Request demo
March 20, 2020

Make remote work fast & secure for admins, devs and IT subcontractors

For obvious reasons, a vast majority of your system administrators, DevOps teams and software engineers are forced to adopt remote work habits right now. They are called privileged users for a reason, since they access to business-critical databases and maintain IT infrastructures. But are security controls under threat now that this shift was so sudden? The same applies to non-privileged users as well: learn how to set up secure remote access for employees working from home.

This article will discuss the risks associated with privileged users in remote work, and outline five ways how companies can ensure their secure remote access is fast and convenient without adding operational obstacles or risking security posture.

The Role of Privileged Access Management (PAM) in Remote Work

What Are PAM and Privileged Users?

Privileged Access Management (PAM) is a cybersecurity strategy that controls and monitors access to an organization's critical information and resources.

Privileged users are individuals with elevated permissions who can make significant changes to the IT environment, including system administrators, developers, and IT subcontractors.

These users have the ability to access sensitive data, configure system settings, and install software, which makes their activities potential vectors for security breaches if not properly managed.

Security Risks in Remote Work for Privileged Users

Remote work has opened the door to new security challenges that must be addressed to protect organizational assets. Here are some of the key security risks that privileged users face when working remotely:

  • Working outside the corporate firewall, these users might connect through networks that lack robust security measures, potentially compromising sensitive data.

  • Limited visibility and monitoring of remote user activities can also impede the timely detection of security incidents, allowing threat actors to exploit gaps in the defense.

  • The habit of password reuse and reliance on weak authentication practices can give cybercriminals easier access to multiple accounts with a single set of credentials, escalating the risk of widespread security breaches.

Organizations must adopt comprehensive security strategies that include secure network connections, enhanced visibility and monitoring capabilities, and strong authentication protocols to mitigate these risks.

How PAM Enforces Secure Remote Access

A robust PAM solution provides secure, controlled access to an organization's critical infrastructure through the enforcement of least privilege and just-in-time (JIT) access. It ensures that privileged users are only granted the permissions necessary to perform specific tasks, reducing the risk of unauthorized access and lateral movement within the network.

Additionally, PAM includes multifactor authentication and session management to verify identities and track risky actions, enhancing overall security for remote work environments.

Modern Secure Access Solutions for Remote Work

1. Mitigate the risk of privilege abuse by removing credentials from all IT

Password sharing risk increases in a de-centralized model. But there are reasons why passwords and secrets are shared, and the pressure to do so for the sake of convenience and expediency is just mounting under exceptional circumstances.

This naturally leads to rising concerns about data breaches, but hackers rather harvest for compromised credentials using advanced tactics like AI spearfishing. According to a Verizon report, 81% of all breaches are caused by stolen passwords.

You’ve probably heard of passwordless authentication in the business application context (like Office 365). How about the same ease of use and a reduced risk of privileged abuse for your subcontractors and DevOps teams? With our solution:

  • they get single sign-on (SSO) access to target hosts without anyone handling any passwords or privileged credentials or seeing any secrets at any point

  • access is granted just-in-time, based on unique, ephemeral certificates that automatically expire after the authorization is done

  • there are no leave-behind permanent credentials to steal, lose, misconfigure or harvest

  • you get multi-factor authentication (MFA) or it can interface with existing passwordless authentication methods that Identity and Access Management (IAM) providers offer, like biometric authentication

Gartner also recommends companies to forget standing privileges and move towards zero standing privileges with just-in-time (JIT) authentication model.

2. Minimize training and configuration needs, maximize simplicity

We believe in an agentless model where you do not need to install or configure any software components on your target hosts. There is also no need to spend days to train anyone on how to use the solution. So instead of signing in to their usual remote terminals, consultants and administrators simply:

  1. log in to a browser-based UI

  2. have access only to their available servers, cloud hosts, web applications or network devices

  3. are granted only the right level of privilege to get the job done

You can even define the duration of the session in advance with just a couple of clicks. One less reason for teams to adopt shadow IT practices, since security doesn’t get in the way of productive work. Also, this is nicely aligned with the Zero Trust framework: by default you should not trust anyone to access anything but instead verify and validate each time access is needed.

3. Automate onboarding, offboarding and auditing of outsourced IT

Our solution interfaces directly with your identity management system (IAM/Active Directory/LDAP) where identities and authorizations are located. Your admin then simply maps your IAM users and groups to corresponding roles within our solution, enabling role-based access controls (RBAC).

