- Solution that restricts and monitors privileged access within an IT environment
- The policies, procedures, and technical controls that are used to prevent malicious abuse of privileged accounts
- Crucial for preventing data breaches and ensuring the least privileged access is granted for specific tasks or roles
Components of Privileged Access Management
Just-In-Time Permissions (JIT Permissions)
- Security model that grants administrative access only when needed for a specific task
- Reduces the risk of unauthorized access or misuse of privileges
- Access rights are given when the task begins and revoked once the task is completed
Password Vaulting
- Technique that stores and manages passwords securely, often in a digital vault
- Requires multi-factor authentication for accessing stored passwords
- Tracks access to privileged credentials, providing an audit trail
Temporal Accounts
- Temporary accounts used for time-limited access to resources
- Created for specific purposes and automatically disabled or deleted after a predefined period