Integrating Password and Privilege Management for Unix and Linux Systems

Privileged Access Management (PAM), while no longer being a young discipline of IAM (Identity and Access Management) and Information Security, has gained attention in the past years. Organizations that define internal cybersecurity programs commonly add Privileged Access Management to the top of the project list.

Privileged access to systems, be it servers, cloud services, or even client systems, imposes a significant risk from both external cyber-attacks and internal attacks.

Targeted attacks frequently make use of privileged accounts, and every long running, targeted attack is characterized by attackers trying to gain access to such accounts. PAM strategies, therefore, must focus on both limiting privileged access, i.e. privilege elevation, and avoiding the sprawl of passwords. That is, controlling the user and their access methods.

These capabilities must be provided as integrated solutions. There is a pressing need for centralized control of privileged access, as well as for limiting the excessive number of security tools in place.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

BeyondTrust logo
Provided by:
BeyondTrust
Topic:
Security
Format:
HTML