This is a one-time configuration, after which our product automatically keeps both your 3rd parties and admins up-to-date on any changes in authorizations. This makes onboarding, changing roles and offboarding hassle-free and your Joiners, Movers and Leavers process is mostly automated.

Admins no longer need to grant, modify and revoke access with the right entitlements manually per individual. They can just monitor how devs have just the right level of privilege for the task at hand and enjoy the view.

All sessions are logged, you get a solid audit trail and all sessions can be recorded if needed to improve compliance with mandatory regulations, like GDPR. With industry standard REST application programming interfaces (API), audit data can be sent to security information and event management (SIEM) for further processing.

4. Choose a scalable solution for the hybrid and multi-cloud

A sudden spike in remote workers affects operations and software needs in IT. We believe in a solution that is purpose-built for the hybrid and multi-cloud and is based on a microservices architecture that matches the elasticity of the cloud where servers are spun up and down all the time. The solution can be deployed within days and it requires virtually no maintenance to ensure that your Return on Investment (ROI) and Total Cost of Ownership (TCO) are great.

Our solution auto-discovers all cloud hosts (Amazon Web Services, Azure, Google Cloud Platform) and keeps you up-to-date on their status automatically.

5. Think beyond VPNs, jump hosts or bastion hosts

If there is a sudden spike in remote traffic, VPNs are under tremendous pressure, and the first security checkpoint for software engineers is VPN. If the DevOps engineer cannot access the VPN, she cannot access the next checkpoint either.

The next checkpoint is usually a jump host or a bastion host. However, they need to be set up, re-configured and updated constantly. This, combined with the already-mentioned complex access lifecycle management, simply becomes a nightmare for your IT admin or security staff. And they operate using passwords.

Passwordless privileged access management (PAM) made easy

Take the leap towards making secure remote access a positive experience for your software engineers, admins and third parties. Our solution, PrivX, is a quick-to-implement and scalable privileged access management (PAM) solution for establishing secure remote access to hosts, network devices or web applications and managing third party access. See how it works below!

 

With PrivX, you get all the required security checkpoints but they are just automatically baked in the process and mostly invisible to the user. Read more about the 5 must-haves that a modern PAM solution needs.

We’ll make a pledge to you: in a new environment, where nothing is replaced, our solution is up and running in your production environment in less than a week! Contact us here.

Stay safe!

PS. This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 881221.

EU-emblem

FAQ

How does RPAM enhance privileged remote access for administrator accounts?

RPAM (Remote Privileged Access Management) enhances privileged remote access by implementing just-in-time access and a least-privilege policy. This approach reduces vulnerabilities by granting permissions only when needed.

It supports secure access to critical systems without exposing credentials, minimizing risks of credential theft and unauthorized access.

Verified identities and role-based access control ensure technicians and vendors only access necessary internal systems, improving operational agility.

What are the key benefits of using biometric multi-factor authentication in privileged remote operations?

Biometric multi-factor authentication provides enhanced security for privileged remote access by requiring physical verification, reducing risks of credential theft. It ensures remote users, including third-party vendors and technicians, have secure access to critical systems.

This method streamlines the workflow, supporting operational agility while maintaining stringent access controls. By integrating this authentication method, organizations can better protect against cyberthreats and unauthorized access.

How does just-in-time provisioning integrate with SSH's PrivX for zero trust access?

Just-in-time provisioning in SSH's PrivX ensures secure access by granting temporary, on-demand permissions, adhering to the zero trust access model. This minimizes vulnerabilities associated with standing privileges, as access is revoked immediately after use.

PrivX integrates seamlessly with internal systems, providing remote users and vendors just-in-time access to critical systems. This enhances security and operational agility by reducing risks and simplifying credential management.

What are the future benefits of implementing PrivX Hybrid PAM Solutions for managing external vendors?

Implementing PrivX Hybrid PAM Solutions for managing external vendors ensures secure access through verified identities and just-in-time access. This reduces risks associated with credential theft and unauthorized access to critical systems. PrivX enhances operational agility by automating access controls and providing detailed audit trails. As cyberthreats evolve, PrivX offers scalable and robust security, protecting against vulnerabilities and supporting a secure remote workforce.

 

Jani Virkkula

Currently employed by SSH.COM as Product Marketing Manager, Jani is a mixed-marketing artist with a strong background in operator and cybersecurity businesses. His career path of translator->-tech writer -> marketer allows him to draw inspiration from different sources and gives him a unique perspective on all types...

Other posts you might be interested in