- Should their daily permissions have been revoked when the departure was announced?
- Should critical permissions have been tapered off such that this problem could not have occurred?
- Should the employee have deleted President Trump’s Twitter account altogether in lieu of suspending it?
How the Integration of IAM and PAM Can HelpWe have seen this type of problem before. Privileged access management (PAM) solutions are designed to complement IAM by enabling the concept of least privilege to be layered on traditional security models and entitlements. The disgruntled employee may have to go through a workflow to suspend an account, but in a PAM use case, their permissions alone are not sufficient enough to do so. In addition, all privileged activity can be captured such that an occurrence like this is fully traceable to the source. In this case, the event was obvious but if Twitter was attacked, and other privileged accounts compromised, finding the source for the malicious activity that lead to key Twitter accounts being suspended may not have been as obvious. This is why IAM and PAM together are critical to protect against insider threats like this in the future. How are you controlling access to your most privileged accounts? And, what deprovisioning processes do you have in place to prevent something like this from happening? If you can’t answer those questions, contact us today.
Morey J. Haber, Chief Security Officer at BeyondTrust
Morey J. Haber is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored three books: Privileged Attack Vectors, Asset Attack Vectors, and Identity Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.