SlideShare a Scribd company logo
An introduction to privileged access management
March 2020
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 2
What is it?
Privileged access management
https://www.netprotocol.net/gartner-privileged-access-management-is-the-1-cyber-security-priority/
http://blog.wallix.com/what-is-privileged-access-management-pam
http://blog.wallix.com/privileged-access-management-features-pam-features
https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam
What does it comprise?
While PAM solutions vary in their design, most of them consist of these
three components:
• Access Manager – Manage all employee access from a single portal
• Session Manager – Monitor all privileged user actions in real-time
• Password Manager – Protect passwords and enforce password policies
Session Manager Password Manager
Access Manager
T
e
x
t
Privileged Access
Management
Gartner has named privileged access management the #1 cyber security priority for organisations. But what
exactly does privileged access management entail?
‘Privileged access’ encompasses access to critical systems - computers, networks and network devices, software
applications and other digital assets. Privileged access management (PAM) is thus, the combination of tools and
technology used to secure, control and monitor access to an organisation’s critical information and resources.
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 3
An overview
Key components of PAM
http://blog.wallix.com/privileged-access-management-features-pam-features
The Session Manager provides real-time monitoring of
privileged users to prevent and detect suspicious activity. It
tracks and creates an audit trail of actions taken during a
privileged account session.
The Password Manager helps with controlling passwords
and enforcing password policies. This allows regular
rotation and revocation of passwords while maintaining
them in a centralised and encrypted vault.
The Access Manager helps security teams to manage all
employee access on a single portal, from which:
- Privileged user can request access, and
- Administrators can disable a privileged user’s access
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 4
Overview
Why do organisations need PAM?
74%
of data breaches start with
privileged credential abuse
(Source: Centrify)
of healthcare employees
would sell confidential data
for just USD500 to USD1000
(Source: Accenture)
of employees know of someone
who has sold privileged credentials
to outsiders
(Source: Accenture)
18%
24%
A standard data breach can cost and organisation an average of USD3.92 million. Enterprises that prioritise
privileged credential security are able to ensure that their operations will not be interrupted by a breach, hence
by creating a formidable competitive advantage over their peers in time and costs.
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 5
Benefits of PAM
Why do organisations need PAM?
Powerful security solution
• PAM is a powerful security solution that can be used to improve insights into vulnerability
assessments, IT network inventory scanning and identity governance, among other things. This
enhancement of cyber security serves as a deterrence to many cyber criminals.
Saves time and money
• Most cyber security solutions only reduce risk but bring no additional business value. However,
employing the right PAM solution can increase productivity by giving employees access to systems
and applications faster and more securely. This enables CISOs to get more done with the same
budget.
Fast track to compliance
• With strong security control recommendations, PAM develops a good baseline of policies that can
help to fast-track your compliance standards to align with industry and government regulations.
Quick recovery from cyber-attacks
• A PAM solution enables you to quickly audit privileged accounts that have been used recently,
identify passwords that have been changed, and determine which applications have been executed.
https://www.netprotocol.net/gartner-privileged-access-management-is-the-1-cyber-security-priority/
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 6
Case study: Capital One Bank
How breaches could have been prevented with PAM
Read more: The New York Times
One of the most high profile cases of 2019 was the data breach of Capital One Bank, of which over 100 million customer
accounts and credit card applications were exposed.
How the breach occurred:
Paige Thompson, former Amazon AWS employee (Capital One’s cloud hosting
service), took advantage of misconfigurations in Capital One’s cloud services
and firewalls. She bypassed the firewalls, used web application firewall
credentials to obtain privilege escalation and gained access to more and more
sensitive data.
Consequences:
As a result of the breach, the following were stolen from Capital One’s
database:
- More than 140,000 social security numbers
- 1 million Canadian Social Insurance numbers
- 80,000 pieces of banking and credit information
- Undisclosed number of names, addresses, credit scores, and more
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 7
Case study: Facebook
How breaches could have been prevented with PAM
Read more: Cnet
In October 2019, global social media giant, Facebook, encountered yet another data breach when hackers took over a
single account belonging to one of its biggest data partners.
How the breach occurred:
Hackers commandeered the personal account of a LiveRamp employee who
had privileged access to advertising accounts on Facebook. Using that personal
account, hackers gained access to the company’s Business Manager account,
allowing them to run ads with LiveRamp’s customers’ money.
Consequences:
Using that access, hackers ran a series of ads on LiveRamp’s customer accounts
on Facebook. They spent thousands of those victims’ dollars to trick viewers
into buying fake products.
One of the ads had been viewed more than 60,000 times and directed visitors
to a page designed to steal people’s credit card numbers.
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 8
Case study: Marriott International
How breaches could have been prevented with PAM
Read more: CSO Online
In late 2018, hotel chain Marriott International discovered unauthorised access within Starwood’s reservation system, a
subsidiary Marriott acquired in 2016.
Internal investigation determined that Starwood’s network was compromised in 2014, which meant that there had been
unauthorised access for 4 years into Starwoods’ systems by the time it was found out.
How the breach occurred:
Attackers managed to take control of a user account with privileged
access to make a database query.
The user credentials were stolen using a Remote Access Trojan (RAT)
along with Mimikatz, a tool used to find out username/password
combos in system memory, that were placed onto the server.
Consequences:
Up to 500 million guest records were stolen, including extremely
sensitive information like credit card and passport numbers.
Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 9
How breaches could have been prevented with PAM
How PAM might have helped
1. Real-time session monitoring could have caught and detected the suspicious activities of hackers,
terminated such sessions, and alerted the security teams, preventing an incident from happening.
2. The segmentation of user privileges could have prevented hackers from bouncing from one
resource to another.
3. Besides multi-factor authentication (MFA), PAM also checks for circumstances surrounding
privileged access (e.g. time and IP location). If caught as unauthorised, access would be denied
even if credentials were otherwise valid.
4. A strong PAM solution would have hidden the very existence of sensitive resources to users who
do not have privileged access. If hackers were in the system with credentials that have no
database access, they would not even be able to see personal information, much less query
against it and retrieve it.
http://blog.wallix.com/biggest-data-breaches-2019
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities. DTTL (also referred to as
“Deloitte Global”) and each of its member firms and their affiliated entities are legally separate and independent entities. DTTL does not provide services to clients.
Please see www.deloitte.com/about to learn more.
Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax & legal and related services. Our global network of
member firms and related entities in more than 150 countries and territories (collectively, the “Deloitte organisation”) serves four out of five Fortune Global 500®
companies. Learn how Deloitte’s approximately 312,000 people make an impact that matters at www.deloitte.com.
Deloitte Asia Pacific Limited is a company limited by guarantee and a member firm of DTTL. Members of Deloitte Asia Pacific Limited and their related entities, each of
which are separate and independent legal entities, provide services from more than 100 cities across the region, including Auckland, Bangkok, Beijing, Hanoi, Ho Chi
Minh City, Hong Kong, Jakarta, Kuala Lumpur, Manila, Melbourne, Osaka, Shanghai, Singapore, Sydney, Taipei, Tokyo and Yangon.
About Deloitte Singapore
In Singapore, services are provided by Deloitte & Touche LLP and its subsidiaries and affiliates.
This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the
“Deloitte Network”) is, by means of this communication, rendering professional advice or services. Before making any decision or taking any action that may affect
your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever
sustained by any person who relies on this communication.
© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd

