Loading
Person in server room problem-solving while holding laptop

Employ PAM to champion zero-trust security

Why zero trust should guide your security strategy

Zero trust isn’t a product; it’s a set of principles to guide your approach to enterprise security.

01

Why zero trust should guide your security strategy

Zero trust isn’t a product; it’s a set of principles to guide your approach to enterprise security.

5 min read

Privileged access management (PAM): A foundation for zero trust

PAM has become a business imperative for managing a cybersecurity policy built on zero trust.

02

Privileged access management (PAM):A foundation for zero trust

PAM has become a business imperative for managing a cybersecurity policy built on zero trust.

4 min read

The importance of PAM in hybrid cloud environments

As cloud environments become more complex, organizations need a modern access management paradigm.

03

The importance of PAM in hybrid cloud environments

As cloud environments become more complex, organizations need a modern access management paradigm.

3 min read

Essential PAM services to support zero trust

Businesses need a comprehensive set of PAM services to enforce the principle of least privilege.

04

Essential PAM services to support zero trust

Businesses need a comprehensive set of PAM services to enforce the principle of least privilege.

4 min read

Achieve zero trust with a robust security ecosystem

The best PAM solution integrates with a broad ecosystem of security tools.

05

Achieve zero trust with a robust security ecosystem

The best PAM solution integrates with a broad ecosystem of security tools.

4 min read

Conclusion: Apply the principle of least privilege

Grant access to enterprise assets to only the right users in the right context.

06

Conclusion: Apply the principle of least privilege

Grant access to enterprise assets to only the right users in the right context.

2 min read
Person in server room problem-solving while holding laptop
Employ PAM to champion zero-trust security

01

5 min read

Why zero trust should guide your security strategy

Businesses are facing new security threats, and privileged credentials are an often-overlooked source of breaches. Employing a zero-trust security strategy has become a business imperative.

Person in office looking at computer screen

Organizations today face a growing number of security threats. Ransomware attacks are on the rise and make more frequent appearances in the headlines. Cybercrime is continuously evolving as criminals invent new ways to threaten business security.

While outsider attacks make the news, insider threats are often overlooked. Insider security breaches are the threats that come from employees with privileged access, and such breaches can be accidental or malicious.

Circle graph indicating 80% surrounding icon of person with X on the torso

80% of all security incidents involve compromised privileged credentials.1

The growth and danger of privileged accounts

Privileged accounts are expanding in complexity and scope. Such accounts include human and nonhuman users with special access to an organization’s most critical assets: your network, systems and data.

Privileged human users include infrastructure and application administrators, developers, cloud administrators, third parties or contractors. Privileged nonhuman users included service and application accounts, hardcoded credentials, dormant accounts, Internet of Things (IoT) devices and robotic process automation (RPA) bots.

According to a study by the cybersecurity company Venafi, machine-identity-related cyberattacks grew by more than 400% between 2018 and 2019.2 In hybrid cloud environments—which are fast becoming the norm—the definition of a privileged account has widened further to include containers, servers and applications that have privileged access. And a growing number of organizations now have a hybrid workforce, with users, data and resources dispersed across the world, opening the enterprise to further vulnerabilities. All these factors broaden the potential attack surface for bad actors looking for an entry point.

Circle graph indicating 40% surrounding icon of employee with access to critical data

40% of insider-proved incidents involve an employee with privileged access to sensitive company assets.3

Insider-caused security incidents can be unintentional, but those caused by malicious insiders involve a higher degree of privileged access and carry an even heavier price tag.

Addressing insider security threats is essential given the enormous possible consequences of a breach for businesses—from lost revenue to lost productivity to lost trust and reputation.

The global average total cost of a data breach in 2020 was USD 3.86 million.4

This proliferation of human and nonhuman accounts with privileged access to sensitive company information has undeniably increased risk for the enterprise. Threat actors actively target privileged accounts as an entry point into IT environments, from which they can compromise systems and steal sensitive company and customer data. Stolen or compromised privileged credentials can lead to highly damaging and costly data breaches.

Zero trust: Creating context-based security

To prepare for and mitigate security threats stemming from compromised privileged credentials, organizations need a modern approach to security. The concept of zero trust can help them execute context-based security across the enterprise.

Zero trust isn’t a product; it’s a set of principles to guide an organization’s security strategy. Its foundation is: never trust, always verify and enforce the principle of least privilege. A zero-trust approach entails wrapping security around every user, every device and every connection, every time. When a breach does occur, following zero-trust principles can help you get to the root of the problem faster.

