A Guide To Endpoint Privilege Management
A Guide To Endpoint Privilege Management
A Guide to
Endpoint Privilege
Management
A Guide to Endpoint Privilege Management
TABLE OF CONTENTS
Executive Summary 3
Why BeyondTrust 18
About BeyondTrust 20
2
A Guide to Endpoint Privilege Management
E X E C U T I V E S U M M A RY
3
A Guide to Endpoint Privilege Management
The majority (83% in 2023) of breaches were perpetrated by external threat actors.
However, insiders also pose a major threat in two different ways, accounting for
19% of data breaches in 2023. Some insiders are malicious and intentionally harm
the organization, but insiders are also twice as likely to harm the organization
through inadvertent mistakes that jeopardize sensitive data (such as via exposure
of cloud buckets) or critical systems.2
1
SOURCE: 2023 Cost of a Data Breach Report. IBM. July 2023
2
SOURCE: 2023 Data Breach Investigations Report. Verizon. June 2023 4
A Guide to Endpoint Privilege Management
Identities are also a huge factor. 90% of organizations reported one or more identity-related
security incidents in 2023.5 Stolen credentials often play a role. More than 45% of data breaches
in 2023 were perpetrated using stolen credentials, which are frequently acquired via social
engineering campaigns like phishing, smishing, or pretexting.6
Cloud identities, which are proliferating across platforms like AWS, Azure, and Google Cloud,
also pose substantial risks. In 99% of pentesting cases conducted by IBM’s X-Force Red, cloud
identities were found to be over-privileged. This excess privileged attack surfaced enabled these
pentesters to quickly compromise client cloud environments.7
The most common endpoint type that threat actors target are servers, allowing them to gain
access to the critical applications and processes as well as the sensitive data that organizations
often host on them. In 2023, more than 80% of breaches affected a server, demonstrating how
important a strong security posture is for server deployments.8
3
SOURCE: 2023 State of Malware Report. Malwarebytes. April 2023
4
SOURCE: 2023 Data Breach Investigations Report. Verizon. June 2023
5
SOURCE: IDSA 2023 Trends in Securing Digital Identities. IDSA. June 2023
6
SOURCE: 2023 Data Breach Investigations Report. Verizon. June 2023
7
SOURCE: X-Force Cloud Threat Landscape Report 2023. IBM. Sept 2023
5
8
SOURCE: 2023 Data Breach Investigations Report. Verizon. June 2023
A Guide to Endpoint Privilege Management
Windows Vulnerabilities
and Threats
7%
INCREASE
for an
all-time
high
6
A Guide to Endpoint Privilege Management
macOS and
Linux Threats
Many organizations focus their security efforts on their Windows estates, assuming that macOS
and Linux endpoints are immune to the threats that plague Windows endpoints. While it may
have once been true that attackers paid little attention to macOS or Linux endpoints, that is no
longer the reality.
Mac usage in enterprise settings is growing rapidly, with some research firms estimating it will
increase by as much as 20% in 2024.9 Those Mac endpoints are often used by two types of risky
users:
• High-level executives,
• And highly technical developers and engineers.
Attackers are increasing their focus on macOS endpoints, as evidenced by Mac malware
detections growing by 31% in enterprise settings in recent years.10 Without a strong security
posture, organizations risk attackers breaching their high-value macOS endpoints.
Linux endpoints present an even more dire enterprise threat. Once considered inherently secure,
Linux is an increasingly attractive target for attackers.
9
SOURCE: (IDC) Worldwide Quarterly Personal Computing Device Tracker. IDC. Aug. 28, 2023
10
SOURCE: 2021 State of Malware report. Malwarebytes. Feb 2021
11
SOURCE: The Linux Threat Landscape Report. Trend Micro. Aug 2023 7
A Guide to Endpoint Privilege Management
When a user has local administrator rights or unrestricted access to root, that means they have
privileges to perform most, if not all, functions within an operating system on a computer. These
privileges can include such tasks as installing software and hardware drivers, changing system
settings or installing updates, and executing commands. With local admin rights, a user can
also create additional user accounts and change their passwords.
