Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Where to begin? A 7-step strategy to achieving complete privileged account management

August 19, 2015

  • Blog
  • Archive
Customers in the throes of deploying their privileged account management solutions often ask us, “What’s next?” Whether it is a greenfield deployment, an expanding BeyondTrust footprint or a competitive switch-out, having a plan – a target end state – is essential. If the old maxim, “A failure to plan is a plan to fail” is true, then you must begin every privileged account management project with the end in mind. The end state should be a mature environment that enables:
  • Uniform, streamlined PAM system (central repository)
  • Visibility across the environment (analytics on who does what) regardless of platform
  • Firm foundation, regardless of which platform users are coming from (application, operating system or database)
In our 30 years in the business, we’ve devised the following 7-step strategy to achieving complete privileged account management. This process minimizes costs and distractions, and speeds results. Read below for more... Privileged-Account-ManagementStep 1: Improve accountability and control over privileged passwords The most logical starting point for gaining greater control over privileges is by improving accountability over privileged passwords. Not effectively managing shared accounts is a problem that has significant scale and risks. You don’t have to look much further than recent breaches to understand the implications. With this capability organizations can discover all of the accounts in their environment, place those accounts under management, and satisfy auditor requests that accounts are now managed. Step 2: Implement least privilege and application control for Windows & Mac desktops Once accounts and assets have been discovered and are being consistently managed, the next step to complete privileged account management is implementing least privilege on end-user machines. We recommend reducing risk on desktops before servers (such as Windows, Unix or Linux as indicated in step 4) as the endpoint is typically the last mile of security. Step 3: Leverage application-level risk to make better privilege decisions Now that shared credentials are under management and end users have the privileges they need to perform their jobs – and nothing more – you can move to a better understanding of vulnerabilities to help make better-informed privilege elevation decisions. Vulnerability-based application management is patented technology that automatically scans applications for vulnerabilities at run time – triggering alerts, reducing application privileges, or preventing launch altogether based on policy. Step 4: Implement least privilege in Unix and Linux environments Business critical, tier-1 applications are attractive targets for adversaries. Accessing privileged user credentials for these resources can provide access to ecommerce data, ERP systems managing employee data, customer information, and sensitive financial data. With the capability to efficiently delegate Unix and Linux privileges and authorization without disclosing passwords for root or other accounts, you gain complete control over root access to Unix and Linux systems and get the most out of sudo. Step 5: Unify management, policy, reporting and threat analytics under a single pane of glass It is no secret that IT and security professionals are overloaded with privilege, vulnerability and attack information. By unifying privileged account management and vulnerability management solutions, you can provide IT and security teams a single, contextual lens through which to view and address user and asset risk. Step 6: Integrate Unix, Linux and Mac into Windows Think back to step 4 for a moment. Once you have greater control over privileged access in Unix and Linux environments, the next logical step is to bring Unix and Linux systems under consistent management, policy, and single sign-on. This capability will enable simplified configuration management and policy for non-Windows systems, and will help improve security and the user experience. Step 7: Real-time change auditing and recovery for Windows environments Once you have your non-Windows systems integrated into Active Directory, the next step is to audit user activity to gain additional insight into AD changes that could impact the business. With this capability, you gain detailed, real-time auditing of AD environments, and the ability to restore unwanted changes. BeyondTrust has defined what a complete privileged account management solution looks like, creating a holistic program and tying it all together with BeyondInsight. To realize the full benefit of BeyondTrust’s privileged account management solutions, utilize the BeyondInsight IT Risk Management platform, and then take control of accounts, assets, users, systems and activity. If you would like to learn more on how to construct your complete privileged account management strategy, check out our solution whitepaper or contact us today. Author: Scott Lang | Sr. Director, Product Marketing
Photograph of Scott Lang

Scott Lang, Sr. Director, Product Marketing at BeyondTrust

Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Qatar National Information Assurance Policy v2.0

Whitepapers

KuppingerCole Executive Review - BeyondTrust Endpoint Privilege Management

Webcasts

Tech Talk Tuesday: Managing Vendor Access

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.