Managing privileged access in a complex IT environment requires a deep understanding of the roles and responsibilities across different teams. This becomes particularly challenging when various operational groups use distinct service accounts, from root for UNIX systems and local administrators for Windows to specialized privileged service accounts. Here’s a detailed guide on managing these complexities to ensure robust Privileged Access Management (PAM).
Documenting the Core Elements of Your Organizational Structure
To build an effective PAM program, it is essential to document the relationship between various IT assets, including systems, accounts, applications, and processes. This documentation should cover the entire enterprise, taking into account global and regional scopes, and ensuring no critical elements are overlooked.
For example, if your global Windows admin team manages systems, a regional scope focusing solely on Windows servers might be easier to control. However, it is crucial not to exclude any significant components, such as heavy system account usage by applications, which could undermine your PAM efforts.
Understanding Use Case
Effective PAM begins with understanding the use cases of different accounts. This information comes from various data sources and requires thorough analysis. For instance, accounts named "username_adm" suggest they are alternate administrative accounts owned by the username. Similarly, an account called "App_X4T5" may be linked to a specific application, with details found in your Configuration Management Database (CMDB).
Consider an account named "SVCbackup" that is a member of the local administrators group across many servers. Instead of assigning ownership based on server proximity, it should be owned by the Infrastructure team responsible for backup functions. This clarity in ownership is vital for managing access effectively.
Reporting on Security Issues
Once privileged access is documented and ownership is established, the next step is to measure risk and identify security issues. Scanning source systems and inventorying privileged accounts allow IT to focus on accounts with the highest reach first. This prioritization helps in starting remediation efforts where they can have the most significant impact, reducing risks promptly.
Knowing What to Certify
Certification of accounts is as crucial as identifying ownership. Asset owners (whether account, server, or application owners) are best positioned to determine which accounts should be onboarded into a password vaulting solution and who needs access. The certification process begins by confirming ownership: “Are you the owner?” If the response is negative, the solution should facilitate proposing a new owner or providing additional valuable information.
Pruning Access
With visibility into access and ownership, the next step is to remediate unnecessary accounts. Removing stale and unused accounts reduces risk with minimal impact on end-users. This involves identifying each account’s most recent log-on date (stale date) and systematically removing accounts defined as stale.
An effective workflow application should integrate with a change management solution. This involves three steps:
- Identify unnecessary accounts.
- Submit a change request to remove access.
- Remove the privileges and access from the endpoint.
A successful and compliant PAM strategy will continuously pull together required reporting, analysis, and certification. It ensures unmanaged accounts are identified, access is pruned regularly, and key risk indicators are available for IT management review.
Conclusion
Managing privileged access in a complex IT environment demands a comprehensive approach that includes documenting your organizational structure, understanding use cases, and implementing robust certification and pruning processes. By addressing these elements, you can build a resilient PAM program that mitigates risks and ensures secure and efficient access management.