Report Experts Guide To PAM Success
Report Experts Guide To PAM Success
Report Experts Guide To PAM Success
TO PRIVILEGED
ACCESS
MANAGEMENT
(PAM) SUCCESS
People, processes,
and technologies that
accelerate your PAM
program beyond the
basics
1 thycotic.com | sales@thycotic.com
CHAPTER 1 – Defining “Advanced" PAM .............................................................4
CHAPTER 2 – PEOPLE: Establishing Stakeholder Roles and Responsibilities.........9
CHAPTER 3 – PROCESS: Understanding the PAM Lifecycle Approach.................13
CHAPTER 4 – TECHNOLOGY: Implementing and Integrating PAM Technology.....17
CHAPTER 5 – Continuing Your PAM Journey........................................................33
2 thycotic.com | sales@thycotic.com
Introduction
80
WITH UP TO of breaches due to compromised credentials, Privileged
3 thycotic.com | sales@thycotic.com
CHAPTER 1
Defining “Advanced” PAM
Let’s put “advanced” PAM in context of how most organizations implement
privileged security controls as they progress to become experts. As a reference,
you can refer to the PAM Maturity Model, which outlines the four phases of PAM
maturity shown in the chart below.
Fig 1
Privileged Access Management
Maturity Model
LAGGARDS LEADERS
ADAPTIVE INTELLIGENT
SECURITY POSTURE
ADVANCED
MATURITY LEVEL
BASIC
ANALOG
HIGH RISK
To architecture
and operations
4 thycotic.com | sales@thycotic.com
Organizations in the Advanced phase have moved
Which Privileges from a reactive to a proactive privilege security
Does Your strategy. PAM is a top cyber security priority, with
PAM Program a commitment to continuous improvement of
Address? privileged security practices through an ongoing
PAM program.
Privileged accounts
are everywhere in As the ultimate stage of PAM maturity,
your IT environment
organizations in the Adaptive Intelligent phase
and can be human
take continuous improvement to a higher level,
or non-human. Some
integrating leading technologies such as threat
privileged accounts
are associated with intelligence, trust frameworks, machine learning,
individuals such and advanced automation to collect information
as business users, and adapt system rules. These organizations
local machines, or fully automate and manage the entire lifecycle of
domain and network privileged access, from provisioning to rotation to
administrators, while deprovisioning and reporting.
others are service
accounts used to Figure 2 provides a high-level overview of the
provide access to various types of privileged accounts, why and how
networks, databases they are used, as well as who uses them, and how
and applications, they should be secured.
including IoT
systems and DevOps Fig 2
toolchains. Privileged Access Management Matrix:
Why, Who, Where, and How
Why are they Types of Who uses Where are they How are they How are they Risks if
needed? privileged them? found? used? secured? compromised?
accounts?
5 thycotic.com | sales@thycotic.com
Checklist
PAM Maturity Basics Checklist
6 thycotic.com | sales@thycotic.com
Where are you in
your PAM journey?
We recommend you This Expert’s Guide is intended to
get up to speed on PAM take you to Phase 3 of the PAM
by reading PAM for
Maturity Model and beyond. If
Dummies
you’re launching your PAM program
thycotic.com/
or working through the first two
PAMforDummies/
stages of PAM Maturity, be sure to
get the basics established first.
7 thycotic.com | sales@thycotic.com
PROCESS TECHNOLOGY
Guided by Automated
the PAM security
Lifecycle controls and
integration
PEOPLE
Stakeholders roles
and responsibilities
Fig 3
The PAM Expert
Triangle for Success
8 thycotic.com | sales@thycotic.com
CHAPTER 2
PEOPLE: Establish Key Stakeholder
Roles and Responsibilities
No matter how advanced your technical Access Management, IT Operations,
skills, you can’t build a successful PAM Development and Engineering, and so
program without engaging the key on. These teams typically report up
stakeholders. You need to align people through the CISO or CIO to executive
and technology so PAM can be readily management, who in turn report to the
deployed and adopted across your board of directors.
organization.