More Related Content

What's hot

Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
Aujas
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
M sharifi
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
Vigilant Software
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
Life Cycle Engineering
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
Julia Urbina-Pineda
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
Raleigh ISSA
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
uthayakumar174828
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
Capgemini
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
Charlie Pownall
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
Muhammad Sahputra
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 

What's hot (20)

Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Why ISO27001 For My Organisation
Why ISO27001 For My OrganisationWhy ISO27001 For My Organisation
Why ISO27001 For My Organisation
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 

Similar to Cyber 101: An introduction to privileged access management

Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
Infosec Train
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
ResearchFox
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
seadeloitte
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
joevest
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
aakash malhotra
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
Holly Vega
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
IAM
IAMIAM
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
International Journal of Modern Research in Engineering and Technology
 

Similar to Cyber 101: An introduction to privileged access management (20)

A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
IAM
IAMIAM
IAM
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
 

More from seadeloitte

Celebrating our people – Marites Landicho
Celebrating our people – Marites LandichoCelebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
seadeloitte
 
Celebrating our people - Bobby Christian
Celebrating our people - Bobby ChristianCelebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
seadeloitte
 
Celebrating our people - Jill Lim
Celebrating our people - Jill LimCelebrating our people - Jill Lim
Celebrating our people - Jill Lim
seadeloitte
 
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. ArnettCelebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
seadeloitte
 
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa DelgadoCelebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
seadeloitte
 
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik IshakCelebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
seadeloitte
 
Dtc event slide share
Dtc event slide shareDtc event slide share
Dtc event slide share
seadeloitte
 
Kids edu event slide share
Kids edu event slide shareKids edu event slide share
Kids edu event slide share
seadeloitte
 
