PAM
PRIVILEGED ACCESS MANAGEMENT (PAM) IS A SECURITY METHOD THAT MANAGES PRIVILEGED ACCOUNTS, USING SECURE REPOSITORIES, LOGGING, AND ADMINISTRATIVE ACCOUNT PROTECTION TO CONTROL AND MONITOR ACCESS TO IMPORTANT ASSETS.
PAM solutions provide a repository for credentials of privileged accounts which are isolated in order to reduce the risk of the credentials getting compromised. Typically, these tools work by having administrators go through the PAM system and “check out” the account, which will then be authenticated and logged. When the account is checked back into, the credentials will be reset, so the administrator will be forced to check out the account again in order to use it.
There are some other identity access management details to be considered for a comprehensive IAM strategy:
There are some other identity access management details to be considered for a comprehensive IAM strategy:
- Location: Keep track of the origin of the account login and monitor its location.
- Device: Take into account the device being used for access and ensure its security.
- Network context: Consider the network from which the login is initiated and assess its trustworthiness.