A privileged account is a login credential to a server, firewall, or another administrative account. Often, privileged accounts are referred to as admin accounts. Your Local Windows Admin accounts and Domain Admin accounts are examples of admin accounts.
When we talk about privileged accounts, we’re talking about the actual username and password; these two things together make up the account.
Privileged accounts are used to access sensitive IT resources such as servers, databases, applications, or workstations. With a privileged account, users not only gain initial access but can also adjust permissions, make backdoor accounts, or change, delete, and extract sensitive, private data. In most organizations, IT staff have one account with standard-level permissions and another account for performing operations that require privileged access.
A privileged account is allowed to do more things (i.e. it has more privileges) than a normal account. Privileged accounts are doorways to an organization’s “kingdom”—the place where sensitive information is stored—and as such, they need to be very secure. Examples of sensitive information include medical records, credit card details, social security numbers, government files, and more.
Every unknown or unmanaged privileged account increases your organization’s vulnerability and presents an opportunity for intrusion.
If a single privileged account is used across your organization to run many services or applications, when that account is breached, your risk increases exponentially. An attacker can gain access to virtually any information within your organization’s IT network with only one compromised privileged account.
Organizations often have two to three times more privileged accounts than they have employees. Virtually all organizations have some unknown or unmanaged privileged accounts, significantly increasing their risk of a cyberattack. Some have thousands of these unmanaged accounts.
This can happen for various reasons:
With Privileged Access Management (PAM), privileged accounts are managed via a PAM vault. The vault creates and stores “secrets” (passwords, keys, certificates) that unlock privileged accounts.
Privileged users must check out those secrets to gain access to privileged accounts and thus target systems. In addition, PAM provides accountability and oversight of how privileged accounts are used. Privileged session management and recording at the vault/gateway level monitors and reports on the use of privileged accounts throughout your organization.
More Privileged Account Resources:
Blogs
7 types of privileged accounts you MUST discover and secure
How to Monitor Privileged Accounts
Tools
Privileged Account Discovery Tool for Windows
Privileged Account Discovery Tool for Unix
Whitepapers