Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Use Cases for Governing Privileged Accounts and Business Users

January 19, 2017

  • Blog
  • Archive

When it comes to user access – whether for privileged users or non-privileged business users – you have to answer three questions every time:

  1. Who has access to what?
  2. Is that access appropriate? and
  3. Is that access being used appropriately?

Answering these questions is essential for both IT operational reasons (i.e. responding with agility to everyday joiner-mover-leaver decisions), and compliance purposes (i.e. proving to auditors you have control over all accounts). However, to answer these questions for privileged users you have to coordinate across multiple teams and rely on multiple products which lack basic entitlement integrations or proper segregation of duties controls.

Traditionally, IAM entitlements for privileged users do not provide the granularity of control, nor the detailed tracking, accountability over shared accounts, or restrictive access policies. For shared accounts in particular, IAM solutions typically cannot tell who has access in the first place. These passwords are not shared within the IAM solution, but rather in emails, spreadsheets, etc. This approach adds unnecessary risk and complexity into business processes, which just slows everyone down.

Integrated Identity Governance and Privileged Access Management Use Cases

In November 2016 Gartner published a report, Securing Privileged Accounts Through PAM and IGA Integration, which contains essential guidance on how to enable the integration between these two disciplines; specifically that, “PAM and IGA should be closed-loop in such a way that the PAM system can trigger events, and send them to an IGA system which generates provisioning/de-provisioning events.” There are several use cases where an integrated approach to IGA and PAM can benefit customers. BeyondTrust and SailPoint deliver on these use cases today. Here are a few of the most common use cases showcasing this integration:

Providing a complete picture of who has access to what

BeyondTrust feeds privileged account and entitlement access into SailPoint Identity IQ. This provides an instantaneous, complete view of an individual’s access, both privileged and non-privileged. This helps the business definitively answer the question, Who has access to what?

Automated attestation of privileged access

BeyondTrust can provide the account and entitlement data necessary for granular privileged access reviews. Changes in user access can automatically trigger reviews of privileged access. Access certifications managed through SailPoint can easily incorporate this data for 360-degree governance, allowing the business to ensure that access is appropriate.

Automated access policy enforcement of privileged access

BeyondTrust feeds privileged account and entitlement access into SailPoint. User access policies created and enforced through SailPoint can help ensure that privileged access is appropriate.

Complete role-based lifecycle support

SailPoint can be used to mine or explicitly create Roles that include privileged user access with BeyondTrust supporting privileged user accounts and entitlements. This allows for top-down/bottom-up Role-Based Lifecycle Management for both non-privilege and privilege access.

Automated user lifecycle management of privileged access

Together, BeyondTrust and SailPoint provide automated user lifecycle management, allowing for on-going, automated control of privileged access. This ensures that end-user privilege access meets an organization’s policy requirements defined within SailPoint, while BeyondTrust provides the granular visibility and control.

Reporting on privilege user activity

BeyondTrust provides complete reporting on all privileged user activity allowing an auditor to quickly review and prove that privileged user access is being used appropriately. See the screenshot below.

Who benefits from better integration between IAM and PAM?

Multiple stakeholders in an organization can benefit from this level of IAM and PAM integration, namely:

IT Administration

  • Less complexity in provisioning/de-provisioning processes
  • Faster to produce audit reports with fewer consoles and rules to manage
  • Complete visibility into and automation of privileged access

Audit

  • More accurate and timely reporting of entitlements across the organization
  • Consistent and repeatable processes

Business

  • Less access-related risk by ensuring access is appropriate and being used appropriately
  • Greater business agility by empowering lines of business

Benefits of a Best of Breed Approach

A few IAM vendors also offer PAM capabilities, but with little demonstrable integration. Selecting a single vendor to provide both functions might deliver broad, but not deep, capabilities, a larger footprint requiring customization, and could result in vendor lock-in. From our perspective, a best of breed approach is preferable. That’s why we have partnered with SailPoint – to deliver a unified view for visibility and control of all users, privileged or non-privileged.

For more on how our IGA-PAM integration can benefit your organization, check out the BeyondTrust-SailPoint integration brief and compare the benefits with what Gartner identifies in the report I mentioned above.

Gartner. Securing Privileged Accounts Through PAM and IGA Integration Published: 16 November 2016 ID: G00311307

Morey J. Haber

Chief Technology Officer and Chief Information Security Officer at BeyondTrust

Morey J. Haber is Chief Technology Officer and Chief Information Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four Apress books: Privileged Attack Vectors (2 Editions), Asset Attack Vectors, and Identity Attack Vectors. In 2018, Bomgar acquired BeyondTrust and retained the BeyondTrust name. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. Morey currently oversees BeyondTrust strategy for privileged access management and remote access solutions. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

Webcasts

Welcome to 2021: A BeyondTrust Global Partner Update

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.