Privileged access will always appeal to cyber attackers because of the access rights associated with these accounts. Despite significant investments in Privileged Access Management (PAM) technologies, privileged accounts are still massively overexposed. Traditional PAM providers have focused on controlling access to accounts and their passwords, not on the activities that need to be performed.
Many PAM vendors and their deployments require a password vault, choosing to focus on controlling access to privileged accounts via rotating and vaulting passwords. The problem is those accounts still pose a threat because of their standing privileges. Among the new enhancements, Stealthbits Privileged Activity Manager (SbPAM) 1.3 provides unique ephemeral (another word for “temporary” or “momentary”) accounts used for privileged activities but disabled and stripped of permissions when not in use. This just-in-time and just-enough-privilege approach ensures no standing privileged accounts and removes them as viable attack vectors. Of course, vaults are complex and require continual care, SbPAM can certainly work with them but it’s no longer a requirement.
SbPAM 1.3 gives you the control to require sign-off before an activity or task is performed. Want to add new users, deploy a new server, and/or re-configure varying setting, SbPAM can optionally require tiered approvals before granting the right to perform the activity. This approval workflow not only keeps managers, business owners, and/or application owners aware of administrative activities, but gives them the power to approve or deny who, what, and when.
With many products that govern access via policy, lack of granular access often forces a need to create many policies to support edge cases. SbPAM 1.3 saves time and effort with Connection Profiles that allow reusable configurations to be applied to many access policies. Connection profile changes are applied globally and automatically and include session parameters such as maximum session time, proxy settings, and approval workflows.
Regardless if you’re looking to improve administrator accountability or need evidence during an incident investigation, SbPAM 1.3 provides the ability to record and playback sessions for definitive proof of what actually transpired during a particular session. Save time from combing through logs and re-tracing undocumented steps, by fast-forwarding through videos that are time, task, and administrator specific. SbPAM provides policy-controlled recordings, so organizations can ensure they record the activities and people that matter most.
Stealthbits Privileged Activity Manager (SbPAM) blazes a new path toward privilege access management by focusing on the activity, not the administrator. Privileged rights and accounts are granted temporarily, just when needed, then removed when not in use. This just-in-time, just-enough-privilege reduces your attack surface and better protects against access most sought by those looking to exploit systems and information.
To learn more about Stealthbits Privileged Activity Manager, visit https://www.stealthbits.com/stealthbits-privileged-activity-manager-pam-product.
Damon is the Director of Product Marketing at Stealthbits responsible for Active Directory and Privileged Access Management solutions. He has over 20 years of experience addressing marketing challenges of all kinds for many notable, B2B software companies, including Red Hat, Quest Software, Sterling Commerce, and most recently SecureAuth. Damon has a passion for cybersecurity software and improving the defenses of organizations against cyber-attacks. Damon resides in Columbus, Ohio.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply