A complete view on all Identities – Privileged Users And Regular Users

A complete view on all Identities – Privileged Users And Regular Users

Historically in IT departments, privileged users and regular users have been managed under separate silos. The question is, how did this division evolve? Perhaps the simplest answer is that managing user accounts was the early focus of Identity and Access Management (IAM). And IAM was long considered an IT efficiency effort. Managing privileged identities, however, has mostly been seen as a security focused initiative.

Over time IAM branched out to encompass single sign on, identity lifecycle management and authorization. IAM graduated to IGA – Identity Governance and Administration, especially as auditors increased their focus on IT access controls in regulated industries. As it did so, IAM moved closer to security and further from its IT efficiency roots. However, the gulf between IAM/IGA and Privileged Access Management (PAM) remained.

IGA still lacked visibility into privileged accounts. PAM still had no view into user provisioning and governance. The problem is, managing privileged users and auditing their access is not optional in the modern enterprise. Part of the reason is regulatory compliance requirements that stipulate documented access control for privileged users. Just as importantly, though, is the spate of major data breaches we’ve all read so much about recently. Many of these breaches occurred due to the misuse of privileged access.

For evidence of this privileged access security problem, consider the recent Verizon Data Breach Investigations Report. According to the report, insider and privileged misuse is the second most common cause of data breaches – 16% of the total.

Privileged credentials are a primary target of cyber attacks. They allow hackers, or malicious insiders, to move anonymously from system to system, accessing and stealing private data at will. And these privileged credentials are not managed by IAM or IGA products.

Managing and governing end user access separately from privileged access opens organizations up to unnecessary risk. The silo approach creates security gaps and deprives organizations of a complete view of identity context for access-related decisions.

Integrating Privileged Users and Regular Users Under Identity Governance

Fortunately the evolution from IAM to IGA isn’t over yet. Product integrations exist today between PAM and IGA solutions that eliminate silos in enterprise identity management.

At CA Technologies we maintain a closed-loop. This helps organizations manage, control and enforce both privileged and regular user access to applications, systems and data across the enterprise – on premises and in the cloud – in a single unified platform.

IT groups have visibility into all identities under one holistic identity governance platform, making it easier to:

  • Gain visibility into privileged access
  • Identify users with excessive identity-related risk
  • Identify segregation of duties violations, and
  • Streamline on-boarding and off-boarding of users

It’s a double advantage. The privileged access security risk is mitigated, while IT operational efficiency is increased.

Article online here

要查看或添加评论,请登录

Walter Bioch的更多文章

  • Secured your holiday?

    Secured your holiday?

    A lot of people enjoy their holiday in this time of year. I have planned mine and we will leave our home locked before…

  • Secured Holiday

    Secured Holiday

    A lot of people enjoy their holiday in this time of year. I have planned mine and we will leave our home locked before…

    1 条评论
  • What is Intelligent Identity and Access Management?

    What is Intelligent Identity and Access Management?

    What is Intelligent IAM? Intelligent IAM (IIAM) encompasses all the administrative processes used in Identity and…

  • Support your (internal) customer

    Support your (internal) customer

    In companies, business-oriented approval procedures are becoming increasingly important in the context of granting…

    1 条评论
  • More Media, More Identity Problems

    More Media, More Identity Problems

    It’s not a secret, media is changing fast. Every day new and exciting mobile devices and ubiquitous online access…

  • What’s the Goal for IT Leaders: Security or Compliance?

    What’s the Goal for IT Leaders: Security or Compliance?

    It’s a tough question for many organizations – is it more important to be compliant or to prioritize energies on…

  • Need an IAM Solution? Make Sure It Has the Right Foundation

    Need an IAM Solution? Make Sure It Has the Right Foundation

    In today’s highly distributed IT world, where organizations must secure a complex web of on-premises and SaaS…

  • Why Cybersecurity Is Critical To Your Business

    Why Cybersecurity Is Critical To Your Business

    All companies collect information about their customers. It’s how they determine what people want and how best to serve…

  • Dropping Like Dominos

    Dropping Like Dominos

    By now, you’ve all seen the headlines: Dropbox was breached well over four years ago and just now the true impact of…

  • Flood of identities

    Flood of identities

    A couple of years ago, we got into identity management especially to the employees of the company. And then more…

社区洞察

其他会员也浏览了