{"id":3615,"date":"2021-06-23T11:27:31","date_gmt":"2021-06-23T15:27:31","guid":{"rendered":"https:\/\/chrisgrundemann.com\/?post_type=avada_portfolio&#038;p=3615"},"modified":"2021-07-21T11:27:49","modified_gmt":"2021-07-21T15:27:49","slug":"gigaom-radar-for-privileged-access-management-v1-0","status":"publish","type":"avada_portfolio","link":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/","title":{"rendered":"GigaOm Radar for Privileged Access Management v1.0"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>Privileged credentials (administrator rights) are a top target for attackers from outside the organization, or even from among unhappy staff within, because of the access they provide. A Privileged Access Management (PAM) solution is implemented to reduce or remove the need for humans to know these privileged credentials and reduces the chance that they might be misused.<\/p>\n<p>The PAM system becomes the keeper of all privileged credentials, with policies that allow specific identified individuals access to use the appropriate credentials. To be the single source of privileged access, your PAM needs to support all of the authentication sources you use and all of the target systems to which elevated access permission is required. User acceptance is also important, and so the PAM solution should support or improve existing methods of accessing privileged systems, otherwise authorized staff will seek ways around the PAM solution.<\/p>\n<p>A basic function of the PAM is to maintain an encrypted vault with the privileged credentials and other protected resources. Logging and session recording are crucial PAM features, and they allow auditing of privileged actions and forensic analysis after a privilege misuse event. Simply having logs and recordings is not sufficient; searchability is crucial for validating compliance and identifying the scope of any malicious access. Ideally, these logs would integrate into wider security analysis tools in a more holistic security approach.<\/p>\n<p>Often, the PAM platform will act as a proxy or jump host to connect the unprivileged network where users operate to the privileged network that requires managed privilege credentials. The proxy function may support native tools, such as SSH or RDP gateway, or it may provide an HTML5 browser-based interface. The proxy may be part of the main vault application, or it may be deployable as a separate server, and can access the PAM vault as credentials are required. The separation of vault and proxy is essential when the PAM is used to bridge different trust levels such as internet-based privileged access, or any multi-tenant deployment such as PAM as a Service.<\/p>\n<p>No matter how secure a PAM system is, there is always a risk of unintended disclosure of credentials or authorized staff who misbehave, whether accidentally or maliciously. Behavior analytics is a common method used to identify access that is being exploited inappropriately and is commonly integrated with a PAM solution. Ideally, the user behavior analytics would be able to identify the individual user\u2019s actions both with their own credentials and using the PAM to exercise privileged credentials&#8230;<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/gigaom.com\/report\/gigaom-radar-for-privileged-access-management\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Keep Reading<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":4261,"featured_media":3616,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"portfolio_category":[981],"portfolio_skills":[992],"portfolio_tags":[976,1094,1095,995],"class_list":["post-3615","avada_portfolio","type-avada_portfolio","status-publish","format-standard","has-post-thumbnail","hentry","portfolio_category-content-creation","portfolio_skills-research","portfolio_tags-gigaom","portfolio_tags-pam","portfolio_tags-privileged-access-management","portfolio_tags-report"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GigaOm Radar for Privileged Access Management v1.0 ~ Chris Grundemann<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GigaOm Radar for Privileged Access Management v1.0 ~ Chris Grundemann\" \/>\n<meta property=\"og:url\" content=\"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Chris Grundemann\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-21T15:27:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ChrisGrundemann\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/\",\"name\":\"GigaOm Radar for Privileged Access Management v1.0 ~ Chris Grundemann\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg\",\"datePublished\":\"2021-06-23T15:27:31+00:00\",\"dateModified\":\"2021-07-21T15:27:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg\",\"width\":2560,\"height\":1708,\"caption\":\"GigaOm Radar for Privileged Access Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/gigaom-radar-for-privileged-access-management-v1-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Portfolio\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Content Creation\",\"item\":\"https:\\\/\\\/chrisgrundemann.com\\\/index.php\\\/portfolio_category\\\/content-creation\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"GigaOm Radar for Privileged Access Management v1.