Organizations can use the Privileged Account Management NIST Cybersecurity Practice Guide to appropriately secure and enforce organizational policies for privileged account use.
Privileged account management (PAM) is a domain within identity and access management (IdAM) that focuses on monitoring and controlling the use of privileged accounts. Privileged accounts include local and domain administrative accounts, emergency accounts, application management, and service accounts. These powerful accounts provide elevated, often nonrestricted, access to underlying IT resources and technology, which is why external and internal malicious actors seek to gain access to them. It is critical to monitor, audit, control, and manage privileged account usage.
The reference design highlights how organizations can add a security layer between users and the privileged accounts they access and includes representative use-case scenarios to address specific challenges that the financial services sector faces. The PAM reference design shows how monitoring, auditing, and authentication controls can combine to prevent unauthorized access to, and allow rapid detection of unapproved use of privileged accounts.
Organizations implementing a Privileged Account Management system are able to protect, monitor, and audit privileged account access, and reduce the possibility of data destruction, data exfiltration, ransomware attacks, and system failure.
Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.
A Community of Interest (COI) is a group of professionals and advisors who share business insights, technical expertise, challenges, and perspectives to guide NCCoE projects. COIs often include experts, innovators, and everyday users of cybersecurity and privacy technologies. Share your expertise and consider becoming a member of this project's COI.