The Gorilla Guide To Privileged Access Management
The Gorilla Guide To Privileged Access Management
The Gorilla Guide To Privileged Access Management
Management
How PAM Can Help Your Broader
Cybersecurity Strategy
JAMES PANETTI
POWERED BY
Privileged Access
Management
By James Panetti
TABLE OF CONTENTS
Introduction: A Pillar of Identity Security 4
All rights reserved. This book or any portion thereof may not be reproduced
or used in any manner whatsoever without the express written permission
of the publisher except for the use of brief quotations in a book review.
Printed in the United States of America.
www.actualtechmedia.com
Publisher’s
Acknowledgements
CREATIVE DIRECTOR
Olivia Thomson
PR I V I L EG E D AC C E S S MANAG EMEN T 4
What Is Privileged Access
Management?
PR I V I L EG E D AC C E S S MANAG EMEN T 5
On-Prem / Hybrid / Cloud
SaaS IaaS/PaaS
Code Code
USERS
WORKPLACES WORKSPACES
Figure 1: Sensitive, regulated data exists in a wide range of IT systems
PRIVILEGED ACCESS
Within the context of an enterprise IT environment, “priv-
ileged access” means any type of special access or ability
granted to a user that’s above and beyond that of standard
users. When implemented well, it allows organizations to
PR I V I L EG E D AC C E S S MANAG EMEN T 6
secure their IT infrastructure and applications to protect
sensitive data and critical infrastructure without hindering
the efficiency of business activities.
PR I V I L EG E D AC C E S S MANAG EMEN T 7
required to gain privileged access, such as secure shell
(SSH) and application program interface (API) keys.
PR I V I L EG E D AC C E S S MANAG EMEN T 8
Corporate executives can be individually
fined up to $5 million and sentenced up to 20
years in prison for violating rules in the Sarbanes-
Oxley (SOX) Act. As another case in point, a leading
United States bank was at one point fined $80 million
after a security breach.
EXAMPLES
There are many global and regional regulations to be aware
of, depending on the industry in question. Many apply uni-
versally to all industries, such as SOX, the U.S. Department
of Commerce’s National Institute of Standards and
Technology’s (NIST) various standards, the European Union
(EU) Network and Information Security Directive (NIS 2), the
PR I V I L EG E D AC C E S S MANAG EMEN T 9
EU’s General Data Protection Regulation (GDPR), and the
Payment Card Industry Data Security Standard (PCI DSS).
PR I V I L EG E D AC C E S S MANAG EMEN T 10
1
MALICIOUS ACTORS
Bad actors can exist either internally or
externally to the organization. External
actors use a wide variety of techniques to
Internal External
Attacker Attacker gain entry, while internal actors tend to
leverage existing knowledge and access.
2 3
CREDENTIAL THEFT LATERAL & VERTICAL
Actors use techniques such as social MOVEMENT
engineering, keystroke logging, Actors will leverage that access to
credential repository scraping, and navigate across an organization's
more to harvest passwords, hashes, resources, whether it be laterally from
SSH Keys, or hard-coded credentials. within a risk tier (e.g. workstation to
workstation) or crossing vertically
into another risk tier or environment
(e.g. workstation to cloud or
workstation to DevOps tool).
Developer Robot
4 5
PRIVILEGE ESCALATION ACTIONS ON OBJECTIVES
& ABUSE Those malicious actions are typically
Once a bad actor has discovered the predefined objectives such as data,
access they desire, they will elevate theft, ransomware distribution,
their privileges to then carry out service disruption, supply chain
malicious actions against the spread, brand damage, and more.
organization.
Data Establish
Exfiltration Backdoors
Deploy Service
Ransomware Disruption
PR I V I L EG E D AC C E S S MANAG EMEN T 11
3 KEY PRINCIPLES
The first principle is to prevent credential theft by bad actors,
be they external or internal. External attackers have many
tricks to deploy to gain entry and internal actors are already
inside your perimeter with insider knowledge.
PR I V I L EG E D AC C E S S MANAG EMEN T 12
BEST PRACTICES
The CyberArk Blueprint organizes best practices into a
phased implementation plan (Figure 3) designed to protect
any organization’s environment, whether infrastructure is
on-premises, in the cloud, or both.
PR I V I L EG E D AC C E S S MANAG EMEN T 13
The Blueprint first emphasizes rapid risk mitigation by se-
curing the highest-privileged (and thus highest-risk) iden-
tities, particularly those which can control entire environ-
ments, such as cloud or domain administrators. It leverages
adaptive multi-factor authentication (MFA) and single sign-
on (SSO), privileged session isolation, continually rotating
passwords, and intelligent privileged activity monitoring and
analysis. Risks associated with privileged non-human users
can be mitigated via third-party security tools, replacing
hard-coded credentials with API calls and reducing permis-
sions granted embedded operating system services.
