PAM, IAM, Or Both?

Identity & Access Management (IAM) and Privileged Access Management (PAM) are often misunderstood, having similar features in dealing with users, access, and roles. They also refer to safeguarding data by protecting who has access to systems and what manipulation is allowed to sensitive areas.

Despite these facts, they are different. The role of PAM is to protect users with privileged access to sensitive data such as System Administrators or Developers.

Privileged credentials (also called privileged passwords) are a subset of credentials that provide elevated access and permissions across accounts, applications, and systems. Privileged passwords can be associated with human application, service accounts, and more. Secure Shell Protocol (SSH) keys are one type of privileged credential, used across enterprises, to access servers and open pathways to highly sensitive assets.

Privileged account passwords are often referred to as ‘the keys to the IT kingdom’ as, in the case of superuser passwords, they can provide the authenticated user with almost limitless privileged access rights across an organisation’s most critical systems and data. With so much power inherent of these privileges, they can be an area for abuse by insiders and are highly coveted by hackers. Forrester Research estimates that 80% of security breaches involve privileged credentials.

IAM on the other hand focuses on business users or third parties, controlling the access and experience these users are given within an application or service. Frequently IAM is linked to zero trust measures and strong authentication.

In many cases companies think that by adding an IAM solution it will take care of the privileged users as well. But this is a mistake, as PAM goes far broader in its controls and should be the first authentication measure deployed as PAM solutions take security and compliance a step further, helping IT teams to control privileged users and accounts.

In short, IAM manages identities for common accesses that occur in routine activities, PAM controls access of privileged and active users in critical system environments. 
 
PAM systems define which employees, partners, vendors, and applications have what level of access for specific accounts or data. Implementation of PAM is a mix of software, processes, and enforcement, only those with privileged access can have permission to use the most critical data and assets.

Some key features of a PAM system are:

  • Password vault: management and protection of critical credentials through session monitoring.
  • Usage limit: limiting account usage based on a specific time, or a certain approval extent.
  • Discovery: auto-discovery of privileged credentials that may be on the system without the administrator’s knowledge.
  • Visibility: view of what happens when an access is requested, approved, and performed.
  • Audit: recording of evidence from accesses performed correctly or not.

 Both IAM and PAM are useful to protect your organisation from security theft. To fully protect your business from internal and external threats, both IAM and PAM solutions should be deployed.

By using these tools together, companies can eliminate any unprotected coverage gaps from hackers with a complete security solution that regulates password use, monitors user access activity, and facilitates government regulation compliance. It could even save money on cyber insurance premiums.

Companies must ensure that they closely integrate their IAM and PAM tools, this will help avoid redundant processes for privileged and everyday user accounts. With the strong combination of these systems , companies can have trust in automated provisioning of user accounts which enables swift removal of a user profile when a person leaves, or a compromise is detected.

Additionally, using strong user identity management ensures  faster reporting and auditing across all  user accounts, making any form of investigation much easier.

Identity Access Management (IAM) and Privileged Access Management (PAM) are completely different from each other in terms of working, as well as audience. I always advise that a PAM solution should be the primary implementation, followed by a complementary IAM solution, as the exposure of data is far greater when a privileged user is compromised.

Colin Tankard is Managing Director of Digital Pathways

You Might Also Read:

Is It Time To Consolidate Systems?:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« EU Fines Meta $416m
Why We Should Worry About A War On Cybercrime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

PartnerRe

PartnerRe

PartnerRe Ltd. provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.