Link to home
Start Free TrialLog in
Avatar of Sake MadanMohan
Sake MadanMohanFlag for India

asked on

Looking for Standard role based Access Management-PAM solution /Privileged account/Access management with Only Native Tools.

Hi All,

I am seeking your help on the below situation. Please advise me well defined solution to proceed further.I am  also looking for any documents/Workflows/PPT for references.

Objective :

•      Human errors are happening because of  using elevated privileged access
•      Excess rights given to L1 and L2 teams to perform the tasks
•      Accessing production environment with privileged rights, when is not needed /working on non prod environment
•      Usage of Privileged access on prod environment for non admin tasks, leading to human error

Current Status:

•      We have Verified few  projects internally they are using Tool Based PAM (Privileged Access management) Solution and defined process  
•      Most of the Projects don’t have tool based solution and all support team have privileged Access, few projects have role based access implemented and Few projects have
        customized solution for access management for specific towers like (Windows,Unix,Storage).

Target Status (or) Solution needed :  

•      We are looking for standard role based Access Management-PAM solution with Native Tools.


Thanks in Advance.
Madan.
Avatar of John Tsioumpris
John Tsioumpris
Flag of Greece image

The Microsoft-Access tag is wrong....its about security...please fix it...so the right experts can work on it.
Avatar of btan
btan

PAM separates privileged accounts from an existing Active Directory environment. When a privileged account needs to be used, it first needs to be requested, and then approved. It is part of Microsoft Identity Manager.

As an example, let’s say a user was a member of an administrative group before PIM is set up. As part of PIM setup, the user is removed from the administrative group, and a policy is created in MIM. The policy specifies that if that user requests administrative privileges and is authenticated by MFA, the request is approved and a separate account for the user will be added to the privileged group in the bastion forest.

https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services
Avatar of Sake MadanMohan

ASKER

Dear All,

Thanks for your inputs but I am looking for well defined PAM solution by using native tools for all towers like windows Linux and Storage and Network .

Please advice awaiting for your inputs and solution .

Thanks,
Madan.
Then this may be of interest. Look at SP 1800-18B: Approach, Architecture, and Security Characteristics. The table 6-1 lists reference design capabilities, their functions, and the addressed subcategories, along with the products that we used to instantiate each capability in the implementation.

The example solutions illustrated in this practice guide are intended to offer a broad set of examples of PAM deployments. An organization implementing PAM should consider an implementation that is consistent with its risk management decisions.

https://www.nccoe.nist.gov/projects/use-cases/privileged-account-management
This question needs an answer!
Become an EE member today
7 DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform.
View membership options
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.