management all privileged accounts and credentials: Privileged account discovery should include all user and local accounts; application and service accounts database accounts; cloud and social media accounts; SSH keys; default and hard-coded passwords; and other privileged credentials – including those used by third parties/vendors. Discovery should also include platforms (e.g., Windows, Unix, Linux, Cloud, on-prem, etc.), directories, hardware devices, applications, services / daemons, firewalls, routers, etc.

The privilege discovery process should illuminate where and how privileged passwords are being used, and help reveal security blind spots and malpractice, such as:

3. Enforce least privilege over end users, endpoints, accounts, applications, services, systems, etc.: A key piece of a successful least privilege implementation involves wholesale elimination of privileges everywhere they exist across your environment. Then, apply rules-based technology to elevate privileges as needed to perform specific actions, revoking privileges upon completion of the privileged activity. Ensuring true least privilege is not just about enforcing constraints on the breadth of access, but also on the duration of access. In IT security terms, this means implementing controls that provide just enough access (JEA) and just-in-time (JIT) access.

Broken down to the tactical level, least privilege enforcement should encompass the following:

  • Remove admin rights on endpoints. Instead of provisioning default privileges, default all users to standard privileges while enabling elevated privileges for applications and to perform specific tasks. If access is not initially provided but required, the user can submit a help desk request for approval. For most Windows and Mac users, there is no reason for them to have admin access on their local machine. Also, when it comes down to it, organizations need to be able to exert control over privileged access for any endpoint with an IP—traditional, mobile, network device, IoT, SCADA, etc. From 2015 -2020, 75% of Critical Microsoft vulnerabilities could have been mitigated by removing admin rights (Source: Microsoft Vulnerabilities Report 2022).

  • Remove all root and admin access rights to servers and reduce every user to a standard user. This will dramatically reduce the attack surface and help safeguard your Tier-1 systems and other critical assets. Standard, “non-privileged” Unix and Linux accounts lack access to sudo, but still retain minimal default privileges, allowing for basic customizations and software installations. A common practice for standard accounts in Unix/Linux is to leverage the sudo command, which enables the user to temporarily elevate privileges to root-level, but without having direct access to the root account and password. However, while using sudo is better than providing direct root access, sudo poses many limitations with regards to auditability, ease of management, and scalability. Therefore, organizations are better served by employing server privilege management technologies to supplement or replace sudo. These PAM technologies allow granular privilege elevation and elevate privileges on an as-needed basis, while providing clear auditing and monitoring capabilities.

  • Remove unnecessary privileges. Apply least privilege access rules through application control, as well as other strategies and technologies to remove unnecessary privileges from applications, processes, IoT, tools (DevOps, etc.), and other assets. Enforce restrictions on software installation, usage, and OS configuration changes. Also limit the commands that can be typed on highly sensitive/critical systems.

  • Eliminate standing privileges (privileges that are “always-on”) wherever possible. Privileged access for human users should always expire. While zero stand privileges (ZSP)—the removal of all standing privileges—is the ideal end state for human user accounts, many machine/application counts will continue to need persistent privileges to maintain uptime goals. Implement just-in-time privilege management (also called privilege bracketing) to elevate privileges on an as-needed basis for specific applications and tasks only for the moment of time they are needed.

  • Limit privileged account membership to as few people as possible: This simple rule radically reduces the overall enterprise attack surface.

  • Minimize the number of rights for each privileged account: With this rule intact, any compromised account will yield a threat actor with only a limited set of privileges, and help limit the scope of a security breach.

4. Enforce separation of privileges and separation of duties: Privilege separation measures include separating administrative account functions from standard account requirements, separating auditing/logging capabilities within the administrative accounts, and separating system functions (e.g., read, edit, write, execute, etc.).

When least privilege and separation of privilege are in place, you can enforce separation of duties. Each privileged account should have privileges finely tuned to perform only a distinct set of tasks, with little overlap between various accounts.

With these security controls enforced, although an IT worker may have access to a standard user account and several admin accounts, they should be restricted to using the standard account for all routine computing, and only have access to various admin accounts to accomplish authorized tasks that can only be performed with the elevated privileges of those accounts.

