Overview
One disconcerting aspect in privileged access management (PAM) is that organizations are often not completely accustomed to widespread risks. Even if the PAM tools are in place, the fundamental principles sometimes could take a backseat. For instance, noncompliance to the ‘Least Privilege’ principle due to the absence of Just-in-time (JIT) privilege elevation approach.
Scenario 1: Enterprise on-prem privileged access management includes robust vaulting and session monitoring, but privileged users have ‘Always-on’ entitlements. No privileged user requires 24*7 privileged access. And arbitrarily accessed privileged accounts amplifies the insider threat.
Scenario 2: Enterprise does not want to do all the heavy lifting for setting-up on-prem PAM infrastructure. It therefore outsources to a managed service provider (MSP). The MSP in turn may have multiple layers of authentication including contextual authentication to mitigate risks involved in multi-tenant environments. Nevertheless, the access to systems whether deployed on its premises or on-cloud is threatened by unnecessary permanently elevated privileges.
The essence of the just-in-time privilege elevation approach is simplicity; it brings in the manner enterprise manage and control risks. That is, the right person is entitled to access the right systems at the right time for the right purposes.
Essentially, the just-in-time privilege elevation approach enables the IT security staff to:
- Robustly implement the principle of Least Privilege
- Grant access rights only on ‘need-to-know’ and ‘need-to-do’ basis
- Comply with regulatory guidelines that explicitly mention access control rules for data controllers and data processors