To avoid friction among these groups,
Your comprehensive PAM program PAM experts must prioritize collaboration,
must engage multiple IT and business
transparency, and joint goals across
functions and tap specific people to
departments. Keep in mind, while
take on roles and responsibilities, from
cyber security teams may set PAM
executive management through system
goals and strategy, they’re dependent
administration. Organizations—even
on their IT Operations counterparts for
small ones—must identify a person,
help with implementation and ongoing
department or formal team that takes
management and reporting.
ownership of the program, setting PAM
policies and ensuring they are carried out.
Additionally, PAM policies impact the
The Identity and Access Management
workflow of other teams. For example,
(IAM) team is typically responsible for
a PAM program with strong ties to both if your PAM team removes local admin
security and risk personnel. rights from endpoints to reduce risk,
you’ll need to work closely with IT support
In a smaller organization, getting buy-in teams to keep the business running and
for PAM is usually quicker, as it’s often avoid a backlash from angry users.
one of many security and operations
responsibilities within a single IT team. Figure 4 illustrates the broad range
In larger organizations, PAM may be a of stakeholder roles and titles across
shared responsibility across different an organization, along with their
teams: IT Security, IT Risk, Identity and responsibilities and involvement in PAM.
9 thycotic.com | sales@thycotic.com
Fig 4
PAM Key Stakeholder Roles and Responsibilities
PAM Focus and Individual Roles What They Do and How You Can Help
Responsibility and Titles
Oversight C-Level Executives/ Executive leadership is ultimately held responsible for
Board of Directors cyber security by customers, auditors, and regulators.
Their commitment to a PAM program is essential to
approve appropriate resources, time, and budget.
10 thycotic.com | sales@thycotic.com
Compliance Auditors & Like most cyber security functions, PAM policies are
Compliance heavily derived from compliance requirements that may
Officers include PCI, NIST, ISO, SOX, HIPAA, and EU GDPR. Because
of legal implications, compliance teams should have input
into PAM governance, including policy creation, logging and
reporting requirements.
Risk Risk Management PAM may also fall under IT Risk Management, which is
Management Officers responsible for risk ranking and determines which
privileged accounts and use cases represent the highest
risk and must be prioritized in a PAM program.
Deployment IT Operations/ IT Operations as well as Cloud Managers are essential
Cloud Managers to assuring PAM deployment in the context of your
organization’s IT architecture and hosting policies.
Operations IT Administrators IT Operations Managers, responsible for set up and
management of applications, databases, networks, and other
IT resources, are key stakeholders for ongoing PAM success.
These folks are tasked with day-to-day administration of PAM
software. If PAM security policies negatively impact their
productivity or create friction for business users, IT Admins
will feel the pain and may not adopt the solution.
11 thycotic.com | sales@thycotic.com
PAM Focus and Individual Roles What They Do and How You Can Help
Responsibility and Titles
Business Units BU Directors PAM experts need to understand from business units which
applications, systems, and users require privileged access and
which don’t.
12 thycotic.com | sales@thycotic.com
CHAPTER 3
PROCESS: Process and Scope of
the PAM Lifecycle
To move beyond the The Privileged Access Management Lifecycle approach
basics, you must plan provides a framework to help PAM experts manage
and implement PAM privileged access as a continuous process rather than a
in the context of one-and-done project. The diagram below illustrates the
an ongoing, evolving key stages of the Lifecycle. A brief description of each
program. stage follows.
Fig 5
Privileged DEFINE
Access
Management
Lifecycle
MANAGE
RESPOND & PROTECT
TO
INCIDENTS
DETECT MONITOR
USAGE
13 thycotic.com | sales@thycotic.com
Define
Start by defining what ‘privileged access’ means,
identify what a privileged account is for your
organization and define governance policies.
