Technology Why privileged access management should be essential to your...

Why privileged access management should be essential to your security strategy

-

View all on-demand sessions from the Intelligent Security Summit here.


Today it is essential to have a solution that manages privileged access to prevent increasingly sophisticated hacker attacks. However, to ensure secure protection without holes, you should include eliminating privileges in your cyber strategy.

In this article, we discuss Privilege Access Management (PAM), explain the importance of eliminating privileges in your security strategy, and discuss the relationship between privileges and zero trust.

Privileged Access Control (PAM)

PAM tries to control the rights of each user on the network to ensure the security of a company’s information. That’s because stolen privileged credentials are used in virtually every attack these days.

That says Fernando Fontao, channel account manager at BeyondTrustPAM tools are usually used to solve a specific problem: how to store privileged identities and manage their usage.

Event

Intelligent Security Summit on demand

Learn the critical role of AI and ML in cybersecurity and industry-specific case studies. Check out on-demand sessions today.

Look here

But with the rise of ransomware and hackers becoming more efficient in their attacks, taking away the privilege is the best solution to stop them. Yet many companies implement PAM without covering all vectors.

Many organizations believe that protecting privileged identities means keeping administrative credentials in a password vault. But the truth is that there must be a whole strategy that covers what constitutes a privileged activity.

Why use delete privileges?

According to Verizon’s 2022 Data Breach Investigations Report, more than 80% of the violations involve abuse of privileges.

Hackers take advantage of privileged credentials stored in local repositories, connected devices, and more. Therefore, eliminating privileges should be part of every company’s defense strategy. What does this mean? It’s easy; it’s all about changing the way permissions are implemented.

This change will not make the user’s life difficult or prevent him from performing his tasks. However, a policy is used – rather than a privilege that a hacker can steal. With a policy, you give the user the same permissions, just through a different, non-theft mechanism.

Because to carry out a cyber attack, a hacker has to go through a number of phases. The first is to infiltrate the company’s system. Then they try to escalate privileges; that is, make a lateral exploration move until you discover new privileges that allow more access. And finally when they launch the attack.

Thus, removing privileges through PAM prevents the hacker from moving from one stage to the next. It doesn’t matter where they entered, the attack dies if they can’t get through.

And applying privilege elimination will protect against various attacks. For example, the Lapsus$ Group carries out attacks without using technology. They do not exploit loopholes, vulnerabilities or code, but focus on gaining access to a legitimate credential through social engineering.

This type of attack is difficult to block using technology. Therefore, the best way to prevent this kind of attack is to eliminate privileges.

Relationship between privilege and zero trust

With the dissolution of the security perimeter, zero trust is created. This practice removes protections from static, network-based perimeters to focus on users, assets, and resources. So the new security perimeter is identity.

Zero trust requires any access to anything to be verified. It doesn’t really matter where you come from and where you go. The location and destination no longer matter – only the user and what they want to access. If a credential has a privilege, any person or system that controls it can abuse it.

Fighting back against today’s increasingly sophisticated hackers requires a comprehensive and well-defined security strategy that focuses primarily on deprivation.

Usama Amin is one of the founders of cyber snowing. com

Data decision makers

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people who do data work, can share data-related insights and innovation.

To read about advanced ideas and up-to-date information, best practices and the future of data and data technology, join DataDecisionMakers.

You might even consider contributing an article yourself!

Read more from DataDecisionMakers

Shreya Christinahttp://ukbusinessupdates.com
Shreya has been with ukbusinessupdates.com for 3 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider ukbusinessupdates.com team, Shreya seeks to understand an audience before creating memorable, persuasive copy.

Latest news

Mostbet Pakistan ᐉ Online Casino Review Official Website

Join us to dive into an immersive world of top-tier gaming, tailored for the Kenyan audience, where fun and...

Casino Pin Up Pin-up Casino Resmi Sitesi Türkiye Proloq Ve Kayıt Çevrimiçi

ContentPin Up Nə Say Onlayn Kazino Təklif Edir?Pin Up Casino-da Pul Çıxarmaq Nə Miqdar Müddət Alır?Vəsaiti Kartadan Çıxarmaq üçün...

Играть В Авиатора: Самолетик Pin Up

ContentAviator: Son Qumar Oyunu Təcrübəsini AçınMobil Proqram Pin UpPin Up Aviator Nasıl Oynanır?Бонус За Регистрацию В Pin Up?Pin Up...

Pin Up 306 Casino əvvəl Qeydiyyat, Bonuslar, Yukl The National Investo

ContentDarajalarfoydalanuvchilar Pin UpCasino Pin-up Pin-up On Line Casino Resmi Sitesi Türkiye Başlanğıc Ve Kayıt ÇevrimiçPromosyon Və Qeydiyyatdan KeçməkAviator OyunuAviator...

Find Experts to Write My Paper for Me. Just Click a Button Even though you may have many...

Oyunu Xinclamaq Mümkündürmü?

ContentAviator Apk HackAviator-da Necə Bonus Əldə Etmək OlarAviator Hack - Oyunu Xinclamaq Mümkündürmü?Aviator Hədis AlqoritmləriIşarə Hacking AviatorAviator Oyunu 1winMərclər...

Must read

You might also likeRELATED
Recommended to you