Zero trust asks:

  • Should a person have access?
  • How long should that access last?

Today, zero trust has become a business imperative. Organizations are no longer asking, “What is zero trust?” or “Why should I adopt zero trust?” Instead, the question is, “How do I do it?”

Circle graphic indicating 80% surrounding icon of enterprise office buildings

80% of enterprises have plans to begin or advance their zero-trust adoption within the next 24 months.5

5 requirements for a zero-trust security strategy

  • Implement the principle of least privilege.
  • Protect high-power privileged accounts.
  • Strengthen end-point security.
  • Monitor privileged account activities.
  • Apply multifactor authentication for business-critical assets.

3 2021 IBM Security X-Force Insider Threat Report, IBM Security X-Force Threat Intelligence, May 2021.
4 Cost of a Data Breach Report 2020, IBM Security, July 2020.
5 “Voice of the Enterprise, Information Security,” 451 Research, 2020.

02

4 min read

Privileged access management (PAM): A foundation for zero trust

Privileged access management is critical for any organization that wants to build zero-trust security. Just-in-time PAM helps you give the right access to the right users at the right time.

Security worker at desk looking at security monitoring software showing charts and graphs

For any organization looking to implement a zero-trust security strategy, privileged access management (PAM) should serve as a foundation—a business imperative that helps ensure the effective implementation of cybersecurity policies.

A zero-trust approach involves implementing a least-privilege security solution on employee workstations and personal devices—often the most vulnerable points in an organization’s IT system given that cyber criminals often target privileged users.

A privileged user can be any account—human or nonhuman—that has access to sensitive company data. For example, employees who work in HR, senior executives and people in finance or legal roles often have privileged access. Likewise, administrative users, such as server and IT administrators and help desk employees, can have privileged access.

PAM is about monitoring and protecting these privileged accounts by implementing the principle of least-privilege security. Often, organizations fail to practice good hygiene around privileged credentials. In fact, many companies are still using spreadsheets or paper-based tracking to manage privileged accounts.

The importance of PAM in the enterprise

The first step on the journey to zero trust is the implementation of a PAM program. PAM empowers businesses to grant access to the right enterprise assets to the right privileged users in the right context.

Circle graph indicating 70% surrounding icon of 3 people with various credentials

By 2022, 70% of organizations will implement PAM practices for all use cases in the enterprise.1

Gartner has identified PAM as a crucial element of security programs for the last several years, and especially now given the impacts of the COVID-19 pandemic. Identity and access management (IAM) leaders “must improve governance and strengthen privileged access management to prevent breaches, establish more robust and agile authentication and authorization, and enhance consumer IAM to prevent fraud and protect privacy.”2

Just-in-time PAM

Just-in-time (JIT) PAM is a way of enforcing true least privilege in the enterprise. JIT PAM gives users access just in time, that is, only when they need it, instead of allowing standing access. The goal is to allow zero standing privileges for your organizational account access.

Circle graph indicating 50% surrounding icon of grid with dots in each quadrant

In its 2020 Magic Quadrant for PAM, Gartner indicates that by 2024, 50% of organizations will have implemented a JIT PAM model that eliminates standing privileges.3

JIT PAM limits the time users can spend in privileged systems or resources, and it limits the locations from which those systems and resources can be accessed.

Benefits of implementing PAM tools

Whether your organization adopts some PAM principles, a comprehensive PAM program, or JIT PAM, there are many benefits:

  • PAM reduces the likelihood of privileged credentials being compromised and misused in both external breaches and insider attacks.
  • PAM reduces the impact of an attack when it occurs by radically shortening the time during which the organization is unaware that it’s under attack or being subverted.
  • PAM can address cloud security, anomaly detection, the software development lifecycle, regulatory compliance and operational efficiency.
  • In this 2021 IBM Security X-Force Insider Threat Report the Ponemon Institute reveals that tools like PAM and programs like threat intelligence sharing have been estimated to save organizations an average of USD 3 million in terms of reducing or eliminating insider risks.4

3 “Magic Quadrant for Privileged Access Management,” Gartner, 04 August 2020.
4 2021 IBM Security X-Force Insider Threat Report, IBM Security X-Force Threat Intelligence, May 2021.

