The development of phishing scams and hackers using social engineering prove that it’s essential we stay at the forefront of cyber security to keep our clients protected.
Continuing our series on cyber security, Cyber Underwriting Consultant Tim Hodgkins shares his thoughts on Privileged Access Management (PAM) and how it can be used to ensure businesses are protected from vulnerabilities that exist in the broader risk environment. His role in providing technical risk management advice and detailed insight into emerging cyber threats means he’s well placed to share his thoughts on this vital component of cyber security.
Privileged access is classified differently across various organisations and government entities; however, NIST (National Institute of Standards and Technology) classifies it as:
A user that is authorised (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorised to perform.
From a threat actors’ perspective, these are the user accounts that they will want to compromise the most. As a result of this, privileged access management tools exist.
As the name suggests, it’s the management of privileged accounts. If these accounts are misused, they can damage the security and integrity of an IT environment and the organisation. As a result, they need to be carefully managed.
To draw parallels with keeping valuable items safe in your home, any things that hold significant value, sentimental, financial, etc. may require additional protection, such as locking them away in a drawer or putting them in a safe. This would protect them from both internal threats such as pets, young children, leaking pipes, and external ones such as burglars and unwanted visitors.
The same principle applies to privileged accounts. They need to have additional protections on them to ensure only appropriate team members can log in and access them. Different forms of protection can include:
There are countless examples where careless storage/assignment of privileged credentials/entitlements have left companies vulnerable. They fall into two main categories:
In the first instance, once an account with privileged access has been compromised, limited preventative controls can be relied upon to mitigate the risk of an attacker abusing this account. The attacker may have the ability to circumvent and turn off security controls such as EDR software and logging and monitoring tools. These types of attacks have been seen in the market, and once an attacker has this access, they can cause significant damage to the IT estate.
In the second case, the lack of a PAM tool or a process to manage privileged credentials can result in privileged credentials being stored insecurely, making them easily accessible to external attackers and insider threats. Insecure storage can come in various forms, some as basic as having credentials copied into a spreadsheet and stored on a company-wide network drive. This can result in an attacker escalating their privileges by using a standard account as an entry point.
According to cyber security experts Gartner,
…those who eliminate standing privileges will experience 80% fewer privileged breaches than those that don’t.
This makes it clear that having appropriate PAM protocols in place is essential for the ongoing cyber security of a business.
We hope this article has helped show you how PAM is an essential element of your client’s cyber security. If you want to learn more about how Brit can help, read our cyber security page.