Privileged Access Management, PAM, is a new feature that comes with MIM, Microsoft Identity ManageR. what is it and how does it work?
PAM has powerful permissions which allow systems administrators, who are commonly targeted by hackers, to reduce the threat and impact of cyber attacks.
PAM addresses an all-too-frequently neglected problem, the detailed management of administrative (privileged) permissions. Admin permissions are privileged and PAM gives them security superpowers. In other words, PAM can keep safe those who have the keys to your kingdom. Many recent well-publicized hacking attacks have specifically targeted system administrators, and once they’ve gained access to administrative credentials, they have create further accounts with extensive permissions, waiting for the right time to attack.
Organizations must take action to combat attacks by:
- preventing theft of administrative credentials, as far as possible
- controlling the process of creation and authorization of administrative credentials
- monitoring administrative groups to detect misuse, and
- responding swiftly and appropriately to evidence of misuse.
PAM’s has administrative architecture and features to make each of these steps possible.
DOWNLOAD OUR WHITE PAPER
In this white paper, Privileged access management – a primer, a nine-page pdf, I describe PAM’s features and concepts, its architecture and structures and I discuss some design considerations for deploying PAM in the real world. It’s free to download from right here:
Need help configuring Privileged Access Management in your organization? Contact us – are both teachers and consultants.