- Robustly implement the principle of Least Privilege
- Grant access rights only on ‘need-to-know’ and ‘need-to-do’ basis
- Comply with regulatory guidelines that explicitly mention access control rules for data controllers and data processors
Which just-in-time privilege elevation approach to adopt?
It depends on an organization’s daily use-cases. The scope of a project, access frequency and the taxonomy: shared/administrative/business privileges are some of the points to keep in mind. Broadly, the classification of JIT privilege elevation approaches is as follows and ARCON | PAM supports these use-cases:- Privileged Elevation and Delegation Management (PEDM): An end-user may have a project to do on Windows/Unix environments. The access requirement may run for a few weeks or months. Based on the requirements, the PEDM approach provides temporary elevated access to the target systems. The privileged rights are revoked after the completion of IT tasks. ARCON offers agent-based PEDM for JIT access.
- One-time Privileged Access: It is meant for end-users requiring one-time administrative access to systems. The function ensures time-limited access to privileged accounts.
- On-demand provisioning and de-provisioning of privileged elevation: The function allows to create and delete privileged accounts, just in time.
- Ephemeral access to IaaS and SaaS consoles: The function helps in overcoming privilege escalation challenges in fast-expanding cloud environments. By ensuring ephemeral access to IaaS and SaaS consoles, security staff can ensure zero-standing privileges.