NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Where to Begin? A 7-Step Strategy to Achieving Complete Privileged Access Management

October 3, 2017

  • Blog
  • Archive

Customers in the throes of deploying their privileged access management solutions often ask us, “What’s next?” Whether it is a greenfield deployment, an expanding BeyondTrust footprint or a competitive switch-out, having a plan – a target end state – is essential. If the old maxim, “A failure to plan is a plan to fail” is true, then you must begin every privileged account management project with the end in mind. The end state should be a mature environment that enables:

  • Uniform, streamlined PAM system
  • Visibility across the environment (analytics on who does what) regardless of platform
  • Firm foundation, regardless of which platform users are coming from (application, operating system or database)

In our 25+ years in the business, we’ve devised the following 7-step strategy to achieving complete privileged access management. This process minimizes costs and distractions, and speeds results.

Step 1: Improve Accountability and Control Over Privileged Passwords

The most logical starting point for gaining greater control over privileges is by improving accountability over privileged passwords. Not effectively managing shared accounts is a problem that has significant scale and risks. Consider the results of our recent survey, The 5 Deadly Sins of Privileged Access Management. The results clearly revealed a problem in managing privileged passwords. When asked to list the top threats associated with passwords, respondents listed employees sharing passwords with colleagues (79%), employees not changing default passwords their devices ship with (76%), and using weak passwords like "12345" (75%). Despite knowing better, respondents admitted that many of these same bad practices are common within their organization. A third of the respondents reported that users routinely share passwords with each other, and a fourth reported the use of weak passwords. Shockingly, one in five reported that many users don’t even change the default passwords!

You don’t have to look much further than recent breaches to understand the implications. With this capability organizations can discover all of the accounts in their environment, place those accounts under management, and satisfy auditor requests that accounts are now managed.

Step 2: Implement Privilege Management and Application Control for Windows and Mac Desktops

Once accounts and assets have been discovered and are being consistently managed, the next step to complete privileged account management is implementing least privilege on end-user machines. We recommend reducing risk on desktops before servers (such as Windows, Unix or Linux as indicated in step 4) as the endpoint is typically the first mile of security. Why? Look no further than a recent stat that said that 94% of Microsoft system vulnerabilities could have been mitigated by reducing privileges.

Step 3: Leverage Application-Level Risk to Make Better Privilege Decisions

Now that shared credentials are under management and end users have the privileges they need to perform their jobs – and nothing more – you can move to a better understanding of vulnerabilities to help make better-informed privilege elevation decisions. Vulnerability-based application management is patented technology that automatically scans applications for vulnerabilities at run time – triggering alerts, reducing application privileges, or preventing launch altogether based on policy.

Step 4: Implement Privilege Management in Unix and Linux Server Environments

Business critical, tier-1 applications are attractive targets for adversaries. Accessing privileged user credentials for these resources can provide access to ecommerce data, ERP systems managing employee data, customer information, and sensitive financial data. With the capability to efficiently delegate Unix and Linux privileges and authorization without disclosing passwords for root or other accounts, you gain complete control over root access to Unix and Linux systems and get rid of sudo.

Wait. Get rid of sudo? Yep. Remember that 5 Deadly Sins survey we mentioned above, in step 1? Privileged passwords weren’t the only perceived weakness. Two-thirds of respondents say managing least privilege for Unix/Linux servers is somewhat to extremely important. One popular option is sudo. However, just 29 percent say sudo meets their needs. The most commonly cited problems with sudo include being time-consuming to use (32%), complexity (31%), and poor version control (29%). Despite this, the typical respondent runs sudo on 40 workstations and 25 servers. It just doesn’t do the job, folks.

Step 5: Unify Management, Policy, Reporting and Threat Analytics Under a Single Pane of Glass

It is no secret that IT and security professionals are overloaded with privilege, vulnerability and attack information. By unifying privileged account management and vulnerability management solutions, you can provide IT and security teams a single, contextual lens through which to view and address user and asset risk.

Step 6: Integrate Unix, Linux and Mac into Windows

Think back to step 4 for a moment. Once you have greater control over privileged access in Unix and Linux environments, the next logical step is to bring Unix and Linux systems under consistent management, policy, and single sign-on. This capability will enable simplified configuration management and policy for non-Windows systems, limit the number of logins required, and will help improve security and the user experience.

Step 7: Real-Time Change Auditing and Recovery for Windows Environments

Once you have your non-Windows systems integrated into Active Directory, the next step is to audit user activity to gain additional insight into AD changes that could impact the business. With this capability, you gain detailed, real-time auditing of AD environments, and the ability to restore unwanted changes.

BeyondTrust has defined what a complete privileged account management solution looks like, creating a holistic program and tying it all together with the PowerBroker Privileged Access Management platform. To realize the full benefit of BeyondTrust’s privileged access management solutions, utilize the platform, and then take control of accounts, assets, users, systems and activity.

If you would like to learn more on how to construct your complete privileged access management strategy, contact us today for a strategy session.

Photograph of Scott Lang

Scott Lang, Sr. Director, Product Marketing at BeyondTrust

Scott Lang has nearly 20 years of experience in technology product marketing, currently guiding the product marketing strategy for BeyondTrust’s privileged account management solutions and vulnerability management solutions. Prior to joining BeyondTrust, Scott was director of security solution marketing at Dell, formerly Quest Software, where he was responsible for global security campaigns, product marketing for identity and access management and Windows server management.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.