Administrator Credentials Management Best Practices | Salesforce Trailhead (2024)

Learning Objectives

After completing this unit, you’ll be able to:

  • Define privileged access management systems.
  • Explain the principle of least privilege.

Privileged Access Management

While password managers are terrific for generating and securing your personal passwords, you need a more secure system for protecting the credentials of your privileged users (also known as administrative users). Privileged credentials are a subset of credentials (such as passwords) that provide elevated access and permissions across accounts, applications, and systems. Privileged passwords can be associated with humans, applications, service accounts, and more.

Privileged access management (PAM) solutions provide a way to store secrets, such as passwords and cryptographic keys (a word, number, or phrase that works in combination with an algorithm to encrypt [or scramble] plaintext). PAM solutions use a central tool to manage, delegate, and audit privileged access. PAM helps organizations implement least privilege, which is the principle that users receive only the necessary level of access to do their jobs.

Privileged Account Password Policy

To protect your systems your organization should develop and enforce a clear policy for privileged account passwords and share it with all relevant parties who use and manage these accounts.

It’s a good idea for organizations to develop privileged account password policies for both accounts accessed by people, and accounts accessed by other systems. These policies should include the mandatory use of long passphrases and multi-factor authentication (MFA) for human accounts.

Passwords rotation standards can ensure the systematic rotation of passwords for every account, system, networked hardware device, application, and service. Your rotation standards should include automatic notification to stakeholders when it's time to update passwords.

Implement Least Privilege

Defending your perimeters is not enough for security and data protection. Over and over again we see data breaches in both government and private sector systems that happen because network credentials are breached. Attackers in these cases are seeking to gain access to privileged accounts so they can gain access to sensitive data and private records.

When setting up administration credentials, think about implementing the principle of least privilege (POLP). We talk about POLP so often in security training because it is one of the fundamental means by which we can secure our systems. To review, the principle of least privilege is an IT security design principle that restricts access rights and program privileges to only those necessary for the required job. It’s the difference between having a key that works on every door, and one that only opens certain rooms.

One aspect of implementing least privilege is that you remove full local administrator access to system endpoints. For example, a user account that needs permission only for creating backups does not need the ability to install software, so that account has rights only to run backup and backup-related applications. Any other privileges, such as installing new software, should be blocked.

To make privileged management easier, it’s a good idea to automate granting least privilege based on who the user is, what they’re requesting access to, and the context of the request. Users should be able to access only the systems they need to do their jobs, and should not be granted general access to information.

This means that Sally in Human Resources (HR), for example, should not be able to access the database of Bilal in Finance who is making global deals. Good privileged access management means that Sally has access to all the HR records she needs to do her job, and Bilal has access to all the financial records he needs to do his, but they do not have access to each other's files.

Administrator Credentials Management Best Practices | Salesforce Trailhead (1)

Choose a Privileged Access Management (PAM) Solution

Numerous PAM solutions are out there that provide various features and deployment options. You can test and evaluate a few before deciding which to implement. An important factor of PAM implementation is to make sure you have well-defined use cases and user profiles. Use a PAM to assign levels of access for service account management, discovery functions, asset and vulnerability management, analytics, and more.

If your organization does not have the resources to maintain security staff who are trained to install, configure, and manage these solutions, consider using a managed service provider (MSP) who can perform these functions for you.

Perform Continuous Privileged Account Discovery

One of the most important steps to secure privilege access is to identify all valid uses of privilege access to servers, cloud services, databases, and other systems. This ensures that privileged accounts are valid, but also pinpoints accounts that are not. For instance, it’s important to keep track of not only granting but also removing privileges when people move jobs between departments, or when they leave the company.

Privileged accounts should be monitored at all times using automated mechanisms to identify malicious or accidental activity. Analysis of this activity allows you to gain insights into user behavior, ensures that your access systems are up to date, and checks that least privilege is applied correctly.

Knowledge Check

Ready to review what you’ve learned? The knowledge check below isn’t scored—it’s just an easy way to quiz yourself. To get started, drag the description in the left column next to the matching term on the right. When you finish matching all the items, click Submit to check your work. To start over, click Reset.

Great work!

Resources

Administrator Credentials Management Best Practices | Salesforce Trailhead (2024)
Top Articles
Personality | Jindo Dog Love Community
Age of Consent in Missouri: Everything You Need to Know
Ubg365
Burch Messier Funeral Home Bedford Va Obituaries
Craigslist Mount Pocono
Nearest Costco To Destin Fl
Godzilla Figures Ebay
Progressive Care Rn A V1 Relias
Wis Weather Radar Columbia Sc
Veterans Tribute Career & Technical Academy Reviews
GIF by Barstool Sports - Find & Share on GIPHY
Pocatello Temple Prayer Roll
Über mich - Über Charly-G - Über Karl-Heinz Gebhardt
Matt Severance Picks
Blue Diamond French Bulldogs
855-409-4227
Curtis Ingraham Net Worth
Dinar Guru Detective
Devotion Showtimes Near Regency Buenaventura 6
Optum Primary Care - Winter Park Aloma
Best Restaurants Ventnor
Sounder Mariners Schedule
Craiglist Quad Cities
Nugget Market Gift Card Balance
Toyota Auris gebraucht kaufen bei AutoScout24
Top 10 Things To Do in Meridian, Mississippi - Trips To Discover
Dynasty League Forum
Ff14 Sit Anywhere
Cody Deal Lpsg
Jessica Oldwyn Carroll Update
410-237-7354
The Patch Bel Air
Comcast Business Downdetector
Eli Lilly Clarifies It’s Not Offering Free Insulin After Tweet From Fake Verified Account—As Chaos Unfolds On Twitter
2005 Chevrolet Silverado Radio Wiring Diagram
Saint Joseph Craigslist
Company Search Subscription Service
Nyc To Tlv Google Flights
Jin Wigs Thomaston Ga
Hidden Figures Movie Quiz Answers
Www.mygoodtogo
Boise Cascade Aktie (BCC) • US09739D1000
Cherry Crush Webtoon Summary
Neos Urgent Care Springfield Ma
Gameplay Clarkston
Craigslistrochester
Behind the Casefiles - Dnepropetrovsk Maniacs - Eileen Ormsby
Kobalt Kst 180-06 Parts
Espn Sirius Radio Schedule
Is Nadav In Rehab
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6326

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.