Privileged Access Management

Published: April 17, 2019, 10:45 p.m.

b'

If you can\'t see all the show notes (with images and links) head here:\\xa0https://cisoseries.com/defense-in-depth-privileged-access-management-pam/

Where does privileged access management (PAM) fit in the order of operations?

Check out this post and discussion and this one\\xa0for the basis of our conversation on this week\\u2019s episode co-hosted by me,\\xa0David Spark\\xa0(@dspark), the creator of\\xa0CISO Series\\xa0and\\xa0Allan Alford\\xa0(@AllanAlfordinTX), CISO at\\xa0Mitel.\\xa0Our sponsored guest for this episode is Tim Keeler, CEO and co-founder of Remediant.

Thanks to this week\\u2019s podcast sponsor, Remediant

Remediant

Eighty one percent of cyberattacks utilize stolen administrative credentials. Yet, legacy enterprise password vaults solve only a fraction of the problem and are difficult to rollout.\\xa0Remediant\'s SecureONE takes a new approach to privileged access management: offering agent-less, vault-less, continuous detection and just-in-time-administration. Learn what\\xa0Remediant\\xa0can do in a half-day POC deployment.

On this episode of Defense\\xa0in\\xa0Depth, you\'ll learn:

  • Privileged access management is designed to control lateral movement when an intruder gets legitimate access to your network.
  • You can\'t protect what you don\'t know. A privileged access management program is ineffective without complete asset inventory and classification.
  • Don\'t wait to begin instituting a PAM solution. It\'s unrealistic to believe you\'d have a complete inventory right away that you could begin PAM. You\'ll probably have to work with what you\'ve got. It\'s a moving target for all. It may be an incomplete target as well... at the beginning.
  • Two-factor authentication (2FA) has a role. It can help with both initial intrusion and escalation. PAM\'s role is more refined with its ability to prevent escalation.
  • One of the debated issues was how does PAM negatively affect the user experience. Concerns of pushback and productivity issues resulted in companies refusing to implement 2FA or PAM.

'