5. Segment systems and networks to broadly separate users and processes based on different levels of trust, needs, and privilege sets. Systems and networks requiring higher trust levels should implement more robust security controls. The more segmentation of networks and systems, the easier it is to contain any potential breach from spreading beyond its own segment. Also implement microsegmentation, a key zero trust strategy, to isolate resources by creating zones. Microsegmentation further restricts line-of-sight visibility and access to applications, protecting against lateral movement.

6. Enforce password security best practices:

  • Centralize security and management of all credentials (e.g., privileged account passwords, SSH keys, application passwords, etc.) in a tamper-proof safe. Implement a workflow whereby privileged credentials can only be checked out until an authorized activity is completed, after which time the password is checked back in and privileged access is revoked.

  • Ensure robust passwords that can resist common attack types (e.g., brute force, dictionary-based, etc.) by enforcing strong password generation parameters, such as password complexity, uniqueness, etc.

  • Routinely rotate (change) privileged passwords, decreasing the intervals of change in proportion to the password’s sensitivity. A top priority should be identifying and quickly changing any default credentials, as these present an out-sized risk. For the most sensitive privileged access and accounts, implement one-time passwords (OTPs), which immediately expire after a single use. While frequent password rotation helps prevent many types of password re-use attacks, OTP passwords can eliminate this threat. In the case of DevOps workflows, implement dynamic secrets, at type of ephemeral/OTP generated as needed to a single client.

  • Eliminate password sharing—each account should have a unique login to ensure a clear oversight and a clean audit trail.

  • Never reveal passwords—implement single sign-on (SSO) authentication to cloak passwords from both users and processes. Password managers can auto-inject passwords as needed.

  • Remove embedded/hard-coded credentials and bring under centralized credential management. This typically requires a third-party solution for separating the password from the code and replacing it with an API that enables the credential to be retrieved from a centralized password safe.

7. Lock down infrastructure: Extend PAM principles to implement robust infrastructure access management. Access to infrastructure—whether for on-premise, cloud, or OT environments—should be proxied via VPN-less PAM technologies. This can entail implementing a privileged access workstation (PAW), which are hardened, dedicated assets use to secure all admin access. The principle of least privilege should also be applied to ensure that the range of activities and infrastructure access for any one PAW is limited.

8. Monitor and audit all privileged activity: This can be accomplished through user IDs as well as auditing and other tools. Implement privileged session management and monitoring (PSM) to detect suspicious activities and efficiently investigate risky privileged sessions in a timely manner. Privileged session management involves monitoring, recording, and controlling privileged sessions. Auditing activities should include capturing keystrokes and screens (allowing for live view and playback). PSM should cover the instances during which elevated privileges/privileged access is granted to an account, service, or process.

Privileged session monitoring and management capabilities are also essential for compliance. SOX, HIPAA, GLBA, PCI DSS, FDCC, FISMA, and other regulations require organizations to not only secure and protect data, but also be capable of proving the effectiveness of those measures.

9. Implement dynamic, context-based access: This is a key zero trust principle and entails delivering just-enough access, just-in-time—in the proper context. This is accomplished by evaluating multiple inputs (real-time vulnerability/threat data for a target asset, geolocation and temporal data, user data, etc.) to determine how much and for how long privilege can be provisioned. Apply real-time vulnerability and threat data about a user or an asset to enable dynamic risk-based access decisions. For instance, this capability can allow you to automatically restrict privileges and prevent unsafe operations when a known threat or potential compromise exists for the user, asset, or system.

10. Secure privileged task automation (PTA) workflows: Privileged task automation involves entails automating tasks and workflows—such as robotic process automation (RPA)—that leverage privileged credentials and elevated access. These complicated workflows are increasingly embedded within modern IT environments and require many moving—and sometimes ephemeral—parts that all needed to be onboarded and seamlessly managed for privileged access.

11. Implement privileged threat/user analytics: Establish baselines for privileged user behavioral activity (PUBA) and privileged access. Monitor and alert to any deviations from the baseline that meet a defined risk threshold. Also incorporate other risk data for a more three-dimensional view of privilege risks. Accumulating as much data as possible is not necessarily the answer. What is most important is that you have the data you need in a form that allows you to make prompt, precise decisions to steer your organization to optimal cybersecurity outcomes.