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
seadeloitte
 
Celebrating our people - Thomas Chan
Celebrating our people - Thomas ChanCelebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
seadeloitte
 
Celebrating our people - Daniel Ng
Celebrating our people - Daniel NgCelebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
seadeloitte
 
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe BantocCelebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
seadeloitte
 
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa TanaraCelebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
seadeloitte
 
Celebrating our people - Anthony Loh
Celebrating our people - Anthony LohCelebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
seadeloitte
 
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa NawawiCelebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
seadeloitte
 
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. KiantiongCelebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
seadeloitte
 
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn BoonyusthianCelebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
seadeloitte
 
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha ThuCelebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
seadeloitte
 
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
seadeloitte
 
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
seadeloitte
 

More from seadeloitte (20)

Celebrating our people – Marites Landicho
Celebrating our people – Marites LandichoCelebrating our people – Marites Landicho
Celebrating our people – Marites Landicho
 
Celebrating our people - Bobby Christian
Celebrating our people - Bobby ChristianCelebrating our people - Bobby Christian
Celebrating our people - Bobby Christian
 
Celebrating our people - Jill Lim
Celebrating our people - Jill LimCelebrating our people - Jill Lim
Celebrating our people - Jill Lim
 
Celebrating our people - Joe M. Arnett
Celebrating our people - Joe M. ArnettCelebrating our people - Joe M. Arnett
Celebrating our people - Joe M. Arnett
 
Celebrating our people – Melissa Delgado
Celebrating our people – Melissa DelgadoCelebrating our people – Melissa Delgado
Celebrating our people – Melissa Delgado
 
Celebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik IshakCelebrating our people - Muhammad Ashik Ishak
Celebrating our people - Muhammad Ashik Ishak
 
Dtc event slide share
Dtc event slide shareDtc event slide share
Dtc event slide share
 
Kids edu event slide share
Kids edu event slide shareKids edu event slide share
Kids edu event slide share
 
Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh Celebrating our people - Joanne Loh
Celebrating our people - Joanne Loh
 
Celebrating our people - Thomas Chan
Celebrating our people - Thomas ChanCelebrating our people - Thomas Chan
Celebrating our people - Thomas Chan
 
Celebrating our people - Daniel Ng
Celebrating our people - Daniel NgCelebrating our people - Daniel Ng
Celebrating our people - Daniel Ng
 
Celebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe BantocCelebrating our people - Vergel Hoe Bantoc
Celebrating our people - Vergel Hoe Bantoc
 
Celebrating our people - Ellisa Tanara
Celebrating our people - Ellisa TanaraCelebrating our people - Ellisa Tanara
Celebrating our people - Ellisa Tanara
 
Celebrating our people - Anthony Loh
Celebrating our people - Anthony LohCelebrating our people - Anthony Loh
Celebrating our people - Anthony Loh
 
Celebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa NawawiCelebrating our people - Annalisa Nawawi
Celebrating our people - Annalisa Nawawi
 
Celebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. KiantiongCelebrating our people - Roy D. Kiantiong
Celebrating our people - Roy D. Kiantiong
 
Celebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn BoonyusthianCelebrating our people - Wimolporn Boonyusthian
Celebrating our people - Wimolporn Boonyusthian
 
Celebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha ThuCelebrating our people - Madam Thanh Ha Thu
Celebrating our people - Madam Thanh Ha Thu
 
Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin Celebrating our people - Pachanan Rattanagowin
Celebrating our people - Pachanan Rattanagowin
 
Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien Celebrating our people - Nguyen Kim Lien
Celebrating our people - Nguyen Kim Lien
 

Recently uploaded

Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
Chandigarh export services garal
 
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docxIslamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
amilabibi1
 
Bulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbitBulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbit
Orbit Messaging Hub
 
The Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docxThe Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docx
Industry Foods UK
 
DOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce ExcellenceDOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce Excellence
Himanshu
 
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
gitapress3
 
Earthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving EquipmentsEarthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving Equipments
earthmoverinternatio
 
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
Softradix Technologies
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
maitaicatamaran
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
time4servers technologies
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
RKIMT
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
Brendon Jonathan
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
JoyTree Global
 
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...
gitapress3
 
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Landscape Express
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
securexukweb
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
janhaviconaxweb
 
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi KadaleGet your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Pallavi Makeup Artist
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
Truxcargo
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
AmeliaLauren3
 

Recently uploaded (20)

Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098Chandigarh call garal serives 9512450098
Chandigarh call garal serives 9512450098
 
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docxIslamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
Islamabad No 1 Amil Baba In Pakistan amil baba kala ilm.docx
 
Bulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbitBulk SMS Service Provider In Mumbai | sms2orbit
Bulk SMS Service Provider In Mumbai | sms2orbit
 
The Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docxThe Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docx
 
DOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce ExcellenceDOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce Excellence
 
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...
 
Earthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving EquipmentsEarthmovers: Top Earth Moving Equipments
Earthmovers: Top Earth Moving Equipments
 
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...
 
Waikiki Sunset Catamaran ! MAITAI Catamaran
Waikiki Sunset Catamaran !  MAITAI CatamaranWaikiki Sunset Catamaran !  MAITAI Catamaran
Waikiki Sunset Catamaran ! MAITAI Catamaran
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
 
WORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa ServicesWORK PERMIT IN BULGARIA | Work Visa Services
WORK PERMIT IN BULGARIA | Work Visa Services
 
Colors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptxColors of Wall Paint and Their Mentally Properties.pptx
Colors of Wall Paint and Their Mentally Properties.pptx
 
Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100Delightful Finds: Unveiling the Power of Gifts Under 100
Delightful Finds: Unveiling the Power of Gifts Under 100
 
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...
 
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
Nature’s Paradise Glamorous And Sustainable Designs For Your Outdoor Living S...
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
 
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi KadaleGet your dream bridal look with top North Indian makeup artist - Pallavi Kadale
Get your dream bridal look with top North Indian makeup artist - Pallavi Kadale
 
Reliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - TruxcargoReliable Logistics Solutions - Truxcargo
Reliable Logistics Solutions - Truxcargo
 
Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!Are Gutters Necessary? Explore the details now!
Are Gutters Necessary? Explore the details now!
 