PR I V I L EG E D AC C E S S MANAG EMEN T 14
hard-coded secrets are removed from dynamic applications
(e.g., containerized applications and microservices), and any
remaining administrator access is secured.
ZERO TRUST
Zero Trust is a cybersecurity model based on the simple
principle of “never trust, always verify.” The model takes
a realist, practical view of the security landscape with the
assumption that one day, eventually, an attack will happen.
No security measure is perfect, and threats are ever evolving,
therefore an organization would be naive to think “it will
never happen here.” Adopt an “Assume Breach” mindset by
assuming it will.
PR I V I L EG E D AC C E S S MANAG EMEN T 15
The Assume Breach paradigm is the backbone of Zero Trust
and drives at least five key behaviors: Employ consistent,
continual, and adaptive MFA to verify all identities. Automate
the identity provisioning process, gate it with thorough
approval steps, and carefully manage its life cycle. Secure
all credentials and authentication, including authentication
tokens and credential caches, and take extra caution in man-
aging local endpoint administrator credentials. Eliminate
all unnecessary privileges with both a “least privilege” and
“JIT” approach (more on both concepts below). Finally,
continuously monitor, record, and audit all identity security
related events to ensure compliance requirements are met.
Note that though the topics of Zero Trust (a model) and MFA
(a technology) are key elements of any discussion on identity
management (a comprehensive solution), the three are not
synonymous. Zero Trust is neither a solution nor technology,
but rather an approach to cybersecurity. It ensures every
identity is verified, every device is validated, and privileged
access is intelligently restricted.
PR I V I L EG E D AC C E S S MANAG EMEN T 16
THE PRINCIPLE OF LEAST PRIVILEGE
The principle of least privilege is foundational to the Zero
Trust model and is as practical as it is simple. Each user
should have only the bare minimum privileges required to
perform daily duties. No more, no less, no exceptions. An
accounting department user can only access accounting
records, a marketing user can only access marketing applica-
tions, a database admin’s privileges end at the database, and
so on. The principle likewise applies to non-human assets.
For example, an automation tool’s user account should like-
wise only have the minimum privileges needed to execute its
own processes.
PR I V I L EG E D AC C E S S MANAG EMEN T 17
It meanwhile improves threat detection via threat analytics
functionality to help Security Operations Center (SOC) teams
identify and intercept malicious activity.
PR I V I L EG E D AC C E S S MANAG EMEN T 18
Privileged accounts of both varieties are often granted
“always on” access despite many only needing access for
a specific amount of time. This excessive access does not
meet the bar set by Zero Trust’s principle of least privilege,
but a JIT approach can resolve this.
Interactive
APPROVAL
PR I V I L EG E D AC C E S S MANAG EMEN T 19
Cloud strategies differ from those of on-premises envi-
ronments, of course. Cloud Infrastructure Entitlements
Management (CIEM) solutions manage identities and priv-
ileges in cloud and multi-cloud environments and apply JIT
privileged access to cloud infrastructure and services.
PR I V I L EG E D AC C E S S MANAG EMEN T 20
CyberArk Privileged
Access Manager
PR I V I L EG E D AC C E S S MANAG EMEN T 21
CyberArk’s Identity Security Platform goes even further,
provisioning JIT privileged access for operational accounts
in both hybrid and multi-cloud infrastructures (Figure 5).
External
Vendors
ADMINS
Administrators
Secure, Privileged Dynamic
Remote Access Access Privileged
Manager Access
Developers
Vaulted Just-in-Time
Credentials (JIT) vault-less
Credential access
Management Brokered,
Monitored
Monitored
Sessions Sessions
Ephemeral
Access
PR I V I L EG E D AC C E S S MANAG EMEN T 22
ENSURE COMPLIANCE
Privileged Access Manager can help avoid the costly pit-
falls of failing to comply with regulatory requirements via
controls that safeguard and audit privileged access across
on-premises, cloud, and hybrid infrastructure. It manages
privileged credentials with efficient, documented processes
and proactively monitors all privileged access activities. It
even logs which users have access to shared accounts and
captures all activity conducted through them. Various addi-
tional features help ensure compliance with both global and
regional regulations.
PR I V I L EG E D AC C E S S MANAG EMEN T 23
Any remote access granted to a third party will be inherently
secure with a JIT approach aligned with Zero Trust’s princi-
ple of least privilege and features such as biometric MFA. Its
simplified remote access provisioning process will reduce the
burden on IT staff, and it will record and audit all third-party
user activity to ensure compliance.
PR I V I L EG E D AC C E S S MANAG EMEN T 24
In fact, these are only a couple of the many ways CyberArk
ensures reliable protection and why organizations of many
shapes and sizes trust CyberArk to guard the keys to their
kingdoms.
PR I V I L EG E D AC C E S S MANAG EMEN T 25
About CyberArk Privileged
Access Management
PR I V I L EG E D AC C E S S MANAG EMEN T 26
About ActualTech Media
PR I V I L EG E D AC C E S S MANAG EMEN T 27