Centralized PAM
These decisions are different for every company
for a Holistic,
so it’s crucial you map out what important
Integrated
business functions rely on data, systems, and
Strategy
access. Gaining understanding of who has
As your PAM program
privileged account access and when those
advances, you’ll bring more
departments into the fold. accounts are used is essential to managing the
Rather than having multiple, scope and complexity of your PAM program.
overlapping PAM solutions
operating in departmental
silos, an advanced PAM
program centralizes all PAM Figure 2 in Chapter 1 provides the categories of
policies and processes for privileged account use and access you’ll want
comprehensive, efficient to consider as you define your own privileged
management and oversight. workplace.
14 thycotic.com | sales@thycotic.com
Discover
Identify your privileged accounts and implement continuous discovery to curb
privileged account sprawl, identify potential insider abuse, and reveal external
threats. Define policies for service account governance. Initial inventory and
continuous discovery of privileged accounts (human and non-human) across
your organization is critical to ensuring ongoing visibility of your privileged
account landscape and crucial to combating cyber security threats. Discovery
must be automated and reviewed on a weekly basis at a minimum.
Monitor
Monitor and record privileged account activity. This will help enforce proper
behavior and avoid mistakes. If a breach does occur, monitoring privileged account
use also helps digital forensics, identify the root causes, and identify critical
controls that can be improved to reduce your risk of cyber security threats.
15 thycotic.com | sales@thycotic.com
Detect
Build Auditing
& Compliance Ensure visibility into the access and activity of your
Checks Into Your privileged accounts in real time to spot suspected
PAM Process account compromise and potential user abuse.
PAM behavioral analytics solutions focus on key
Virtually all cyber security data points to establish individual user baselines,
regulations worldwide call for
including user activity, password access, similar
PAM security controls such
as access control, password
user behavior, and time of access to identify and
complexity and rotation, and alert you of unusual or abnormal activity.
least privilege policies. Even
organizations not beholden
to industry or location-based Respond
requirements benefit from
following best practice security When a privileged account is breached, simply
frameworks such as NIST and
changing the password or disabling the account
CIS controls.
isn’t enough. While inside, hackers could have
Some regulations are highly installed malware and even created their own
prescriptive while others give privileged accounts. If a domain administrator
you broad guidelines but leave
account gets compromised, for example, you
the detailed decisions up to you.
As a PAM expert, your judgment should assume that your entire Active Directory
is essential so that you don’t is impacted and investigate and make changes
approach compliance as a so the attacker can’t easily return.
“check the box” exercise but
a process to strengthen your
security posture. Review and Audit
Internal audits, planned and Continuously observing how privileged accounts
unplanned, help teams prepare
are being used through audits and reports will
for external ones. As part of
your audit process, map your help identify unusual behaviors that may indicate
PAM practices to security a breach or misuse. Automated reports help
controls outlined in the laws track the cause of security incidents as well
that apply to your organization as demonstrate compliance with policies and
and make sure you know the
regulations. Auditing privileged accounts will
deadlines for compliance.
also give you metrics that provide executives
Learn more: thycotic.com/
with vital information to make more informed
cybersecurity-compliance-
audit/ business decisions.
16 thycotic.com | sales@thycotic.com
CHAPTER 4
TECHNOLOGY: Implement and
Integrate PAM Security Controls
Once you’ve engaged the proper stakeholders and created PAM processes, you can
begin to implement and refine PAM solutions that fit your specific business model
and your industry. Implementing PAM successfully throughout your organization
depends on choosing the right technologies to automate and control privileged
access across diverse environments and ecosystems.
Fig 6
PAM Security Controls Mapped to Lifecycle
17 thycotic.com | sales@thycotic.com
PAM Security How To Put The Control In Place
Lifecycle Technology
Stage Control
Define Policy & Confirm requirements for your internal IT environment and policies
Governance such as expectations for High Availability and SLAs with other
departments. This information will help to define the underlying
architecture you’ll need for an on-premise PAM implementation or
may guide your choice toward a cloud-based option.
Identify SQL admins, AD admins, IIS admins and any other key
stakeholders who will be managing your PAM solution.
