Identity Management
Privileged Access Management
Worried about insider threats with common root/administrator account in your organisation. Not sure about the various types of privileged accounts, want to improve system administration/governance?
Challenges
Privileged accounts are by definition high risk accounts. Ensure they are discovered, owned, password protected and monitored.
- Administrators accessing shared privileged accounts: Control and limit the use of these privileged accounts for daily use. Achieve accountability and non-repudiation for the administrators accessing shared privileged accounts.
- Achieve accountability and non-repudiation for the administrators accessing shared privileged accounts: A PAM solution can facilitate the session monitoring, audit recording for accountability, and non-repudiation.
- Reduce the risk of sabotage by internal threats and achieve accountability: A PAM solution can change the password frequently based on the enterprise password policy.
- Administrators need ad-hoc privileged access: A PAM solution can provide workflow capabilities for approval of access requests requiring elevation of access.
Our approach
Our approach towards Privileged Access Management is designed to rapidly reduce security risks while minimising operational risk.
Our expertise and experience in PAM have established us as leaders in the field. Our leadership in the overall IAM allows us to deliver a comprehensive approach throughout the development of PAM solution. We have partnered with the elite PAM vendors to provide a unified approach regardless of the complexity or vendor preferences.
Our approach will take the following steps:
-
Discover
- Identify in-scope systems and applications
- Identify stakeholders/owners and administrators of in-scope systems and applications
- Discover privileged accounts by working with account owners and administrators, and scanning the environment using a suite of discovery tools. -
Design and Develop
- Develop a framework of use cases for privileged accounts
- Map specific use cases to the framework- Design the PAM environment architecture
- Design privileged account management policies and structure
- Develop an integration plan for a PAM solution -
Implement and Onboard
- Deploy the PAM solution
- Test the PAM solution
- Onboard privileged accounts
- Document and enforce the processes/policies associated with accessing privileged accounts
- Rollout PAM solution
- Educate the end users and administrators -
Monitor and Enhance
- Monitor privileged account usage and management controls
- Enhance PAM governance controls
- Develop process automation for the PAM solution
- Analyze events using risk indicators and analyze trends over a period of time- Maintain and enhance PAM solution
- Discover
- Design and Develop
- Implement and Onboard
- Monitor and Enhance
- Identify in-scope systems and applications
- Identify stakeholders/owners and administrators of in-scope systems and applications
- Discover privileged accounts by working with account owners and administrators, and scanning the environment using a suite of discovery tools.
- Develop a framework of use cases for privileged accounts
- Map specific use cases to the framework
- Design the PAM environment architecture
- Design privileged account management policies and structure
- Develop an integration plan for a PAM solution
- Deploy the PAM solution
- Test the PAM solution
- Onboard privileged accounts
- Document and enforce the processes/policies associated with accessing privileged accounts
- Rollout PAM solution
- Educate the end users and administrators
- Monitor privileged account usage and management controls
- Enhance PAM governance controls
- Develop process automation for the PAM solution
- Analyze events using risk indicators and analyze trends over a period of time
- Maintain and enhance PAM solution
Why Deloitte?
Reach out
Please reach out to us to have a quick chat about Privileged Access Management.