Manage Privileged Users - Principles & Risks | Salesforce Trailhead (2024)

Learning Objectives

After completing this unit, you’ll be able to:

  • Explain privileged access management (PAM).
  • Identify privileged user responsibilities.
  • Define risks associated with privileged use.

What Is Privileged Access Management (PAM)?

Access control is a central principle of cybersecurity. You control access in order to implement your organization’s security policies. Access control decisions govern who should be granted access, what they should be granted access to, and the methods of enforcing access and restriction. Someone has to be in charge of setting and monitoring these access features, and that person is said to have privileged access.

Privileged access management (PAM) is the set of cybersecurity strategies and technologies that organizations use to control levels of access and permissions for users, accounts, processes, and systems. Organizations design appropriate levels of privileged access to prevent and mitigate the damage that might arise from security breaches. While we’d all like to think that every attack comes from an external source, good security protocol must also take into account the possibility of internal breaches and those caused by malfeasance (accident or negligence).

When managing access, remember that the principle of least privilege is the key to maintaining safe systems. The principle of least privilege means that when you configure systems, you only give people the absolute minimum permission necessary to perform their job activities. This minimum permission is what we mean by least privilege.

What Are Privileged Users?

Someone needs to be designated to assign levels of access. These people are known as privileged users. They are the individuals who have administrative privileges to modify systems or view highly confidential information.

Privileged users include but are not limited to the following.

  • Operating and network system admins: Users with administrative privileges to the operating system or network device
  • Database admins: Users with administrative privileges to one or more databases
  • Domain admins: Users with privileged access across all workstations and servers on a domain
  • Application admins: Users with administrative privileges to one or more applications
  • Local admins: Users with administrative access to the local systems, such as IT staff who perform maintenance or set up new workstations

Since users with privileged access touch the systems and devices that control an organization’s business and data (basically the “keys to the kingdom”), it is essential that they understand the security responsibilities that come along with that access. Privileged users are a point of access to any organization and its data, so it’s key to guard against both external and internal security threats.

Manage Privileged Users - Principles & Risks | Salesforce Trailhead (1)

What Can Privileged Users Do?

Privileged users, like other users, may have varying levels of access depending on their job function. Organizations need privileged users because they need people who can perform the following.

  • Install software.
  • Install or modify system processes.
  • Create or modify system configurations.
  • Create or modify system access controls.
  • View or control a user’s screen through remote access technologies in order to assist them.

This means that some privileged users may have the authority to access much of your organization’s data and to make changes to production controls and other network settings. Privileged users also have access to the organization’s network, devices, and servers. Because privileged users have greater access to the network and are limited by fewer controls, they often have the ability to get around controls that restrict other nonprivileged users. They must always keep in mind that, by the very nature of their privilege, they pose a security risk.

Why Do Privileged Users Need to Be Careful?

Privileged users pose a security risk because of their level of access. A privileged user can be an organization’s security enforcer but can also be its greatest liability.

Even the most well-intentioned privileged user poses a risk. Take simple phishing as an example. If a system admin or network engineer with elevated access clicks a malicious link, it’s far more likely to do organization-wide damage than someone else who does not have that level of access and clicks the same link. Read on to discover how to mitigate these particular vulnerabilities.

Resources

Manage Privileged Users - Principles & Risks | Salesforce Trailhead (2024)
Top Articles
Enhanced Due Diligence Checklist | EDD Checklist 2024
High Tide Inc. (HITI) Stock Major Holders - Yahoo Finance
Dannys U Pull - Self-Service Automotive Recycling
Moon Stone Pokemon Heart Gold
Cottonwood Vet Ottawa Ks
Tesla Supercharger La Crosse Photos
Evil Dead Rise Showtimes Near Massena Movieplex
CKS is only available in the UK | NICE
Craigslist - Pets for Sale or Adoption in Zeeland, MI
Music Archives | Hotel Grand Bach - Hotel GrandBach
Fcs Teamehub
Xm Tennis Channel
Persona 4 Golden Taotie Fusion Calculator
David Turner Evangelist Net Worth
Pekin Soccer Tournament
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Band Of Loyalty 5E
Daylight Matt And Kim Lyrics
Costco Great Oaks Gas Price
Decosmo Industrial Auctions
Busted Campbell County
SuperPay.Me Review 2023 | Legitimate and user-friendly
Sussyclassroom
Gazette Obituary Colorado Springs
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
Prot Pally Wrath Pre Patch
Wiseloan Login
Kirk Franklin Mother Debra Jones Age
8002905511
Craftybase Coupon
Kqelwaob
Craigslist Sf Garage Sales
M3Gan Showtimes Near Cinemark North Hills And Xd
Lichen - 1.17.0 - Gemsbok! Antler Windchimes! Shoji Screens!
The Mad Merchant Wow
About Us | SEIL
Ket2 Schedule
Case Funeral Home Obituaries
Stanford Medicine scientists pinpoint COVID-19 virus’s entry and exit ports inside our noses
Cherry Spa Madison
Daily Times-Advocate from Escondido, California
Gvod 6014
Gym Assistant Manager Salary
Centimeters to Feet conversion: cm to ft calculator
Reilly Auto Parts Store Hours
Anonib New
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Aaca Not Mine
Bumgarner Funeral Home Troy Nc Obituaries
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 6033

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.