03

3 min read

The importance of PAM in hybrid cloud environments

Hybrid cloud environments have added complexity to the management of privileged access in the enterprise. Enter the paradigm of the Identity Fabric—a modern approach to identity and access management.

As organizations migrate workloads to the cloud, it’s crucial to protect both on-premises and cloud assets. PAM tools and services can help you address privileged access use cases across hybrid multicloud environments.

The complexity of managing access in cloud environments

As companies expand their adoption of public cloud services, many are facing a labyrinth of complexity to properly manage and secure user access to the organization’s network, systems and applications. It can seem almost impossible to navigate—especially if you want to apply the principles of zero-trust security holistically across your environment.

A hybrid multicloud environment can include public clouds, private clouds, traditional on-premises data centers and edge computing. Multi refers to the presence of more than one cloud service from more than one cloud vendor, where each vendor may introduce more privileged identities that need to be clearly understood and managed.

Graphic illustrating 10 clouds with arrow pointing to office building
Research from the IBM Institute for Business Value found that by 2023, organizations expect to be using at least 10 clouds. 1

Authorized and unauthorized remote devices, as well as internal devices, might all be accessing the network—especially given the realities of the hybrid workforce today. The wide range of data types, code, clouds and devices in a hybrid multicloud architecture can introduce more vulnerabilities in your environment. Keeping track of all the different role-based permissions, policy changes and identity lifecycle guidelines is error prone and time-consuming.

In a hybrid cloud environment, developers and cloud operations teams need help to define a pathway to a zero-trust environment.

Access in the era of growing ransomware attacks

Protecting privileged credentials is critical for every business as ransomware attacks continue to increase and become more sophisticated. The SolarWinds hack and other recent high-profile cyberattacks highlight the importance of putting zero trust into action.

Animated gif showing icons of industries impacted by ransomware attacks
Ransomware attacks surged by 150% in 2020. 2

If your organization operates in a hybrid cloud environment, creating an enterprise access blueprint can help you better manage access approvals. PAM solutions are designed to help you connect users to the right level of access at the right time. Traditional enterprise IAM tools don’t always integrate well with cloud solutions, so it’s not a matter of simply plugging in your cloud to existing tools.

Mitigate risk in your cloud environment

While cloud environments have made privileged access management more complicated, they’ve also made it more critical than ever. IT leaders need a blueprint that clearly defines permissions rules as part of a modern zero-trust approach to enterprise security. They need an approach that’s comprehensive and doesn’t rely on a single technology, tool or service.

Leading analyst firm KuppingerCole refers to a paradigm called an Identity Fabric that’s the key to digital transformation and the future of identity access. Identity Fabrics help support various types of identities, for example, employees, partners and consumers, in an organization. They don’t rely on a single tool or service but rather create a strong core platform for delivering a solution that complements a hybrid environment.

1 The hybrid cloud platform advantage, IBM Institute for Business Value, 2020.
2 Ransomware Uncovered 2020/2021, Group-IB, March 2021.

04

4 min read

Essential PAM services to support zero trust

Having a PAM tool is one thing, but to effectively employ the principle of least privilege, you need a comprehensive set of PAM services that help you plan and maintain your zero-trust security strategy.

Employing the principle of least privilege

One of the best methods for preventing access-level-related insider incidents is to adhere to the principle of least privilege. This principle helps ensure that users have the lowest level of access needed to carry out their duties for the organization.

The best way to enforce the least-privilege principle is to implement a PAM solution built around a zero-trust model. The goal is for everyone with a user account to be granted the least amount of privilege possible, helping to reduce the risk of an insider gaining access to company data or other critical assets. The concept of least privilege becomes even more critical in the cloud where more data resides for both human and nonhuman requestors.

So how do you know if your PAM tool includes all the essential attributes of a comprehensive PAM program?

Illustration containing 4 icons representing strategy, acceleration, implementation and onboarding
– Strategic planning
– Rapid deployment
– Implementation services
– Continuous asset onboarding

Privileged access management is about giving the right access to the right users at the right time. Most PAM programs focus on the technology implementation and don’t prioritize determining who should have access to what or fully integrate into other systems and applications in your security portfolio. As a result, many PAM programs fail to effectively reduce the attack surface and adhere to a zero-trust strategy.

A fully managed, end-to-end PAM solution can help you secure the privileged user lifecycle, narrow the attack surface associated with your organization’s credentials and demonstrate compliance.

