{"id":89916,"date":"2023-08-03T13:21:12","date_gmt":"2023-08-03T13:21:12","guid":{"rendered":"https:\/\/www.techopedia.com\/?post_type=definition&p=89916"},"modified":"2023-08-03T13:28:50","modified_gmt":"2023-08-03T13:28:50","slug":"privileged-access-management","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/privileged-access-management","title":{"rendered":"Privileged Access Management"},"content":{"rendered":"
Privileged Access Management (PAM) is an approach to identity management designed to protect privileged user accounts against unauthorized access and misuse.\u00a0<\/span><\/p>\n PAM solutions are designed to manage, monitor, and audit privileged accounts, such as domain<\/a>, system admin<\/a>, or root accounts, that can be used to manage or configure other user accounts and IT infrastructure<\/a> or have access credentials, secrets, or tokens.\u00a0<\/span><\/p>\n According to <\/span>Gartner<\/span>, PAM platforms offer enterprises a number of core capabilities<\/a>, including:\u00a0<\/span><\/p>\n Together, these measures are not only designed to prevent unauthorized users from infiltrating high-value accounts but giving IT admins the visibility and control to revoke privileged access if a user misuses their credentials.\u00a0<\/span><\/p>\n Privileged Access Management is important because it provides a framework for enterprises to add extra layers of security<\/a> to accounts that have access to lots of high-value information, from credentials, secrets, tokens, and keys to <\/span>personally identifiable information<\/span><\/a>, <\/span>intellectual property<\/span><\/a>, and payment data.\u00a0<\/span><\/p>\n In many ways, targeting a privileged user account is the easiest way for threat actors to gain access to sensitive data. In fact, according to <\/span>Verizon<\/span>, 74% of all breaches involve the human element<\/a>, which includes error, privilege misuse, use of stolen credentials, or <\/span>social engineering<\/span><\/a>.\u00a0<\/span><\/p>\n In this sense, privileged accounts are a vital part of the enterprise <\/span>attack surface<\/span><\/a>, if a user acts negligently or maliciously or inadvertently provides access to a cybercriminal, all information they can access is exposed.\u00a0<\/span><\/p>\n PAM addresses these threats by enabling IT administrators to apply the <\/span>principle of least privilege<\/span><\/a> to user accounts, ensuring that each user only has the level of permissions (access, read, write, and execute) necessary to perform their function and nothing more.\u00a0<\/span><\/p>\n Under the principle of least privilege, if an unauthorized user accesses the account, the amount of information they have access to is significantly decreased, which reduces the overall impact of a <\/span>data breach<\/span><\/a>.\u00a0\u00a0<\/span><\/p>\n Deploying privileged access management in the enterprise provides organizations with a number of key benefits. These include:\u00a0<\/span><\/p>\n In combination, these benefits add up to hardening the identity perimeter against cybercriminals and reduce the chance of them establishing <\/span>lateral movement<\/span><\/a> within an enterprise environment.\u00a0<\/span><\/p>\n Identity and Access Management<\/a> (<\/span>IAM<\/span>) provides enterprises with another framework to protect user accounts against unauthorized access. At its core, IAM is about centrally managing permissions and determining the process employees use to authenticate themselves before accessing their user accounts.\u00a0\u00a0<\/span><\/p>\n Typically, organizations will use IAM platforms to control, identify, and authenticate users, leveraging measures such as single-sign-on<\/a> (<\/span>SSO<\/span>), <\/span>two-factor authentication<\/span><\/a>, and <\/span>multi-factor authentication<\/span><\/a> to verify their identity.\u00a0<\/span><\/p>\n IAM systems use <\/span>role-based access control<\/span><\/a>, determining what resources a user can access based on their job function.\u00a0<\/span><\/p>\n While there\u2019s some crossover between the two, the main difference between IAM and PAM is that the former is about defining steps to access the average user\u2019s account, whereas the latter is about protecting privileged accounts.\u00a0<\/span><\/p>\n In this sense, IAM is used throughout the enterprise to make sure that unauthorized users cannot log in to IT resources without passing through a predefined authentication process, and then PAM is used to enhance the security of a small subsection of high-value accounts.\u00a0<\/span><\/p>\n For example, an administrator can monitor privileged account access and immediately identify malicious or anomalous actions, such as a user <\/span>exfiltrating<\/span><\/a> or deleting data, and revoke access if there\u2019s anything problematic going on.\u00a0<\/span><\/p>\n It\u2019s important to note that IAM and PAM are mutually complementary and can be applied together to protect all identities.\u00a0<\/span><\/p>\n In today\u2019s world of decentralized<\/a> networks, user accounts and identities are key targets for cybercriminals<\/a>. With social engineering and <\/span>phishing<\/span> attacks making it easier for threat actors to harvest login credentials, organizations need to be prepared to react in case an attacker gains access to a privileged account.\u00a0<\/span><\/p>\n Privileged Access Management offers enterprises a tool they can use to harden high-value accounts against these types of threats and make it easier to accelerate their zero-trust journeys.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" What is Privileged Access Management (PAM)?\u00a0 Privileged Access Management (PAM) is an approach to identity management designed to protect privileged user accounts against unauthorized access and misuse.\u00a0 PAM solutions are designed to manage, monitor, and audit privileged accounts, such as domain, system admin, or root accounts, that can be used to manage or configure other […]<\/p>\n","protected":false},"author":286576,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,262],"class_list":["post-89916","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-identity-access-governance"],"acf":[],"yoast_head":"\n\n
Why Is PAM Important?<\/span><\/h2>\n
Benefits of Privileged Access Management<\/span><\/h2>\n
\n
PAM vs. IAM<\/span><\/h2>\n
A Zero-Trust Essential<\/span><\/h2>\n