Centrify debuts Identity-Centric
Privileged Access Management
Digital Transformation
demands a more modern
approach to least privilege
based on individual identities,
not vaulting shared accounts.
entrify has announced its vision
C
and solutions for Identity-Centric
Privileged Access Management
(PAM), a modern approach to PAM that
empowers organisations to simplify
infrastructure management, protect
against breaches, improve compliance
postures and securely transform their
business by leveraging the cloud.
Emerging technologies fuelling
Digital Transformation are reshaping
the enterprise IT environment. As
organisations continue their Digital
Transformation journeys, they struggle
to manage an infrastructure that is
fragmented across hybrid and multicloud
environments, resulting in
data breaches, audit findings and
unnecessary overhead costs.
Underlying the foundation of Digital
Transformation are privileged access
controls, which ensure that only
authorised individuals, machines or
services are permitted to access the
right resources, at the right time for the
right reasons.
Centrify enables Digital Transformation
at scale, modernising how organisations
secure privileged access across
hybrid and multi-cloud environments by
enforcing Identity-Centric PAM based on
Zero Trust principles.
“The market is experiencing a changing
threatscape, where PAM is shifting away
Tim Steinkopf, CEO of Centrify
from a vault-centric approach to a more
secure and less cumbersome Identity-
Centric requirement,” said Tim Steinkopf,
CEO of Centrify. “Centrify’s Identity-
Centric Privileged Access Management
solutions evolve PAM to a seamless
experience by leveraging individual
identities, granting least privilege justin-time
and empowering machines to
protect themselves.”
Identity-Centric PAM is designed to
handle requesters that are not only
human but also machines, services and
APIs. For increased assurance, best
practices now recommend strongly
authenticated individual identities – not
shared accounts – where least privilege
can be applied.
All controls must be dynamic and riskaware,
which requires modern Machine
Learning and user behaviour analytics.
PAM must integrate and interoperate with
a much broader ecosystem including
the cloud providers, DevSecOps tools,
containers and microservices. Centrify’s
approach to Identity-Centric PAM is
founded on the Zero Trust principles
of: ‘Never trust, always verify, enforce
least privilege’. Centrify helps customers
minimise the attack surface, improve
audit and compliance visibility, and
reduce risk, complexity and costs
through pillars of Identity-Centric PAM:
• Establish trust: To enforce an
authoritative security policy, securely
establishing unique identities for
every system with the authoritative
security management platform.
• Verify who: Leverage enterprise
directory identities to authenticate
and authorise humans, machines
or services while eliminating local
accounts and decreasing the
overall total number of accounts
and passwords.
• Contextualise requests: Leverage
ITSM solutions to elevate privileges,
leveraging context to make just-intime
access decisions and leave zero
standing privileges.
• Secure admin environment:
Ensure access is only achieved
through a clean source, reducing
the risk of exposing servers to
malware or introducing infections
during a connection.
• Grant least privilege: Allow Just
enough privilege, for just enough
time to get the job done. Enable justin-time
privilege based on temporary
access through a simple request
process and limit lateral movement
by only granting access to the target
resources needed and no more.
• Audit everything: Maintain audit
logs and video recordings as
evidence of compliance, a best
practice for privileged sessions
should forensic analysis or other
review be required. u
intelligent NETWORK SECURITY
www.intelligentciso.com | Issue 24
59