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#website\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"name\":\"Chris Grundemann\",\"description\":\"Use technology, marketing, and strategy to take your growing business to the next level.\",\"publisher\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/chrisgrundemann.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#organization\",\"name\":\"Grundemann Technology Solutions\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"contentUrl\":\"https:\\\/\\\/chrisgrundemann.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cropped-GTS-Logo.png\",\"width\":512,\"height\":512,\"caption\":\"Grundemann Technology Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/chrisgrundemann.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/ChrisGrundemann\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/grundemann\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/cgrundemann\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCJ3Pk4AAVMBG4KCzxYAtExA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GigaOm Radar for Privileged Access Management v1.0 ~ Chris Grundemann","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/","og_locale":"en_US","og_type":"article","og_title":"GigaOm Radar for Privileged Access Management v1.0 ~ Chris Grundemann","og_url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/","og_site_name":"Chris Grundemann","article_modified_time":"2021-07-21T15:27:49+00:00","og_image":[{"width":2560,"height":1708,"url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@ChrisGrundemann","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/","url":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/","name":"GigaOm Radar for Privileged Access Management v1.0 ~ Chris Grundemann","isPartOf":{"@id":"https:\/\/chrisgrundemann.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/#primaryimage"},"image":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/#primaryimage"},"thumbnailUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg","datePublished":"2021-06-23T15:27:31+00:00","dateModified":"2021-07-21T15:27:49+00:00","breadcrumb":{"@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/#primaryimage","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2021\/07\/solen-feyissa-S7vxVvIvgFU-unsplash-scaled.jpg","width":2560,"height":1708,"caption":"GigaOm Radar for Privileged Access Management"},{"@type":"BreadcrumbList","@id":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/gigaom-radar-for-privileged-access-management-v1-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/chrisgrundemann.com\/"},{"@type":"ListItem","position":2,"name":"Portfolio","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio\/"},{"@type":"ListItem","position":3,"name":"Content Creation","item":"https:\/\/chrisgrundemann.com\/index.php\/portfolio_category\/content-creation\/"},{"@type":"ListItem","position":4,"name":"GigaOm Radar for Privileged Access Management v1.0"}]},{"@type":"WebSite","@id":"https:\/\/chrisgrundemann.com\/#website","url":"https:\/\/chrisgrundemann.com\/","name":"Chris Grundemann","description":"Use technology, marketing, and strategy to take your growing business to the next level.","publisher":{"@id":"https:\/\/chrisgrundemann.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/chrisgrundemann.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/chrisgrundemann.com\/#organization","name":"Grundemann Technology Solutions","url":"https:\/\/chrisgrundemann.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/","url":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","contentUrl":"https:\/\/chrisgrundemann.com\/wp-content\/uploads\/2020\/10\/cropped-GTS-Logo.png","width":512,"height":512,"caption":"Grundemann Technology Solutions"},"image":{"@id":"https:\/\/chrisgrundemann.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ChrisGrundemann","https:\/\/www.linkedin.com\/company\/grundemann","https:\/\/www.linkedin.com\/in\/cgrundemann\/","https:\/\/www.youtube.com\/channel\/UCJ3Pk4AAVMBG4KCzxYAtExA"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio"}],"about":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/types\/avada_portfolio"}],"author":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/users\/4261"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/comments?post=3615"}],"version-history":[{"count":0,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/avada_portfolio\/3615\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media\/3616"}],"wp:attachment":[{"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/media?parent=3615"}],"wp:term":[{"taxonomy":"portfolio_category","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_category?post=3615"},{"taxonomy":"portfolio_skills","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_skills?post=3615"},{"taxonomy":"portfolio_tags","embeddable":true,"href":"https:\/\/chrisgrundemann.com\/index.php\/wp-json\/wp\/v2\/portfolio_tags?post=3615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}