Early-bird Discount
expires in
Register Now

Agenda

PAM Design Patterns and Anti-Patterns: Assessing Your Organization's Best Practices

PAM Design Patterns and Anti-Patterns: Assessing Your Organization's Best Practices

Combined Session
Thursday, June 06, 2024 15:00—15:15
Location: A 05-06

In today's cybersecurity landscape, organizations are increasingly recognizing the importance of implementing robust Privileged Access Management (PAM) programs. This recognition is primarily driven by regulatory requirements and the growing pressure from malicious actors. However, despite the availability of mature baseline capabilities for PAM products in the market, the implementation of privileged access often falls behind leading practices in typical organizations.

In this talk, we will explore the world of PAM design patterns and anti-patterns, with a specific focus on major use cases. We will explore typical patterns such as isolating accounts, systems, credentials, and networks. Additionally, we will discuss the various options available for defining privileged assets and access, as well as the potential for running Identity Governance and Administration (IGA) projects in parallel with PAM.

A fundamental aspect to consider is the concept of tier models and security domains. We will explore the role of different intermediaries, including Jump Hosts, Privileged Access Workstations (PAWs), and Agents, and their varying security properties.

Furthermore, we will address the often overlooked aspect of managing Secure Shell (SSH) keys within PAM. Lastly, we will touch upon the importance of having robust procedures in place to handle critical situations in emergency mode.

By understanding these PAM design patterns, organizations can assess their current practices and identify areas for improvement. This talk aims to provide valuable insights and practical guidance for organizations seeking to enhance their PAM programs and align with leading industry practices.

Rainer Hörbe
Senior Manager
KPMG
Rainer has been involved in Identity and Access Management (IAM) since 2000, working in various roles such as architect, policy writer, software developer, and security consultant. He has...
Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch