Внедрение PAM (Privileged Access Management)

PAM (Privileged Access Management) – a system for managing privileged access to business-critical information systems

Внедрение PAM (Privileged Access Management)

What problems does PAM solve?

  • Centralized management of employee access to controlled resources
  • Prevention of uncontrolled use and logging of attempts to use privileged accounts
  • Reduction in the number of privileged accounts
  • Ensuring multi-factor authentication for employees when accessing privileged accounts

Vendors we work with:

PAM solution architecture

In general, PAM includes the following components:

  • PAM server – manages access policies and stores credentials for privileged users.
  • PAM Agent – a software component that is installed on privileged users’ devices. It provides secure access to information systems and applications through the PAM server.

How PAM works

  1. A privileged user authenticates to the PAM server through the PAM agent (user session).
  2. The PAM server verifies the credentials and applies access policies.
  3. If access is granted, the PAM server establishes a controlled session between the privileged user and the application, records it, and analyzes privileged actions.  

The information security officer defines roles and permissions for each privileged user, tracks and controls their actions, and provides temporary access to privileged resources. Based on the results of the PAM system’s work, it analyzes reports and investigates incidents identified by the PAM system.

How the pilot launch works

  • Defining the goals and plan for the pilot project
  • Defining the metrics for the success of the pilot project
  • Develop a responsibility matrix between the client and the contractor
  • Forming lists of systems and privileged users who will participate in the pilot project

Duration: up to 2 weeks

  • Installation and configuration of PAM in the IT infrastructure
  • Configuring security policies in accordance with business objectives and requirements
  • Testing the PAM system by simulating real threats and security incidents

Duration: up to 2 weeks

  • Working with PAM in real time
  • Collecting feedback from PAM system users

Duration: up to 4 weeks

  • Creating a report on the stages of the pilot project
  • Evaluation of pilot project results
  • Decision on whether to use PAM or reject it

Duration: up to 1 week

ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ

Order a budget estimate

Our clients

Related solutions