Many organizations auto-provision users with local admin rights on their desktops / laptops, or
provide unrestricted access to root, because it’s convenient. Users are happy and productive
because they can install or run any software they want.
However, this laxness in doling out broad privileges and entitlements greatly expands the
attack surface, opens the doors to attackers, can negatively impact compliance, and leaves
the organization extremely vulnerable to security breaches. Moreover, excess privilege often
generates far more service desk tickets due to the security and operational issues that
inevitably emerge.
Although the least privilege approach was conceived over 40 years ago, it remains arguably
the most essential security measure for organizations seeking to protect their estate against
modern and legacy cyberthreats.
8
A Guide to Endpoint Privilege Management
At the most basic level, application control is enacted via the creation of allow and deny lists,
which enable organizations to specify indexes of applications that are either permitted on an
endpoint or prohibited. This ensures only authorized and trusted applications are allowed to run,
thereby preventing the execution of potentially malicious or unauthorized applications. Some
mature application control technologies can exercise granular control around which specific
application subfunctions and processes can run, and in what context.
9
A Guide to Endpoint Privilege Management
What is Endpoint
Privilege Management?
Endpoints are devices where users log on and applications run.
This includes Windows, macOS, and Linux computer systems,
laptops, desktops, and servers, as well as IoT devices, operational
technology (OT) systems, networking devices, and more.
In many organizations, some (or all) users have full local administrative rights, which in
essence means they have limitless privileges to execute, install, run, or change anything
on their endpoint. A considerable downside is that this also means malware can run with
elevated privileges, security controls can be bypassed, and software can be installed
and executed with no control or visibility, by a threat actor. It also means a user could
inadvertently make changes that have big security or operational implications, potentially
even at massive scale, depending on their role.
10
A Guide to Endpoint Privilege Management
Cloud and multicloud environments have further exacerbated the problem of excess privilege, while
also obfuscating the level of privilege identities may have at any given moment. There are over
40,000 permissions across key cloud infrastructure platforms that can be granted to identities. An
estimated 50% of cloud identities are high-risk and have Super-Admin-like privileges.12
Endpoint privilege management is the process of providing users just enough access, at just the
right time to remain productive in their roles—without giving them full administrative rights over an
IT system.
Removing local admin rights and adopting a least privilege approach has historically mitigated
75% of Microsoft’s critical vulnerabilities. Not only does endpoint privilege management mitigate
vulnerabilities, it also protects against dangerous zero-day threats.13
12
SOURCE: 2023 State of Cloud Permissions Risk Report. Microsoft. March 2023
13
SOURCE: 2023 Microsoft Vulnerabilities Report. BeyondTrust. March 2023.
11
A Guide to Endpoint Privilege Management
Benefits of Implementing
an Endpoint Privilege
Management Solution
Evaluating &
Implementing a Solution
Balancing security and user productivity is one of the central struggles at the heart of many security
technologies, including PEDM. You need to strike the right balance to keep your endpoint estate
secure, while also maintaining operational productivity. Achieving one without the other doesn’t
result in long-term success for anyone.
The right endpoint privilege management solution will not only help you minimize the attack
surface, but also improve admin efficiency—without sacrificing the experience of all the end users
across your enterprise.
Introducing BeyondTrust
Endpoint Privilege
Management
BeyondTrust Endpoint Privilege Management enables organizations
to eliminate unnecessary privileges, implement zero trust controls,
satisfy specific cyber insurance qualification requirements, and
solve some of the most critical and foundational security challenges
across Windows, macOS, and Linux endpoints. The solution works
seamlessly across cloud and on-premises environments, and also
can enforce security best practices across your DevOps and CI/CD
workflows.
13
A Guide to Endpoint Privilege Management
1
Remove unnecessary privileges to
achieve least privilege
Endpoint Privilege Management empowers you to remove local admin rights, control
root access, and implement true least privilege and zero trust security across
Windows, macOS, and Linux desktops and servers—all without compromising end-
user productivity.
