Episode 79 — Manage Privileged Accounts Using PAM to Reduce Standing Administrative Risk
Failed to add items
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
This episode focuses on privileged access management as an architecture control that reduces standing risk, which ISSAP often tests through questions about limiting blast radius and improving accountability for administrative actions. You’ll learn what PAM typically includes, such as credential vaulting, session brokering, just-in-time elevation, approval workflows, and session recording, and how to place these capabilities so admins can do real work without living in permanent high privilege. We’ll cover practical design patterns like separating admin accounts from daily user identities, enforcing MFA and device posture for privileged sessions, limiting privileged commands through role-based controls, and routing admin access through hardened jump paths that are monitored and logged with integrity. Troubleshooting considerations include “PAM bypass” through unmanaged tools or direct network access, brittle integrations that cause outages and lead teams to demand permanent exceptions, and poor operational ownership that leaves vault policies, rotation schedules, and session logs unmanaged, turning PAM into shelfware instead of a real reduction in risk. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.