Privileged Access Management

Privileged access management is a strategy used by enterprises to secure privileged employee access to systems and confidential information. It differs from IAM identity and access management in its focus on only privileged access accounts. These are higher-level than ordinary user logins and accounts, which IAM manages. Privileged access refers to the specific rights of users in an organization to access important systems or accounts.

Privileged access management operates from the principle of least privilege, a business standard that limits account access to employees dependent on the minimum access they need to perform their regular duties. It also assumes, accurately, that hackers and unauthorized parties often achieve access control through privileged accounts. One study revealed that of the sampled companies that suffered a data breach, 74 percent noticed a connection between the breach and misused privileged access.

Managing privileged access, then, is paramount to maintaining corporate security and confidentiality. Passwords, high-level IT accounts, and encryption keys are just a few examples of privileged access items that should be protected. Multiple privileged access accounts exist in an organization. Just a few of them are listed here:

  • Privileged user accounts: accounts which only one particular user may access, such as an email, application, or device
  • Domain administrative accounts: accounts that allow authorized users to change and add users to company applications and systems
  • Application accounts: accounts that can access company applications and edit or connect them

Privileged access management (frequently abbreviated as PAM) is one of the main methods of protecting company systems and data. Strictly controlling user permissions promotes better accountability within the company. It’s also becoming required more frequently, as governing bodies are beginning to place regulations for privileged access on companies. Complying with these data privacy regulations may mean that organizations are required to implement a privileged access management strategy. Strongly managing passwords and keeping accounts locked unless absolutely necessary are two primary elements of PAM. Implementing PAM software to manage and automate some of the security processes can also help organizations better monitor their privileged access.






Jenna Phipps
Jenna Phipps is a contributor for websites such as Webopedia.com and Enterprise Storage Forum. She writes about information technology security, networking, and data storage. Jenna lives in Nashville, TN.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand today's texting lingo. Includes Top...

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Eventbrite

  Eventbrite is an online event posting, event management, and ticketing website. Eventbrite can...

Docker

Docker is an open-source platform used for developing and running applications by allowing...

Blockchain

Blockchain is one of the core technologies behind cryptocurrency. Blockchain is a system...