Manage Privileged Users - Principles & Risks | Salesforce Trailhead (2024)

Learning Objectives

After completing this unit, you’ll be able to:

  • Explain privileged access management (PAM).
  • Identify privileged user responsibilities.
  • Define risks associated with privileged use.

What Is Privileged Access Management (PAM)?

Access control is a central principle of cybersecurity. You control access in order to implement your organization’s security policies. Access control decisions govern who should be granted access, what they should be granted access to, and the methods of enforcing access and restriction. Someone has to be in charge of setting and monitoring these access features, and that person is said to have privileged access.

Privileged access management (PAM) is the set of cybersecurity strategies and technologies that organizations use to control levels of access and permissions for users, accounts, processes, and systems. Organizations design appropriate levels of privileged access to prevent and mitigate the damage that might arise from security breaches. While we’d all like to think that every attack comes from an external source, good security protocol must also take into account the possibility of internal breaches and those caused by malfeasance (accident or negligence).

When managing access, remember that the principle of least privilege is the key to maintaining safe systems. The principle of least privilege means that when you configure systems, you only give people the absolute minimum permission necessary to perform their job activities. This minimum permission is what we mean by least privilege.

What Are Privileged Users?

Someone needs to be designated to assign levels of access. These people are known as privileged users. They are the individuals who have administrative privileges to modify systems or view highly confidential information.

Privileged users include but are not limited to the following.

  • Operating and network system admins: Users with administrative privileges to the operating system or network device
  • Database admins: Users with administrative privileges to one or more databases
  • Domain admins: Users with privileged access across all workstations and servers on a domain
  • Application admins: Users with administrative privileges to one or more applications
  • Local admins: Users with administrative access to the local systems, such as IT staff who perform maintenance or set up new workstations

Since users with privileged access touch the systems and devices that control an organization’s business and data (basically the “keys to the kingdom”), it is essential that they understand the security responsibilities that come along with that access. Privileged users are a point of access to any organization and its data, so it’s key to guard against both external and internal security threats.

Manage Privileged Users - Principles & Risks | Salesforce Trailhead (1)

What Can Privileged Users Do?

Privileged users, like other users, may have varying levels of access depending on their job function. Organizations need privileged users because they need people who can perform the following.

  • Install software.
  • Install or modify system processes.
  • Create or modify system configurations.
  • Create or modify system access controls.
  • View or control a user’s screen through remote access technologies in order to assist them.

This means that some privileged users may have the authority to access much of your organization’s data and to make changes to production controls and other network settings. Privileged users also have access to the organization’s network, devices, and servers. Because privileged users have greater access to the network and are limited by fewer controls, they often have the ability to get around controls that restrict other nonprivileged users. They must always keep in mind that, by the very nature of their privilege, they pose a security risk.

Why Do Privileged Users Need to Be Careful?

Privileged users pose a security risk because of their level of access. A privileged user can be an organization’s security enforcer but can also be its greatest liability.

Even the most well-intentioned privileged user poses a risk. Take simple phishing as an example. If a system admin or network engineer with elevated access clicks a malicious link, it’s far more likely to do organization-wide damage than someone else who does not have that level of access and clicks the same link. Read on to discover how to mitigate these particular vulnerabilities.

Resources

Manage Privileged Users - Principles & Risks | Salesforce Trailhead (2024)
Top Articles
Satoshi Nakamoto jest w teorii 25. najbogatszym człowiekiem na świecie. Ile musiałby kosztować bitcoin, by znalazł się na podium? | Wiadomości | CrypS.
How to Become an Income Tax Officer? [Skills and Career in 2024]
Craigslist San Francisco Bay
Mychart Mercy Lutherville
Wmu Course Offerings
50 Meowbahh Fun Facts: Net Worth, Age, Birthday, Face Reveal, YouTube Earnings, Girlfriend, Doxxed, Discord, Fanart, TikTok, Instagram, Etc
Umn Pay Calendar
Kagtwt
OnTrigger Enter, Exit ...
Jc Post News
Labor Gigs On Craigslist
735 Reeds Avenue 737 & 739 Reeds Ave., Red Bluff, CA 96080 - MLS# 20240686 | CENTURY 21
Extra Virgin Coconut Oil Walmart
Dumb Money, la recensione: Paul Dano e quel film biografico sul caso GameStop
Best Uf Sororities
Nail Salon Goodman Plaza
24 Hour Drive Thru Car Wash Near Me
Alfie Liebel
Labby Memorial Funeral Homes Leesville Obituaries
Nordstrom Rack Glendale Photos
Nevermore: What Doesn't Kill
Shreveport City Warrants Lookup
At&T Outage Today 2022 Map
Macu Heloc Rate
Crossword Help - Find Missing Letters & Solve Clues
4 Times Rihanna Showed Solidarity for Social Movements Around the World
13301 South Orange Blossom Trail
Jazz Total Detox Reviews 2022
Mchoul Funeral Home Of Fishkill Inc. Services
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Hoofdletters voor God in de NBV21 - Bijbelblog
Syracuse Jr High Home Page
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Frostbite Blaster
Eleceed Mangaowl
Edict Of Force Poe
The Complete Guide To The Infamous "imskirby Incident"
Bismarck Mandan Mugshots
Dying Light Nexus
Lamont Mortuary Globe Az
Penny Paws San Antonio Photos
[Teen Titans] Starfire In Heat - Chapter 1 - Umbrelloid - Teen Titans
Arcanis Secret Santa
Go Nutrients Intestinal Edge Reviews
All Buttons In Blox Fruits
Otter Bustr
Cognitive Function Test Potomac Falls
Coors Field Seats In The Shade
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 6033

Rating: 4.3 / 5 (74 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.