Section 17.163 Privileged Access Management (PAM) Flashcards
Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 4.6 Given a scenario, you must be able to implement and maintain identity and access management.
Privileged Access Management (PAM)
Solution that restricts and monitors privileged access within an IT environment
■ The policies, procedures, and technical controls that are used to prevent malicious abuse of privileged accounts
■ Crucial for preventing data breaches and ensuring the least privileged access is granted for specific tasks or roles
Components of Privileged Access Management
Just-In-Time Permissions (JIT Permissions)
● Security model that grants administrative access only when needed for a specific task
● Reduces the risk of unauthorized access or misuse of privileges
● Access rights are given when the task begins and revoked once the task is completed
Components of Privileged Access Management
Password Vaulting
● Technique that stores and manages passwords securely, often in a digital
vault
● Requires multi-factor authentication for accessing stored passwords
● Tracks access to privileged credentials, providing an audit trail
Components of Privileged Access Management
Temporal Accounts
● Temporary accounts used for time-limited access to resources
● Created for specific purposes and automatically disabled or deleted after a predefined period