If you don’t lock your door, you can’t get too upset if someone wanders in and steals your stuff. Information security holds by a similar rule. If an IT asset is not well protected, it will get compromised. It’s almost guaranteed. Why, then, do we get so offended when intruders slip into our infrastructure through poorly guarded entrances? Perhaps we are more frustrated than angry. We want to “lock the doors,” but our tools won’t let us move fast enough.
Our tools are in a constant race to keep up with the rapid changes in IT.
Privileged account management is no exception to this race. For instance, as legacy systems gave way to distributed systems, privileged account management (PAM) has had to adapt to a bigger group of users. The proliferation of cloud computing platforms forced further PAM adaptation. More non-employee users and remote third party entities required access to newly exposed systems.
How do you want your PAM?The race rages on today with greater velocity and scope. One way that a PAM solution can respond to the challenge is to offer system owners multiple deployment options. Certainly, modern applications and data assets are no longer constrained by any one mode of deployment. We have applications and data in the cloud, on-premises, in colocation facilities and in a range of hybrid scenarios. PAM needs to be present and operating in any deployment environment and be flexible enough to match your evolving computing architecture.
The following are just a few examples of where the flavour of PAM deployment affects the efficacy of authentication and authorization (AU/AT) policy:
For each of the trends outlined above, there is a high probability of PAM circumvention if your PAM solution can’t keep up or prevents road-blocks to being utilized in the manner needed. Even a single circumnavigation creates a huge risk exposure. If PAM is delayed, or worse, totally ignored, as new IT assets are spun out into the cloud at high speed, the organization is vulnerable to unauthorized access. PAM only works when it is universally deployed and utilized.
Wallix offers a PAM solution approach that is ready for the new ways of working in IT. It’s time to get ready. You will be changing your architecture. One way or another you will be impacted by the adoption of cloud computing, APIs, and CI.
The WallixAdmin Bastion (WAB) combines a lightweight, agentless architecture with a choice of deployment options. WAB can be hosted on-premises, in the cloud or as a fully managed cloud service. The result is an ability to easily manage admin access privileges even when the architecture or deployment scenario changes quickly.
WAB creates a single gateway with single sign-on (SSO) for access by system admins. This capability enables senior cloud provider managers to define and enforce access policies for all classes of employees who need specific access rights. WAB lets admins manage access rights and passwords to servers and other devices through a single console. They can control access even when the target devices are hosted in multiple, independent cloud and on-premises environments. The admin does not know the actual server log in, only the log in for the PAM solution. Staff turnover becomes less of an issue with this level of control, ensuring that critical servers cannot be accessed by individuals no longer authorized to do so. WAB also makes it possible for admins to work on any device without needing a local log-in, a big advantage in the cloud’s geographically abstract environment.