Be proactive with PAM: Essential PAM services

If you want to implement a zero-trust security strategy in your business, you need a PAM solution to manage privileged credentials. However, deploying PAM software on its own might not be sufficient, especially if it doesn’t come with a comprehensive set of essential PAM services.

Here are 4 questions to ask when evaluating your PAM services strategy:

Icon of 2 chess pieces
1. Does it help you form a PAM adoption strategy?
The ideal PAM program starts with an adoption strategy. It’s a good idea to work with IAM experts—whether in house or from a third-party service provider—who can help you develop a PAM plan that aligns with your business goals and security posture.

The following are 5 things to consider in your PAM adoption plan:
– Look at your business and operational goals.
– Consider compliance and regulatory requirements.
– Identify your target PAM state.
– Decide what features and functionality you need.
– Map a path to get there.
Icon of a clock intersected by vertical lines suggesting acceleration
2. Can it accelerate PAM deployment?
The second consideration is about speed of deployment. Does the PAM solution help you implement your new access management protocols quickly, with prebuilt use cases and assets for your industry?

Some of the possible PAM use cases that are defined by the identity security company SailPoint include: automating the user lifecycle, monitoring privileged accounts, implementing the principle of least privilege, and providing secure remote access or third-party access.1 The needs of your business will determine what use cases are most relevant, and your PAM tool should help you deploy PAM quickly in the areas where you need it most.
Icon of 4 arrows pointing outward in different directions
3. Does it include implementation services?
Some organizations find it advantageous to work with a managed services provider to launch or maintain their PAM solution. Third-party implementation services can help you quickly deploy software and adapt it to your unique use cases. Expert deployments not only reduce risks but allow your IT and security teams to focus on other priority projects.

Some providers offer privileged access management as a service (PAMaaS). If your company lacks the staffing or expertise to focus on IAM, working with a third-party service provider that offers setup, maintenance and administration of the PAM software can be an easy answer to addressing your PAM needs.
Icon showing 3 outlined people surrounded by a circle with arrows
4. Will it expedite onboarding of new users and target systems?
You want a PAM solution that makes it easy for you to onboard new users and accounts, and to integrate new systems and applications as quickly as possible. The ideal PAM tool can expand target system integrations with prioritized, continuous asset onboarding. To be able to quickly and effectively onboard new assets continuously, your PAM solution needs to integrate well with other parts of your security ecosystem.

If you purchased PAM software but lack some of these other critical PAM services, a third-party PAM service provider can help you get the most from your investment.

1 Privileged Access Management Use Cases, SailPoint, 19 January 2021.

05

4 min read

Achieve zero trust with a robust security ecosystem

While having a PAM tool is a crucial element of your zero-trust security strategy, it’s not enough. PAM needs to be integrated into a broader security ecosystem to provide comprehensive protection.

Modern open office with several people working on computers

Businesses today need a modern, open, unified approach to security, with PAM as an essential component of a broader security strategy. The challenges organizations are facing are real: cyber threats are becoming more advanced; security skills are in short supply; and cloud, mobile and IoT technologies have expanded the potential attack surface for cyber criminals to access.

If your organization is looking for a comprehensive PAM solution to support your zero-trust security strategy, IBM can help. IBM offers a holistic approach to managing privileged accounts that’s situated in the broader IBM Security™ ecosystem.

A PAM tool alone isn’t enough to meet the requirements for zero trust. For holistic protection against privileged account misuse, you need an integrated solution that combines a robust PAM tool with a suite of other security tools to help your organization defend against growing threats. Working with an integrated security ecosystem will help you respond more quickly and effectively to security incidents when they arise.

Privileged access management from IBM

IBM Security Verify Privilege is a suite of PAM offerings that can help organizations:

  • Discover, manage, protect and audit privileged accounts.
  • Enforce least-privilege security and control application rights on endpoints.
  • Centrally manage passwords used to access applications and services.

IBM Security Verify Privilege integrates with IBM security information and event management (SIEM) and security orchestration, automation and response (SOAR) tools, hybrid cloud and Red Hat® solutions, data protection solutions and identity governance solutions. By adopting a PAM solution that’s part of a broader security ecosystem, you can safeguard privileged access across your IT environment.

The IBM Security ecosystem

Icon representing detection and mitigation of advancing threats
SIEM and SOAR tools
Integrating PAM with SIEM and SOAR tools can help you monitor privileged users’ activities and make sure all data is aggregated from a threat detection perspective.