Discover Discovery & Run discovery processes to find all accounts that require privileges,
Automation including human accounts, service accounts, local admin accounts on
endpoints, and applications.
Based on your discovery, you can determine how many people have
Domain Admin rights currently at your organization and identify
opportunities where those could be reduced or shared. For example,
you can replace individual named accounts with shared accounts and
remove named accounts from the DA group. Or, you can configure
your PAM solution to have it temporarily belong to the DA group only
when utilized.
18 thycotic.com | sales@thycotic.com
PAM Security How To Put The Control In Place
Lifecycle Technology
Stage Control
Manage and Access The core of PAM, access security, includes vaulting, delegation, and
Protect Security elevation of privileged credentials, ideally in accordance with a least
privilege model. This enables the secure usage of privileged accounts.
Manage and Session Particularly important for organizations that allow third-party access
Protect Protection to privileged accounts, advanced PAM programs include monitoring
and recording privileged session activity as well as workflows that
allow for multiple levels of approvals to grant or deny exceptional
access to sensitive data or critical systems.
19 thycotic.com | sales@thycotic.com
Customer Spotlight
TrendMicro
20 thycotic.com | sales@thycotic.com
PAM Security How To Put The Control In Place
Lifecycle Technology
Stage Control
Monitor Audit/ Session monitoring increases oversight of privileged account use and
Monitoring allows for in-depth analysis of privileged session activity in real time or
after the fact.
Detect Behavioral Certain activities, systems, applications, cloud services, containers, etc.
Analytics represent relatively low risk, while others are responsible for sensitive
data or business-critical operations and thus represent higher risk.
Advanced PAM programs integrate threat analytics and risk rankings
from your SIEM solutions or other risk criteria to help guide decisions.
Respond Event Response Based on the analytics you set up, you can trigger alerts or perform
& Recovery automatic responses. For example, when alerted of suspicious
behavior, administrators may wish to lock down accounts, rotate
credentials immediately or terminate or suspend sessions. Once the
event is investigated and cleared, administrators can reset to baseline.
Review & Audit/ Advanced PAM programs include logging privileged activities with an
Audit Monitoring immutable audit log that allows playback for reporting, auditing and
event forensics.
Forward your log to a SysLog server or, if logging in AD, use Windows
Event Forwarding.
21 thycotic.com | sales@thycotic.com
Customer Spotlight
Adobe
22 thycotic.com | sales@thycotic.com
Putting PAM in Context - Multi-Dimensional PAM
The controls list provided highlights the main activities to implement over
the PAM lifecycle. But it’s not until you can implement those activities at scale
that you’re truly a PAM expert. It’s important to consider how your PAM program
secures privileged credentials in different states, across your entire attack surface,
and in the context of different environments.
23 thycotic.com | sales@thycotic.com
Customer Spotlight
IPC Subway
24 thycotic.com | sales@thycotic.com
Customizing PAM to Match Your Organization
PAM programs typically begin with Similarly, PAM programs begin by
changing default or out-of-the-box tapping into basic discovery sources
passwords for common products and such as Active Directory, Unix, and
devices. However, every organization is VMware. Your organization, however,
different and may have custom-built or may need to go beyond these sources
legacy systems and applications that to find and manage privileged
also need to be protected. These unique accounts from Cisco, Oracle, SQL
applications require granular testing Server, or MySQL databases. As a PAM
to identify where in-code password expert, you can discover and automate
changes may be failing. Advanced PAM the management of those credentials
programs extend privileged protection as well, by creating rules to pull in
to unique applications with custom those accounts and turn credentials
password changers. into secrets that can be generated and
changed automatically.
Just as PAM operations can’t exist in a silo, neither can the tools that support them.
PAM programs are most successful when PAM controls are integrated with other IT
and security solutions. With tight integration, information stays up to date, reports take
less time to create, and decisions can be made more quickly. Your PAM program gains
more visibility throughout the organization and with executives and board members.
