DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

Related

  • Constructing Secure and Strong Data Access Layers With JPA
  • How Backdoor Attacks Facilitate Data Poisoning in Machine Learning
  • Data Privacy From a Data Governance Standpoint
  • The Role of Kubernetes in Data Privacy and Protection

Trending

  • Explore the Complete Guide to Various Internet of Things (IoT) Protocols
  • Unlocking Potential With Mobile App Performance Testing
  • Maintain Chat History in Generative AI Apps With Valkey
  • Packages for Store Routines in MariaDB 11.4
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Don’t Rely Solely on Privileged Access Management (PAM) To Secure Your Accounts

Don’t Rely Solely on Privileged Access Management (PAM) To Secure Your Accounts

The only way to protect against privileged account access attack is to ensure that only authorized users gain access to privileged accounts.

By 
Guy Eisdorfer user avatar
Guy Eisdorfer
·
Mar. 14, 23 · Opinion
Like (1)
Save
Tweet
Share
1.6K Views

Join the DZone community and get the full member experience.

Join For Free

Imagine burglars have stolen the keys to your home, which they then use to get inside and take whatever they want without being detected. A privileged account access breach is a bit like this. Cybercriminals can gain access to a privileged account from which they can steal confidential information and disrupt the normal operations of your business. 

The only way to protect against this type of attack is to ensure that only authorized users gain access to privileged accounts. And while Privileged Access Management (PAM) can help reduce risks, it also provides security teams with a false sense of security.

The Limitations of PAM

There are two types of privileged accounts: administrative privileged accounts and data-privileged accounts. Administrative privileged accounts have elevated access privileges, such as administrative accounts, root accounts, or service accounts. By contrast, data-privileged accounts only have access to sensitive data and information that relates to the user’s job role, such as an HR manager who can only access employee data or a finance manager who can only access financial information.

The issue with PAM is that typically it only protects administrative privileged accounts. This leaves an enormous security hole with data-privileged accounts, which remain under-protected and vulnerable to attackers. 

For example, the graphic with the code below details how to find administrative privileged accounts that don't have multifactor authentication enabled for protection in Azure Active Directory, accounts that may be vulnerable. The problem is this method only helps you discover administrative privileged accounts and, again, does nothing to protect data-privileged accounts.

Detect Unprotected Administrative Privileged Accounts

# Import PowerShell Module 

Import-Module AzureAD 


# Connect to Azure AD 

Connect-AzureAD 


# Get all Azure AD 

users $users = Get-AzureADUser 


# Get Admin users that don't have MFA applied

$nonMfaAdmins = $users | Where-Object { ($_.StrongAuthenticationMethods -eq $null) -and ($_.IsAdmin -eq $true) }


# Display results

$nonMfaAdmins | Select-Object DisplayName, StrongAuthenticationMethods

If we continue with the analogy of your house keys, while PAM may keep your front door safe, it doesn’t protect your windows or basement. What’s more, some estimates suggest that for every administrative privileged account, there are 25 data-privileged accounts, so PAM leaves many more privileged access accounts vulnerable than protected. If you had a firewall that only blocked a minority of attacks, you would consider it broken.   

One of the major vulnerabilities of data-privileged accounts is that they often fall outside of an organization’s MFA policy. Security teams will often only require MFA on administrative privileged accounts, as they may be unaware of the true extent of data-privileged accounts within their organization and what these user accounts have access to. What’s more, given the negative pushback from users that many security teams get when mandating MFA, this can add extra incentive to only protect the small number of administrative privileged accounts within an organization.

How To Solve These Limitations

The problem that many security teams face is that it’s difficult to keep track of every data-privileged account and what these accounts have access to. And the bigger the organization, the harder the task becomes. You then need to add into the equation changes in job roles, employee off-boarding, and numerous other day-to-day business activities that impact user access requirements, and it becomes impossible to monitor manually. 

The code below for Azure Active Directory allows you to find all accounts that are not protected by multifactor authentication and, therefore, may be more vulnerable to attack. It's just as important to protect these accounts as admin accounts since some might be data-privileged.

Detect Unprotected Accounts

# Import PowerShell Module 

Import-Module AzureAD 


# Connect to Azure AD 

Connect-AzureAD 


# Get all Azure AD 

users $users = Get-AzureADUser 


# Get users that didn't apply their MFA

$nonMfaUsers = $users | Where-Object { ($_.StrongAuthenticationMethods -eq $null) } 


# Display Non-MFA Users

$nonMfaUsers | Select-Object DisplayName, StrongAuthenticationMethods

However, with advancements in AI tools, it’s now possible to classify and map an organization's confidential data in motion and use it to autonomously detect data-privileged accounts. Regularly scanning for these accounts can then become part of an organization’s routine security processes. 

Once an organization has oversight of every privileged access account, both administrative and data-privileged accounts, it can then start devising and implementing a strategy that closes down existing vulnerabilities. The first place to start with this is to mandate MFA across all data-privileged accounts and educate these users as to why this is necessary. 

Also, once an organization has oversight of all data-privileged accounts, periodic reviews can be carried out at the departmental level, where line managers review the access levels of each of their team members. Often, employees will have the wrong level of access for their job role as they move around an organization, so AI-powered privileged account analysis combined with human reviews can solve this business problem. 

What’s more, many organizations' offboarding processes are inefficient, meaning ex-employees still have access to their data-privileged accounts long after they leave. Again, regular scanning and identification of these accounts will help to identify these vulnerabilities, so security teams are not put at risk by other internal departments not following the correct procedures when employees leave an organization.    

To finish with our analogy, by combining PAM with AI-powered data-privileged account detection and classification, you’re not only protecting your front door from unauthorized access, but you’re also securing all other entry points into the organization. 

By Guy Eisdorfer, the co-founder and CEO of Cognni, a leading AI-powered data classification company that provides automated information security risk assessments, privileged account monitoring, and other security products to enterprises and SMBs.    

security Data access Data security

Opinions expressed by DZone contributors are their own.

Related

  • Constructing Secure and Strong Data Access Layers With JPA
  • How Backdoor Attacks Facilitate Data Poisoning in Machine Learning
  • Data Privacy From a Data Governance Standpoint
  • The Role of Kubernetes in Data Privacy and Protection

Partner Resources


Comments

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: