Administrator Credentials Management Best Practices | Salesforce Trailhead (2024)

Learning Objectives

After completing this unit, you’ll be able to:

  • Define privileged access management systems.
  • Explain the principle of least privilege.

Privileged Access Management

While password managers are terrific for generating and securing your personal passwords, you need a more secure system for protecting the credentials of your privileged users (also known as administrative users). Privileged credentials are a subset of credentials (such as passwords) that provide elevated access and permissions across accounts, applications, and systems. Privileged passwords can be associated with humans, applications, service accounts, and more.

Privileged access management (PAM) solutions provide a way to store secrets, such as passwords and cryptographic keys (a word, number, or phrase that works in combination with an algorithm to encrypt [or scramble] plaintext). PAM solutions use a central tool to manage, delegate, and audit privileged access. PAM helps organizations implement least privilege, which is the principle that users receive only the necessary level of access to do their jobs.

Privileged Account Password Policy

To protect your systems your organization should develop and enforce a clear policy for privileged account passwords and share it with all relevant parties who use and manage these accounts.

It’s a good idea for organizations to develop privileged account password policies for both accounts accessed by people, and accounts accessed by other systems. These policies should include the mandatory use of long passphrases and multi-factor authentication (MFA) for human accounts.

Passwords rotation standards can ensure the systematic rotation of passwords for every account, system, networked hardware device, application, and service. Your rotation standards should include automatic notification to stakeholders when it's time to update passwords.

Implement Least Privilege

Defending your perimeters is not enough for security and data protection. Over and over again we see data breaches in both government and private sector systems that happen because network credentials are breached. Attackers in these cases are seeking to gain access to privileged accounts so they can gain access to sensitive data and private records.

When setting up administration credentials, think about implementing the principle of least privilege (POLP). We talk about POLP so often in security training because it is one of the fundamental means by which we can secure our systems. To review, the principle of least privilege is an IT security design principle that restricts access rights and program privileges to only those necessary for the required job. It’s the difference between having a key that works on every door, and one that only opens certain rooms.

One aspect of implementing least privilege is that you remove full local administrator access to system endpoints. For example, a user account that needs permission only for creating backups does not need the ability to install software, so that account has rights only to run backup and backup-related applications. Any other privileges, such as installing new software, should be blocked.

To make privileged management easier, it’s a good idea to automate granting least privilege based on who the user is, what they’re requesting access to, and the context of the request. Users should be able to access only the systems they need to do their jobs, and should not be granted general access to information.

This means that Sally in Human Resources (HR), for example, should not be able to access the database of Bilal in Finance who is making global deals. Good privileged access management means that Sally has access to all the HR records she needs to do her job, and Bilal has access to all the financial records he needs to do his, but they do not have access to each other's files.

Administrator Credentials Management Best Practices | Salesforce Trailhead (1)

Choose a Privileged Access Management (PAM) Solution

Numerous PAM solutions are out there that provide various features and deployment options. You can test and evaluate a few before deciding which to implement. An important factor of PAM implementation is to make sure you have well-defined use cases and user profiles. Use a PAM to assign levels of access for service account management, discovery functions, asset and vulnerability management, analytics, and more.

If your organization does not have the resources to maintain security staff who are trained to install, configure, and manage these solutions, consider using a managed service provider (MSP) who can perform these functions for you.

Perform Continuous Privileged Account Discovery

One of the most important steps to secure privilege access is to identify all valid uses of privilege access to servers, cloud services, databases, and other systems. This ensures that privileged accounts are valid, but also pinpoints accounts that are not. For instance, it’s important to keep track of not only granting but also removing privileges when people move jobs between departments, or when they leave the company.

Privileged accounts should be monitored at all times using automated mechanisms to identify malicious or accidental activity. Analysis of this activity allows you to gain insights into user behavior, ensures that your access systems are up to date, and checks that least privilege is applied correctly.

Knowledge Check

Ready to review what you’ve learned? The knowledge check below isn’t scored—it’s just an easy way to quiz yourself. To get started, drag the description in the left column next to the matching term on the right. When you finish matching all the items, click Submit to check your work. To start over, click Reset.

Great work!

Resources

Administrator Credentials Management Best Practices | Salesforce Trailhead (2024)
Top Articles
Are These 12 Hangover Cures Actually Legit? We Asked a Doctor
Products, Competitors, Financials, Employees, Headquarters Locations
Pollen Count Centreville Va
Woodward Avenue (M-1) - Automotive Heritage Trail - National Scenic Byway Foundation
Fat Hog Prices Today
Dte Outage Map Woodhaven
Login Page
Voorraad - Foodtrailers
7.2: Introduction to the Endocrine System
Khatrimaza Movies
Palace Pizza Joplin
New Day Usa Blonde Spokeswoman 2022
Rainfall Map Oklahoma
Ukraine-Russia war: Latest updates
Brutál jó vegán torta! – Kókusz-málna-csoki trió
Flights To Frankfort Kentucky
Drago Funeral Home & Cremation Services Obituaries
Bowie Tx Craigslist
Uktulut Pier Ritual Site
Spider-Man: Across The Spider-Verse Showtimes Near Marcus Bay Park Cinema
360 Tabc Answers
Account Suspended
Music Go Round Music Store
Cbssports Rankings
Routing Number For Radiant Credit Union
Zillow Group Stock Price | ZG Stock Quote, News, and History | Markets Insider
Rust Belt Revival Auctions
Does Hunter Schafer Have A Dick
Why Are Fuel Leaks A Problem Aceable
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
Is Light Raid Hard
Nottingham Forest News Now
Summoners War Update Notes
Movies - EPIC Theatres
Why comparing against exchange rates from Google is wrong
Mg Char Grill
Most popular Indian web series of 2022 (so far) as per IMDb: Rocket Boys, Panchayat, Mai in top 10
Walter King Tut Johnson Sentenced
2012 Street Glide Blue Book Value
Tenant Vs. Occupant: Is There Really A Difference Between Them?
The Blackening Showtimes Near Regal Edwards Santa Maria & Rpx
Craigslist Mount Pocono
18 terrible things that happened on Friday the 13th
Fetus Munchers 1 & 2
Thotsbook Com
Elven Steel Ore Sun Haven
Bmp 202 Blue Round Pill
Chubbs Canton Il
Motorcycle For Sale In Deep East Texas By Owner
Where Is Darla-Jean Stanton Now
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6326

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.