Regional Manager/ Service Delivery Manager at a tech services company with 201-500 employees
28
Published:Dec 11, 2021
What is Privileged Account Management (PAM)?
Privileged account management can be defined as managing and auditing account and data access by privileged users.
A privileged user is someone who has administrative access to critical systems. For instance, anyone who can set up and delete user accounts and roles on your Oracle database is a privileged user.
Like any privilege, a privileged account should only be extended to trusted people. You only give accounts with “root” privileges (like the ability to change system configurations, install software, change user accounts, or access secure data) to those that you trust. However, as the old saying goes, you should “trust but verify”.
Even trusted access needs to be controlled and monitored. That’s what privileged account management is for. Companies need to maintain the ability to revoke privilege at any time. And ideally, most account privileges should either automatically sunset or else be subject to periodic review. The best practice is to limit privileges to those who actively need them.
Doing all this manually, depending on the size and complexity of your organization, is either time-consuming or impossible.
But the scary reality is that stealing and exploiting privileged accounts is a critical success factor for attackers in virtually all advanced attacks, regardless of attack origin. Privileged accounts are quite literally the keys to your IT kingdom. Forget about all that “people are our most valuable asset” nonsense, we all know that your data is the most valuable asset for virtually any organization.
The larger and more complex your organization’s IT systems are; the more privileged users you have. Privileged users can be employees or contractors, remote or local, human or automated
How Does PAM Work?
PAM – Privileged Account Management – protects your systems from accidental or deliberate misuse of privileged accounts.
PAM offers a scalable and secure way to authorize and monitor all privileged accounts across all your systems. It allows you to:
Grant privileges to users only for systems on which they are authorized.
Grant access only when it’s needed and revoke access as soon as the need expires.
Eliminate local/direct system passwords for privileged users.
Centrally manage access over a disparate set of heterogeneous systems.
Create an unalterable audit trail for any privileged operation.
Components of a PAM Solution
Privileged Account Management solutions vary, but most offer the following components:
Access Managers – govern access to privileged accounts. They provide a single point of policy definition and policy enforcement for privileged account management. A privileged user requests access to a system through the Access Manager. The Access Manager knows which systems the user can access and at what level of privilege. A super admin can add/modify/delete privileged user accounts on the Access Manager in a centralized system—thus greatly improving efficiency and effective compliance levels.
Password Vaults– PAM systems keep passwords in a secure vault. All system access is via the Password vault. Thus, end users never have direct access to root passwords.
Session Managers – Session Managers track all actions taken during a privileged account session for future review and auditing. Further, some systems can prevent malicious or unauthorized actions and/or alert Super Admins if suspicious activity is detected.
Identity Management is crucial for modern companies to ensure security, compliance, and enhance user experience. Businesses should consider the following aspects:
Security enhancements
Regulatory compliance
User access control
Efficiency improvements
Cost reduction
Importance of Identity Management is underscored by its ability to streamline user authentication and authorization processes, whic...
Identity Management is crucial for modern companies to ensure security, compliance, and enhance user experience. Businesses should consider the following aspects:
Security enhancements
Regulatory compliance
User access control
Efficiency improvements
Cost reduction
Importance of Identity Management is underscored by its ability to streamline user authentication and authorization processes, which significantly heightens security. Implementing effective IM systems minimizes the risk of identity theft and reduces exposure to data breaches. With IM solutions, companies can enforce policies ensuring that only authorized personnel have access to critical assets. This is accomplished through multi-factor authentication, role-based access control, and periodic audits. By restricting access based on roles and responsibilities, organizations can better protect sensitive information.Regulatory compliance is another vital aspect of Identity Management’s importance to businesses. Many industries are governed by stringent regulations requiring rigorous identity verification and data protection protocols. IM systems help businesses meet compliance standards such as GDPR, HIPAA, and others by providing detailed access logs and management. This ensures that companies are prepared for audits and reduces liability related to non-compliance. Additionally, the automation of user management processes through IM can lead to increased efficiency, reducing manual workloads and associated costs. Efficient identity solutions streamline user provisioning and de-provisioning, enhancing operational agility and reducing the risks of outdated or incorrect user access.
The Twilio incident shows that even tech-savvy companies can fall victim to well-crafted social engineering. Here's what I think we need to focus on:
First, we have to tackle phishing beyond just email.
Look, most anti-phishing tools are great at catching sketchy emails, but SMS phishing? That's a whole different game. The attackers were smart - they sent texts pretending to be from IT saying "...
IDM Engineer at a tech services company with 51-200 employees
Aug 10, 2022
In case of sophisticated social engineering attack designed to steal employee credentials there is a need to pay attention regarding education of employee first and if not already in place apply Zero Trust approach by implementing OTP and using it as mandatory for all employees. Any technical solution is not good enough to avoid willing leak of employee credentials by themself.
The Twilio incident shows that even tech-savvy companies can fall victim to well-crafted social engineering. Here's what I think we need to focus on:
First, we have to tackle phishing beyond just email.
Look, most anti-phishing tools are great at catching sketchy emails, but SMS phishing? That's a whole different game. The attackers were smart - they sent texts pretending to be from IT saying "your password expired" or "your schedule changed." Classic urgency tactics.
What we need:
Regular training that actually covers SMS and voice phishing scenarios. Not just the standard "don't click suspicious links" email training we've all sat through a million times
Work with telecom providers to get some SMS filtering in place (yeah, it's harder than email filtering, but it's necessary)
A simple rule: If someone texts you asking for credentials, pick up the phone and call IT directly. Old school verification still works
Second, we need to get serious about access management.
This is where Zero Trust and IGA come into play. Basically, stop trusting anyone by default - even your employees.
Here's what actually works:
Lock down access based on context. If Bob from accounting suddenly logs in from Romania at 3 AM, maybe don't let him access the financial systems?
Time-based access is huge. Why does anyone need 24/7 access to sensitive systems? Give people access during their work hours, from their usual devices
Get rid of SMS-based MFA yesterday. Hardware keys aren't sexy, but they work. Twilio learned this the hard way
Keep privileges tight. Does Sarah really need admin access to that system she uses once a quarter? Probably not. Give her temporary access when she needs it
The bottom line? Even if someone steals credentials through phishing, they shouldn't be able to waltz into your systems. Make them jump through hoops - legitimate users won't mind the extra security if you explain why it's there.
These aren't revolutionary ideas, but the Twilio breach shows we're still not doing the basics right. It's time to stop treating security as a checkbox exercise and actually implement these controls properly.
Download our free Access Management Report and find out what your peers are saying about Microsoft, Okta, Ping Identity, and more! Updated: January 2026.