Introduction To PAM
Introduction To PAM
March 2020
Privileged access management
What is it?
Gartner has named privileged access management the #1 cyber security priority for organisations. But what
exactly does privileged access management entail?
‘Privileged access’ encompasses access to critical systems - computers, networks and network devices, software
applications and other digital assets. Privileged access management (PAM) is thus, the combination of tools and
technology used to secure, control and monitor access to an organisation’s critical information and resources.
https://www.netprotocol.net/gartner-privileged-access-management-is-the-1-cyber-security-priority/
http://blog.wallix.com/what-is-privileged-access-management-pam
http://blog.wallix.com/privileged-access-management-features-pam-features
Session Manager Password Manager
https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 2
Key components of PAM
An overview
http://blog.wallix.com/privileged-access-management-features-pam-features
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 3
Why do organisations need PAM?
Overview
A standard data breach can cost and organisation an average of USD3.92 million. Enterprises that prioritise
privileged credential security are able to ensure that their operations will not be interrupted by a breach, hence
by creating a formidable competitive advantage over their peers in time and costs.
of healthcare employees
18% would sell confidential data
74% for just USD500 to USD1000
(Source: Accenture)
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 4
Why do organisations need PAM?
Benefits of PAM
https://www.netprotocol.net/gartner-privileged-access-management-is-the-1-cyber-security-priority/
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 5
How breaches could have been prevented with PAM
Case study: Capital One Bank
One of the most high profile cases of 2019 was the data breach of Capital One Bank, of which over 100 million customer
accounts and credit card applications were exposed.
Consequences:
As a result of the breach, the following were stolen from Capital One’s
database:
- More than 140,000 social security numbers
- 1 million Canadian Social Insurance numbers
- 80,000 pieces of banking and credit information
- Undisclosed number of names, addresses, credit scores, and more Read more: The New York Times
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 6
How breaches could have been prevented with PAM
Case study: Facebook
In October 2019, global social media giant, Facebook, encountered yet another data breach when hackers took over a
single account belonging to one of its biggest data partners.
Consequences:
Using that access, hackers ran a series of ads on LiveRamp’s customer accounts
on Facebook. They spent thousands of those victims’ dollars to trick viewers
into buying fake products.
One of the ads had been viewed more than 60,000 times and directed visitors
to a page designed to steal people’s credit card numbers.
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 7
How breaches could have been prevented with PAM
Case study: Marriott International
In late 2018, hotel chain Marriott International discovered unauthorised access within Starwood’s reservation system, a
subsidiary Marriott acquired in 2016.
Internal investigation determined that Starwood’s network was compromised in 2014, which meant that there had been
unauthorised access for 4 years into Starwoods’ systems by the time it was found out.
The user credentials were stolen using a Remote Access Trojan (RAT)
along with Mimikatz, a tool used to find out username/password
combos in system memory, that were placed onto the server.
Consequences:
Up to 500 million guest records were stolen, including extremely
sensitive information like credit card and passport numbers.
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 8
How breaches could have been prevented with PAM
1. Real-time session monitoring could have caught and detected the suspicious activities of hackers,
terminated such sessions, and alerted the security teams, preventing an incident from happening.
2. The segmentation of user privileges could have prevented hackers from bouncing from one
resource to another.
3. Besides multi-factor authentication (MFA), PAM also checks for circumstances surrounding
privileged access (e.g. time and IP location). If caught as unauthorised, access would be denied
even if credentials were otherwise valid.
4. A strong PAM solution would have hidden the very existence of sensitive resources to users who
do not have privileged access. If hackers were in the system with credentials that have no
database access, they would not even be able to see personal information, much less query
against it and retrieve it.
http://blog.wallix.com/biggest-data-breaches-2019
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd Cyber 101 9
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities. DTTL (also referred to as
“Deloitte Global”) and each of its member firms and their affiliated entities are legally separate and independent entities. DTTL does not provide services to clients.
Please see www.deloitte.com/about to learn more.
Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax & legal and related services. Our global network of member
firms and related entities in more than 150 countries and territories (collectively, the “Deloitte organisation”) serves four out of five Fortune Global 500® companies.
Learn how Deloitte’s approximately 312,000 people make an impact that matters at www.deloitte.com.
Deloitte Asia Pacific Limited is a company limited by guarantee and a member firm of DTTL. Members of Deloitte Asia Pacific Limited and their related entities, each of
which are separate and independent legal entities, provide services from more than 100 cities across the region, including Auckland, Bangkok, Beijing, Hanoi, Ho Chi
Minh City, Hong Kong, Jakarta, Kuala Lumpur, Manila, Melbourne, Osaka, Shanghai, Singapore, Sydney, Taipei, Tokyo and Yangon.
This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the
“Deloitte Network”) is, by means of this communication, rendering professional advice or services. Before making any decision or taking any action that may affect your
finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained
by any person who relies on this communication.