Season 4 Episode 2
Enforcing least privilege access with PAM360's granular privilege elevation controls
July 17 2pm AEST | 11am GMT | 10am PDT
In this episode, we’ll focus on one of the core tenets of Zero Trust access: eliminating standing privileges, where we will walk you through how to replace permanent administrative access with just-in-time (JIT) privilege elevation, helping you reduce attack surfaces and enforce least privilege across your endpoints and critical systems.
We’ll break down PAM360’s privilege elevation framework, which is built on a maker-checker model and policy-based access. You’ll learn how you can leverage PAM360's granular privilege elevation controls to configure and scrutinize access requests, automate approvals, and enable dynamic controls for applications and user actions.
Here’s a glimpse of the episode’s key highlights:
- Enforcing role-based access controls through request-release workflows based on user roles and responsibilities
- Granting JIT access and privilege elevation for both local and domain accounts, ensuring zero standing privileges
- Using policy-based conditional access with real-time risk signals and contextual controls
- Applying application control and command filtering through self-service privilege elevation with sandboxed access
- Managing local admin rights and application execution using PAM360’s built-in endpoint privilege management module