IBM Security Verify Privilege integrates with IBM SIEM and SOAR tools, such as IBM Cloud Pak® for Security, the IBM Security QRadar® solution and IBM Security SOAR, to help you manage real-time security events within privileged accounts and build customized risk analysis and automated response into your PAM policies.

How does it work?

A security administrator is notified if a user shows unusual or risky behavior in IBM Security Verify Privilege Vault, using IBM Security QRadar user behavior analytics (UBA) and can then automate incident response with IBM Security SOAR.
Icon representing hybrid cloud
Hybrid cloud and Red Hat
Because cloud environments can create new challenges for managing privileged access, it’s important that your PAM tool integrates with your hybrid cloud architecture. IBM Security Verify Privilege Vault integrates with IBM and Red Hat hybrid cloud solutions to provide a privileged account security solution for UNIX and Linux® systems, cloud infrastructures, administrators and developers.

How does it work?

The integration of IBM cloud and Red Hat solutions with IBM Security Verify Privilege enables users to access authorized accounts on UNIX and Linux systems in a security-rich environment while working natively within their preferred remote access tools. It also enables users to access authorized accounts on secured cloud infrastructures, such as Amazon Web Services (AWS), Google Cloud and Microsoft Azure, while working natively within their preferred remote access tools. With this integration, you can protect high-power privileged accounts with a centralized vault, enforcing least-privilege principles on administrator endpoints. Finally, it helps you manage credentials for applications, databases, continuous integration continuous delivery (CICD) tools and services without causing friction in the development process.
Icon representing data security
Data protection
You need comprehensive data protection for all your data, in the cloud and on premises. IBM Security Verify Privilege integrates with IBM Security Guardium® solutions to help address security and compliance in modern data environments. IBM PAM solutions and Guardium solutions can help you manage privileged accounts, track privileged access usage and enrich audits with identity context.

How does it work?

Guardium solutions provide fine-grained visibility into database access, answering the who, what, when and how of data access for compliance and data security purposes. PAM tools control access, but they don’t detect the behavior of authorized users. In contrast, Guardium solutions can detect insider threats, allowing you to respond quickly.
Icon of fingerprint representing security identity governance
Identity governance and adaptive access
Single sign-on (SSO), multifactor authentication (MFA) and adaptive access are authentication methods that can help you centrally govern privileged identities, supporting a zero-trust strategy. IBM Security Verify Privilege integrates with IBM SSO, MFA and adaptive access tools.

How does it work?

Privileged accounts in IBM Security Verify Privilege Vault are discovered by IBM Security Verify Governance. Access is continually certified, and risk is assessed through separation-of-duty (SoD) controls and business policy enforcement. IBM Security Verify Privilege Vault contains highly sensitive information. The privileged user authenticates using MFA and is continually authenticated using transparent risk assessment. PAM solutions help ensure that you give the right access to the right users at the right time. Choosing a PAM tool that’s part of a robust security ecosystem will help your organization adopt a zero-trust approach to enterprise security.

06

2 min read

Conclusion: Apply the principle of least privilege

A PAM solution that delivers comprehensive PAM services and integrates with the rest of your security environment bolsters your zero-trust security strategy.

Torso and arms of medical professional typing on computer keyboard

As businesses face a growing number of security threats from both outside and inside the organization, a zero-trust security strategy has become an imperative. Zero trust is about giving users only the access they need, only when they need it. As privileged accounts for both human and nonhuman users increase, and hybrid cloud environments add complexity to access management, organizations have more vulnerabilities to cyberattacks. PAM solutions, which enforce the principle of least privilege, are thus a critical part of any zero-trust strategy.

As businesses move forward on their PAM journey, they’ll need a comprehensive set of PAM services that enforce the principle of least privilege. These services include PAM adoption strategy planning, PAM implementation and acceleration services, and services to expedite the onboarding of new users and target systems. When you choose a PAM solution, make sure it comes with the services that will help you get the most from that investment. Likewise, a PAM tool’s value is directly related to how well it communicates with your other security solutions. If your PAM solution doesn’t integrate with your SIEM and SOAR tools, your hybrid cloud solutions, your data protection software and your identity governance solutions, it won’t be as effective as it could be. Organizations will benefit from working with a vendor like IBM that offers a comprehensive suite of integrated security solutions.