Cyber 101: An introduction to privileged access management

  • 1. An introduction to privileged access management March 2020
  • 2. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 2 What is it? Privileged access management https://www.netprotocol.net/gartner-privileged-access-management-is-the-1-cyber-security-priority/ http://blog.wallix.com/what-is-privileged-access-management-pam http://blog.wallix.com/privileged-access-management-features-pam-features https://www.beyondtrust.com/resources/glossary/privileged-access-management-pam What does it comprise? While PAM solutions vary in their design, most of them consist of these three components: • Access Manager – Manage all employee access from a single portal • Session Manager – Monitor all privileged user actions in real-time • Password Manager – Protect passwords and enforce password policies Session Manager Password Manager Access Manager T e x t Privileged Access Management Gartner has named privileged access management the #1 cyber security priority for organisations. But what exactly does privileged access management entail? ‘Privileged access’ encompasses access to critical systems - computers, networks and network devices, software applications and other digital assets. Privileged access management (PAM) is thus, the combination of tools and technology used to secure, control and monitor access to an organisation’s critical information and resources.
  • 3. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 3 An overview Key components of PAM http://blog.wallix.com/privileged-access-management-features-pam-features The Session Manager provides real-time monitoring of privileged users to prevent and detect suspicious activity. It tracks and creates an audit trail of actions taken during a privileged account session. The Password Manager helps with controlling passwords and enforcing password policies. This allows regular rotation and revocation of passwords while maintaining them in a centralised and encrypted vault. The Access Manager helps security teams to manage all employee access on a single portal, from which: - Privileged user can request access, and - Administrators can disable a privileged user’s access
  • 4. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 4 Overview Why do organisations need PAM? 74% of data breaches start with privileged credential abuse (Source: Centrify) of healthcare employees would sell confidential data for just USD500 to USD1000 (Source: Accenture) of employees know of someone who has sold privileged credentials to outsiders (Source: Accenture) 18% 24% A standard data breach can cost and organisation an average of USD3.92 million. Enterprises that prioritise privileged credential security are able to ensure that their operations will not be interrupted by a breach, hence by creating a formidable competitive advantage over their peers in time and costs.
  • 5. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 5 Benefits of PAM Why do organisations need PAM? Powerful security solution • PAM is a powerful security solution that can be used to improve insights into vulnerability assessments, IT network inventory scanning and identity governance, among other things. This enhancement of cyber security serves as a deterrence to many cyber criminals. Saves time and money • Most cyber security solutions only reduce risk but bring no additional business value. However, employing the right PAM solution can increase productivity by giving employees access to systems and applications faster and more securely. This enables CISOs to get more done with the same budget. Fast track to compliance • With strong security control recommendations, PAM develops a good baseline of policies that can help to fast-track your compliance standards to align with industry and government regulations. Quick recovery from cyber-attacks • A PAM solution enables you to quickly audit privileged accounts that have been used recently, identify passwords that have been changed, and determine which applications have been executed. https://www.netprotocol.net/gartner-privileged-access-management-is-the-1-cyber-security-priority/
  • 6. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 6 Case study: Capital One Bank How breaches could have been prevented with PAM Read more: The New York Times One of the most high profile cases of 2019 was the data breach of Capital One Bank, of which over 100 million customer accounts and credit card applications were exposed. How the breach occurred: Paige Thompson, former Amazon AWS employee (Capital One’s cloud hosting service), took advantage of misconfigurations in Capital One’s cloud services and firewalls. She bypassed the firewalls, used web application firewall credentials to obtain privilege escalation and gained access to more and more sensitive data. Consequences: As a result of the breach, the following were stolen from Capital One’s database: - More than 140,000 social security numbers - 1 million Canadian Social Insurance numbers - 80,000 pieces of banking and credit information - Undisclosed number of names, addresses, credit scores, and more
  • 7. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 7 Case study: Facebook How breaches could have been prevented with PAM Read more: Cnet In October 2019, global social media giant, Facebook, encountered yet another data breach when hackers took over a single account belonging to one of its biggest data partners. How the breach occurred: Hackers commandeered the personal account of a LiveRamp employee who had privileged access to advertising accounts on Facebook. Using that personal account, hackers gained access to the company’s Business Manager account, allowing them to run ads with LiveRamp’s customers’ money. Consequences: Using that access, hackers ran a series of ads on LiveRamp’s customer accounts on Facebook. They spent thousands of those victims’ dollars to trick viewers into buying fake products. One of the ads had been viewed more than 60,000 times and directed visitors to a page designed to steal people’s credit card numbers.
  • 8. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 8 Case study: Marriott International How breaches could have been prevented with PAM Read more: CSO Online In late 2018, hotel chain Marriott International discovered unauthorised access within Starwood’s reservation system, a subsidiary Marriott acquired in 2016. Internal investigation determined that Starwood’s network was compromised in 2014, which meant that there had been unauthorised access for 4 years into Starwoods’ systems by the time it was found out. How the breach occurred: Attackers managed to take control of a user account with privileged access to make a database query. The user credentials were stolen using a Remote Access Trojan (RAT) along with Mimikatz, a tool used to find out username/password combos in system memory, that were placed onto the server. Consequences: Up to 500 million guest records were stolen, including extremely sensitive information like credit card and passport numbers.
  • 9. Cyber 101© 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd 9 How breaches could have been prevented with PAM How PAM might have helped 1. Real-time session monitoring could have caught and detected the suspicious activities of hackers, terminated such sessions, and alerted the security teams, preventing an incident from happening. 2. The segmentation of user privileges could have prevented hackers from bouncing from one resource to another. 3. Besides multi-factor authentication (MFA), PAM also checks for circumstances surrounding privileged access (e.g. time and IP location). If caught as unauthorised, access would be denied even if credentials were otherwise valid. 4. A strong PAM solution would have hidden the very existence of sensitive resources to users who do not have privileged access. If hackers were in the system with credentials that have no database access, they would not even be able to see personal information, much less query against it and retrieve it. http://blog.wallix.com/biggest-data-breaches-2019
  • 10. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited (“DTTL”), its global network of member firms, and their related entities. DTTL (also referred to as “Deloitte Global”) and each of its member firms and their affiliated entities are legally separate and independent entities. DTTL does not provide services to clients. Please see www.deloitte.com/about to learn more. Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax & legal and related services. Our global network of member firms and related entities in more than 150 countries and territories (collectively, the “Deloitte organisation”) serves four out of five Fortune Global 500® companies. Learn how Deloitte’s approximately 312,000 people make an impact that matters at www.deloitte.com. Deloitte Asia Pacific Limited is a company limited by guarantee and a member firm of DTTL. Members of Deloitte Asia Pacific Limited and their related entities, each of which are separate and independent legal entities, provide services from more than 100 cities across the region, including Auckland, Bangkok, Beijing, Hanoi, Ho Chi Minh City, Hong Kong, Jakarta, Kuala Lumpur, Manila, Melbourne, Osaka, Shanghai, Singapore, Sydney, Taipei, Tokyo and Yangon. About Deloitte Singapore In Singapore, services are provided by Deloitte & Touche LLP and its subsidiaries and affiliates. This communication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively, the “Deloitte Network”) is, by means of this communication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person who relies on this communication. © 2020 Deloitte & Touche Enterprise Risk Services Pte Ltd