2
Control the applications users
can install or run
BeyondTrust Endpoint Privilege Management empowers you to proactively
restrict which applications users can install or run through fine-grained, policy-
based controls. This helps prevent the installation or execution of unauthorized or
potentially harmful applications.
3
Protect against external cyberthreats
Endpoint Privilege Management safeguards against common cyberattack vectors
by enforcing least privilege, limiting the risk of lateral movement by an attacker,
preventing unauthorized execution of malicious code, and enabling the restriction
of common attack chain tools. The BeyondTrust solution includes advanced controls
that can even intelligently thwart tricky fileless attacks and sneaky living-off-the-land
(LotL) exploits.
14
A Guide to Endpoint Privilege Management
4
Protect against internal threats
and errors
Endpoint Privilege Management helps your users work better. The BeyondTrust
solution protects against internal threats by enabling true least privilege. End users
will have just enough access, at just the right time, to only the appropriate application
or process. The solution also enhances security by reducing errors. For instance, the
product has a policy language that can elevate Linux commands just-in-time and
inspect all the options and switches (including what is embedded in scripts). This
allows it to identify malformed or inappropriate commands.
5
Pass audits and achieve
compliance with regulations
Endpoint Privilege Management equips you with the tools needed to simplify the
audit process and ensure compliance to diverse regulatory requirements. Granular
access controls, a single unimpeachable audit trail of all privileged user activity, and
secure central management do the heavy lifting, so you won’t have to.
6
Integrate other critical
security solutions
Endpoint Privilege Management seamlessly integrates with a customer’s existing
security technology solutions, enhancing overall visibility and operations,
thereby improving the effectiveness of existing solutions. Seamless, out-of-the-
box integrations include ITSM, SIEM, MFA, BeyondTrust Active Directory Bridge,
BeyondTrust Password Safe, and more
15
A Guide to Endpoint Privilege Management
16
A Guide to Endpoint Privilege Management
This means that you can operationalize Endpoint Privilege Management overnight to make quick
security gains that can be refined over time. This secure baseline allows you to significantly climb
the security scale without impacting user productivity. No other endpoint privilege management
product offers this level of convenience, flexibility, and speed during deployment.
17
A Guide to Endpoint Privilege Management
QuickStart policy templates enable BeyondTrust customers to get up and running with Endpoint
Privilege Management overnight and make substantial security gains. Once you’ve implemented this
baseline, you can continually build onto it thanks to detailed, intuitive user activity tracking.
Endpoint Privilege Management allows you to closely monitor user activity. This includes what
applications they’re trying to install or run, what operating system settings they’re trying to change,
and common areas where their productivity could be getting blocked. This data is served as intuitive
insights, which you can seamlessly apply to update your policies, helping continuously strengthen
your security posture as your organization changes.
18
A Guide to Endpoint Privilege Management
Why BeyondTrust
BeyondTrust has paved the way for innovation with 25+ years
in the Endpoint Privilege Management and Privileged Access
Management (PAM) spaces. In 2023, we release 100+ new features
for our Endpoint Privilege Management solution. We are also
annually named by the top-tier industry analysts as a PAM leader
and are recognized for the strength of our endpoint privilege
management capabilities.
19
A Guide to Endpoint Privilege Management
“Everybody tries to sell you the world and then gives you a little bit.
BeyondTrust is different. They have given us more than we even
knew was possible.”
“If you are looking for a solution that allows you to quickly and
easily eliminate admin rights, I have no hesitation recommending
[Endpoint Privilege Management] to any organization.”
20
A Guide to Endpoint Privilege Management
21
A Guide to Endpoint Privilege Management
Next Steps
& Resources
Hopefully this guide has shed light on how endpoint privilege
management works, highlighting the quick wins and long-term
benefits implementing least privilege and application control can
provide your organization.
BeyondTrust is the worldwide leader in intelligent identity and access security, enabling
organizations to protect identities, stop threats, and deliver dynamic access. We are leading
the charge in innovating identity-first security and are trusted by 20,000 customers, including
75 of the Fortune 100, plus a global ecosystem of partners.
beyondtrust.com
22