PAM solutions may offer out-of-the-box integration with third-party tools and provide
access to APIs and scripts, which you can customize to match your own solution and
workflow.
25 thycotic.com | sales@thycotic.com
Improve Governance Throughout the
PAM Lifecycle
PAM + IAM/IGA
While PAM secures access to key system and admin accounts, Identity & Access
Management (IAM) is for every user account in your organization. IAM enables
the right individuals to access the right resources at the right times for the right
reasons. For example, IAM allows you to provide a salesperson with access to
his or her account and provides higher level access for certain individuals to
log into sensitive systems, such as finance and Human Resources, that require
elevated privileges.
An integrated IAM/PAM system will help track user account ownership, flag user
accounts that aren’t being used, automate the provisioning of new user accounts,
simplify the assignment of privileged accounts, and make it possible to regularly
prune access. Integration will enable you to meet compliance and regulatory
reporting requirements efficiently and with minimal overhead.
It’s important that your account management process, from creation to rotation
and deprovisioning, stays coordinated every step of the way.
26 thycotic.com | sales@thycotic.com
PAM + Connection Management
Privileged credentials used when making remote desktop connections provide
access to critical infrastructure, data, and applications. When configuring remote
sessions, IT teams must navigate complex networks, cloud services, and user
needs. They typically have multiple sessions active at once, using different
connection protocols and a variety of privileged accounts.
27 thycotic.com | sales@thycotic.com
Customer Spotlight
State of Indiana
28 thycotic.com | sales@thycotic.com
Identify Design Flaws More Rapidly and
Accurately
PAM + Vulnerability Scanning
Integration of PAM solutions and vulnerability testing and management solutions
helps ensure that vulnerability scans have the correct credentials to scan
systems for missing patches and when a patch is being applied to ensure it is
installed correctly.
This deep credential scan allows for a more thorough vulnerability assessment
than you would be able to achieve with penetration testing alone.
29 thycotic.com | sales@thycotic.com
Customer Spotlight
AmericaFirst
30 thycotic.com | sales@thycotic.com
Log Events, Aggregate Cyber Security Data
and Trigger Alerts
PAM + SIEM
Many IT and security teams rely on Security Information and Event Management
(SIEM) and log management solutions, such as ArcSight, Splunk, and LogLogic, for
centralized reporting and coordinated incident response. As part of a risk-based
approach, use these solutions to classify and score a wide range of events to prioritize
business and technical risk.
Events associated with privileged accounts can be correlated with your overall risk
ranking process and workflow, so administrators receive alerts in the systems they use
most regularly. As long as these systems use Syslog format they should be compatible
with PAM solutions. Then, when an administrator sets up a filter for certain activities
associated with privileged accounts, those events are logged with different alert levels
depending on their potential risk. For example, administrators may want to act quickly
if users are locked out, if “unlimited administration” mode gets turned on, heartbeats
fail, or secrets expire.
SIEM solutions can also generate consolidated reports that are presented to company
leadership and auditors to demonstrate cyber security progress. Integration ensures
that your PAM program shares the same goals as the overall cyber security program.
When PAM becomes a core element of ongoing reporting, awareness and adoption
grows throughout your organization.
31 thycotic.com | sales@thycotic.com
Customer Spotlight
Telstra
32 thycotic.com | sales@thycotic.com
CHAPTER 5
CONCLUSION AND NEXT STEPS:
The Ongoing PAM Journey
33 thycotic.com | sales@thycotic.com
ABOUT THYCOTIC
Thycotic is the leading provider of cloud-ready privilege management
solutions. Thycotic’s security tools empower over 10,000 organizations,
from small businesses to the Fortune 500, to limit privileged account risk,
implement least privilege policies, control applications, and demonstrate
compliance. Thycotic makes enterprise-level privilege management
accessible for everyone by eliminating dependency on overly complex
security tools and prioritizing productivity, flexibility and control.
Headquartered in Washington, D.C., Thycotic operates worldwide with
offices in the UK and Australia.
34 thycotic.com | sales@thycotic.com