Identity Management

Privileged Access Management

Worried about insider threats with common root/administrator account in your organisation. Not sure about the various types of privileged accounts, want to improve system administration/governance?

Challenges

Privileged accounts are by definition high risk accounts. Ensure they are discovered, owned, password protected and monitored.

  • Administrators accessing shared privileged accounts: Control and limit the use of these privileged accounts for daily use. Achieve accountability and non-repudiation for the administrators accessing shared privileged accounts.

  • Achieve accountability and non-repudiation for the administrators accessing shared privileged accounts: A PAM solution can facilitate the session monitoring, audit recording for accountability, and non-repudiation.

  • Reduce the risk of sabotage by internal threats and achieve accountability: A PAM solution can change the password frequently based on the enterprise password policy.

  • Administrators need ad-hoc privileged access: A PAM solution can provide workflow capabilities for approval of access requests requiring elevation of access.

Our approach

Our approach towards Privileged Access Management is designed to rapidly reduce security risks while minimising operational risk.

Our expertise and experience in PAM have established us as leaders in the field. Our leadership in the overall IAM allows us to deliver a comprehensive approach throughout the development of PAM solution. We have partnered with the elite PAM vendors to provide a unified approach regardless of the complexity or vendor preferences.

Our approach will take the following steps:

  1. Discover

    - Identify in-scope systems and applications

    - Identify stakeholders/owners and administrators of in-scope systems and applications

    - Discover privileged accounts by working with account owners and administrators, and scanning the environment using a suite of discovery tools.

  2. Design and Develop

    - Develop a framework of use cases for privileged accounts

    - Map specific use cases to the framework

    - Design the PAM environment architecture

    - Design privileged account management policies and structure

    - Develop an integration plan for a PAM solution

  3. Implement and Onboard

    - Deploy the PAM solution


    - Test the PAM solution


    - Onboard privileged accounts


    - Document and enforce the processes/policies associated with accessing privileged accounts


    - Rollout PAM solution


    - Educate the end users and administrators

  4. Monitor and Enhance

    - Monitor privileged account usage and management controls


    - Enhance PAM governance controls


    - Develop process automation for the PAM solution


    - Analyze events using risk indicators and analyze trends over a period of time

    - Maintain and enhance PAM solution

  1. Discover
  2. Design and Develop
  3. Implement and Onboard
  4. Monitor and Enhance

- Identify in-scope systems and applications

- Identify stakeholders/owners and administrators of in-scope systems and applications

- Discover privileged accounts by working with account owners and administrators, and scanning the environment using a suite of discovery tools.

- Develop a framework of use cases for privileged accounts

- Map specific use cases to the framework

- Design the PAM environment architecture

- Design privileged account management policies and structure

- Develop an integration plan for a PAM solution

- Deploy the PAM solution


- Test the PAM solution


- Onboard privileged accounts


- Document and enforce the processes/policies associated with accessing privileged accounts


- Rollout PAM solution


- Educate the end users and administrators

- Monitor privileged account usage and management controls


- Enhance PAM governance controls


- Develop process automation for the PAM solution


- Analyze events using risk indicators and analyze trends over a period of time

- Maintain and enhance PAM solution

Why Deloitte?

Awarded market leaders

We strive to continuously lead the market in the area of cyber risk and security services. We are awarded and acknowledged by some of the most renowned institutions within the area of cyber, e.g. Gartner, ALM Intelligence and Forrester. In 2020, we were named global leader in Security Consulting Services for the 9th year in a row by Gartner.

Leading-edge technologies

We are committed to investing in innovation and emerging technologies to ensure that we are equipped with the latest tools to solve current and future challenges for our clients. Alliances with market-leading cyber vendors and groundbreaking startups around the world offer our clients access to a wide range of cyber-risk technologies and leading-edge technology innovation.

Global intelligence delivered locally

We have the largest professional services network in the world. Diversity across our cyber teams helps us work across the globe with a local and personal lens. We have over 8,600 dedicated cyber-risk service practitioners of which 1,300 are dedicated to Europe and the Middle East alone, ready to help our clients everywhere with any challenge.

End-to-end cyber-risk services

We cover every aspect of cyber risk — from advisory and implementation of strategic transformations to managed security services, product solutions and incident management. This enables us to deliver more resilient and silo-breaking solutions, taking the whole business chain into account. This helps our clients to leverage their potential and growth even more.

Reach out

Please reach out to us to have a quick chat about Privileged Access Management.

Johnny Shin

Partner

Annant Gujral

Senior Manager