A security discipline that manages and controls access to sensitive systems and data by non-human identities.
Description
Privileged Access Management (PAM) refers to the processes and tools used to secure, control, and monitor access to critical systems and sensitive information by non-human identities (NHIs), such as service accounts, applications, and automated scripts. NHIs often require elevated privileges to perform their functions, which creates potential security risks if not properly managed. PAM solutions typically involve the use of password vaults, session monitoring, and access policies to ensure that NHIs have only the necessary permissions to perform their tasks while minimizing the risk of unauthorized access or data breaches. Additionally, PAM helps organizations achieve compliance with various regulatory standards by enforcing strict control measures and maintaining an audit trail of privileged access activities. By implementing PAM strategies, businesses can significantly reduce the attack surface associated with NHIs and better protect their critical assets from both external threats and insider misuse.
Examples
- Using a vault to store and manage credentials for non-human identities like automated scripts.
- Implementing session recording for NHIs to monitor their actions and ensure compliance.
Additional Information
- PAM solutions often integrate with identity and access management (IAM) systems.
- Effective PAM can mitigate risks associated with credential theft and misuse.
References
- Non-human Account Management (v4)
- Managing Non-Human Identities for Vendor Access and Least Privilege Application Management Managing Non-Human Identities for Vendor Access and Least Privilege Application Management
- 9 Privileged Access Management Best Practices
- What is Privileged Access Management (PAM)?
- Privileged Access Management
- Human vs. Non-Human Identity in SaaS
- Privileged Account Management for the Financial Services Sector | NCCoE
- Privileged Account Management (PAM)
- Articles
- Why is Privileged Access Management important?