{"id":19115,"date":"2018-01-02T05:55:39","date_gmt":"2018-01-02T05:55:39","guid":{"rendered":"https:\/\/sectona.com\/?p=19115"},"modified":"2022-12-06T09:49:48","modified_gmt":"2022-12-06T09:49:48","slug":"privileged-access-security-goals","status":"publish","type":"post","link":"https:\/\/sectona.com\/technology\/privileged-access-security-goals\/","title":{"rendered":"What should be your Privileged Access Security Goals for 2018?"},"content":{"rendered":"\n

While reading Ruchir Sharma\u2019s \u2018The Rise and Fall of Nations\u2019, I came across two interestingly coined terms \u2013 \u2018anchoring bias\u2019 and \u2018confirmation bias\u2019.\u202f <\/p>\n\n\n\n

Anchoring bias is the tendency to believe good times will last forever. Confirmation bias is the tendency to collect only the data that confirms one\u2019s existing beliefs. The book tries to convey the idea from a global economy perspective, where you should identify signs and be attentive to sniff the hidden and not-so-obvious signals.\u202f <\/p>\n\n\n\n

Now, you may think, why am I saying all this, and what is its relevance to privileged access security? Let me explain. <\/p>\n\n\n\n

Anchoring Bias in the Privileged Access Security Context<\/strong> <\/h2>\n\n\n\n

Often, in an enterprise setting, when a team implements a security solution, there arises a tendency for the team to believe that the solution can block hackers and bring compliance \u2013 this ever so slightly tends to the anchoring bias concept. In addition, the team would also tend to think they have covered all possible areas of cyberattacks and reduced attack surface.\u202f <\/p>\n\n\n\n

However, the reality is so long as an enterprise has critical assets, there will be attackers conspiring with their attack vectors.\u202f <\/p>\n\n\n\n

Cybersecurity<\/a>, in general, is never about \u201chappily ever after\u201d. It is a continuous process. It is a well-known fact that cyber attackers are inevitable. And it is up to the security team to ensure that they don\u2019t get into the anchoring bias but instead strive to keep fixing vulnerabilities. <\/p>\n\n\n\n

Similarly, you have evaluated and implemented a privileged access security product for your infrastructure and critical assets. But does that end there? Are you monitoring how the product has been implemented in line with your user or future architectural requirements? Are you on top of all the product capabilities, and which capability is of paramount priority for your user access? Are you assessing the adoption and usage of the product among all privileged users?\u202f <\/p>\n\n\n\n

Answers to these questions will guide you to an important decision for 2018 \u2013 the Re-evaluation of existing products. <\/p>\n\n\n\n

Confirmation Bias in the Privileged Access Security Context<\/strong> <\/h2>\n\n\n\n

Let\u2019s evaluate confirmation bias in the context of privileged access security.\u202f <\/p>\n\n\n\n

How to ensure that you are finding the correct vulnerabilities and not missing out on any critical weak points? Are you likely to be the victim of confirmation bias?\u202f <\/p>\n\n\n\n

You are a security expert. You have analyzed historical patterns, identified and zeroed in on the different types of attacks, and even predicted the kind of alleged attacks. Yet, there is a 0.1% chance that you may have given in to confirmation bias by only collecting enough data to analyze historical patterns and your predictions and beliefs of why past attacks happened and why some are predicted to happen. Based on this, you have identified and protected critical privileged accounts.\u202f <\/p>\n\n\n\n

But have you identified all the critical devices in your infrastructure (on-premise and cloud) stack? Have you accurately mapped all the privileged accounts associated with these devices? <\/p>\n\n\n\n

You may have considered all your internal privileged users. But what about external users such as third-party vendors & remote users?\u202f <\/p>\n\n\n\n

It is the age of remote users. Even internal users today can be considered remote users (courtesy of trends such as BYOD & offshore outsourcing). It has therefore become imperative today to focus on securing remote privileged access. Often, for collaborative activities to be facilitated for remote users, additional privileged accounts are created \u2013 sometimes known, in most cases unknown and unaccounted for, exposing security gaps for cyber attackers to leverage.\u202f <\/p>\n\n\n\n

This leaves you thinking that your privileged user security goal for 2018 should be a renewed collaboration-based privileged access security. <\/p>\n\n\n\n

Prioritize Privileged Access Security<\/strong> <\/h2>\n\n\n\n

It is recommended that you prioritize securing the Remote aspects of every privileged User. The goal is to understand your infrastructure’s in and out, including critical devices and users, and analyze all possible vulnerabilities and weak points. <\/p>\n\n\n\n

How Can Sectona Help?<\/strong> <\/h2>\n\n\n\n

At Sectona, we have engineered an advanced\u202fPrivileged Access Management (PAM).<\/a> We have\u202fdeveloped a unique\u202fcross-platform and collaborative PAM<\/a>\u202fsuite for enterprises and service providers of any size and scale. We are equipped to help you stay ahead of the curve from the PAM perspective with our renewed PAM approach. Check out our Sectona Privileged Access Management to learn more about our products. <\/p>\n","protected":false},"excerpt":{"rendered":"

While reading Ruchir Sharma\u2019s \u2018The Rise and Fall of Nations\u2019,…<\/p>\n","protected":false},"author":15,"featured_media":53372,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"disable","_kad_post_title":"default","_kad_post_layout":"default","_kad_post_sidebar_id":"","_kad_post_content_style":"default","_kad_post_vertical_padding":"default","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_vp_format_video_url":"","_vp_image_focal_point":[]},"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/posts\/19115"}],"collection":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/comments?post=19115"}],"version-history":[{"count":7,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/posts\/19115\/revisions"}],"predecessor-version":[{"id":53375,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/posts\/19115\/revisions\/53375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/media\/53372"}],"wp:attachment":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/media?parent=19115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/categories?post=19115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/tags?post=19115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}