Privilege Management Cloud Security

Public. For Information Purposes Only.

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end user support experience.

BeyondTrust Overview

BeyondTrust helps organizations meet security and compliance needs while easing operational burdens through a more productive workforce through its Endpoint Privilege Management solutions.

To determine the effect of endpoint privilege management solutions in the fight against cyber attacks, consider the underlying security principle of least privilege. Having local administrator rights means a user has privileges to perform most, if not all, functions within an operating system on a computer. These privileges can include such tasks as installing software and hardware drivers, changing system settings, installing system updates, creating user accounts, and changing their passwords. While many organizations assign local admin rights to ease the need for IT Support, they are leaving themselves at high risk of a security breach. A common approach to managing privileged user accounts, the least privilege model is the practice of assigning users and programs the least amount of permission required to complete specific tasks.

The least privileged approach was conceived over 40 years ago and remains the fundamental security measure for organizations looking to mitigate the growing number of malicious attacks. This is primarily achieved by removing local admin rights from users. Least privilege works most effectively when combined with the concept of application allowlisting. Allowlisting is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. The goal of allowlisting is to protect computers and networks from potentially harmful applications. An efficient solution sets a handful of broad rules based on trusted application types, automatically stopping unapproved applications from running. The integration of these two approaches is where endpoint privilege management comes into force. Methods of achieving least privilege have evolved somewhat since the concept’s inception, as users look for ways to implement best practices, and make deployment easier than ever and deliver rapid time-to-value. As such, it is now possible to take significant steps towards a least privilege environment via software-as-a-service (SaaS) based solutions, which delivers all of the above benefits from the cloud as a subscription model.

Architecture of Privilege Management Cloud


Summary of Privilege Management Cloud architecture, as hosted within Microsoft Azure data centers.

PM Cloud Architecture Diagram

Physical Security

For more information, please see the section Physical Security in Azure facilities, premises, and physical security.

Network Security

All Privilege Management Cloud instances are running within an Azure virtual network (VNet) with firewall rules applied at the VNet level. No direct database access is available from outside the instance, with internal access locked down to allow connections only from the cluster subnet, which includes the Jump Client used for support purposes. Port 22 is open to support for shell jump access (restricted to a single BeyondTrust IP address).

Access to the Azure Management Console where the network/VNet configuration is managed is also highly restricted within BeyondTrust, available only to those who have a requirement to be able to access the console. This access is also subject to MFA.

Customer Data

All customer data is confined to a dedicated instance of Privilege Management Cloud allocated to your organization. The data physically and logically resides in a single tenant instance and is not shared between customers.