With the need to protect critical information and access, many advances in cybersecurity have taken place.  The conventional approach to keeping data secure has been to restrict who has access, only giving sensitive information and authority to a select few.  With this, comes Privileged Access Management, or PAM for short.  The concept of PAM is that users who are given “Privileged Access, have access to critical systems, and often root level access which allows them to take full control of the machine or device they are connecting with.  This approach to security makes sense, simply monitor who has privileged access, and safeguard any form of access with vigilance.

However, controls and safeguards from traditional PAM vendors require the use of digital vaults to centrally store and manage credentials.  This approach, while effective for static data centers, creates a burden for more dynamic computing environments in numerous ways.  First, securing access credentials in any capacity will drastically increase the chances of a breach, whether or note these credentials are stored in a vault or written on a piece of paper.  Verifying recipients, distributing them, and monitoring usage also costs organizations valuable time and money.  Static credentials like passwords pose a looming threat, and the potential danger they pose to an organizations security cannot be overstated.  Legacy Vaulting approaches can become an immense liability in a matter of seconds.

Instead, a dynamic and adaptive approach to PAM is needed.  This technology should operate without any permanent access credentials, but instead, create temporary credentials on demand to grant access.  These credentials would expire at an adjustable time, completely eliminating the need to change and rotate static passwords.  Additionally, a solution is needed that does not use vaults, simply creating credentials as needed, then terminating them after a set point.  Most importantly, a solution that would require no additional software to operate with individual servers would allow for a seamless experience for the end user.

SSH (Secure Shell) communication security has identified these inefficiencies and created a solution.  PrivX On-Demand Access Manager is the next generation of PAM technology and deserves a closer look.

 

Leave a Reply