Domain 5 Β· Lesson 4 of 5
Privileged Access Management
QuαΊ£n lΓ½ Truy cαΊp ΔαΊ·c quyα»n
Privileged Account Types & Controls
| Type | Risk Level | Control |
|---|---|---|
| Local Admin | High | Disable default admin accounts; vault-rotate; use named accounts |
| Domain Admin | Critical | Use only via PAW; session recording; minimal use; never for email/web browsing |
| Service Accounts | High | Vault auto-rotation; least privilege; never interactive login; no shared credentials |
| Emergency (Break-Glass) | Necessary Risk | Sealed in Vault; use triggers immediate alert; dual control required; every use reviewed |
| Shared Accounts | Unacceptable | Eliminate β assign individual named accounts; shared = no individual accountability = audit failure |
PAM Controls
Just-In-Time (JIT) Access
Request β approval β temporary credential granted β auto-revoke after task completes. Limits the exposure window β credential only exists when needed.
Privileged Access Workstation (PAW)
Dedicated hardened workstation used only for admin tasks. No email, no web browsing, no regular user activity allowed. Prevents lateral movement from a compromised admin session.
Session Recording
All privileged sessions are recorded (keystrokes, screen, commands). Prevents abuse by creating accountability and detects anomalous actions after the fact.
Vault-Managed Credentials
HashiCorp Vault auto-rotates service account passwords on a schedule. Engineers never see plaintext credentials β they request a short-lived lease. Rotation happens automatically regardless of staff changes.
Break-Glass Accounts
Emergency admin access for disaster scenarios. Sealed in Vault. Any use triggers an immediate security alert. Dual control required (two-person authorization). Every use is reviewed within 24 hours afterward.
Separation of Duties in Privileged Access
Developer β Deployer β DB Admin β different people own different phases of the deployment pipeline to prevent any single person from having end-to-end control.
Developer
Writes code; no prod access
ArgoCD (automated)
Deploys from approved Git SHA
DB Admin
Schema changes only; no app logic
Vault policies enforce further SoD β who can access what secrets is separate from who can deploy, and separate from who can run DB migrations.
Kerberoasting Attack
The Attack
- Attacker gains any domain user account
- Requests Kerberos service tickets for service accounts (any domain user can do this)
- Takes encrypted tickets offline for password cracking
- Cracks weak service account passwords offline
- Uses credentials for lateral movement
Defense
- β’ Long, complex, randomly generated service account passwords
- β’ Automated rotation via Vault (password changes frequently)
- β’ Minimize service accounts with Kerberos SPNs
- β’ Monitor for unusual Kerberos ticket requests
- β’ Prefer Managed Service Accounts (MSA) in Windows environments
Key Terms
- Shared accounts = no individual accountability = audit failure β always eliminate them and assign named individual accounts.
- JIT access: provision only when needed, auto-revoke after β limits the exposure window vs permanent standing privileges.
- Break-glass accounts: any use triggers an immediate alert β must be reviewed after every single use.
- Vault auto-rotation: service accounts never have long-lived static passwords β engineers request short-lived leases.
- PAW: dedicated admin workstation β no regular user activity (no email, no browsing) β prevents admin session compromise via phishing.
- Vault secrets: All service-to-service secrets (DB credentials, API keys, TLS certs) in Vault with auto-rotation. No static API keys in environment variables or .env files.
- ArgoCD deploy SoD: Engineers do NOT have kubectl exec access to production pods. All production changes go through ArgoCD from an approved Git SHA.
- Database access: No individual engineer has direct production DB access. All queries go through the application layer or an approved admin tool with session recording.
- Emergency DB access: Break-glass Vault policy β requires 2-person approval, session fully recorded, reviewed within 24 hours.
- Shared accounts audit: Remove all shared team accounts from admin portals (Bank A admin, eKYC Vendor dashboard, AML Vendor portal) β assign individual named accounts to each person.
Practice Quiz
Q1. A shared "admin" account is used by 5 engineers to access the production database. What security property does this violate?
βΌ Reveal Answer
Q2. JIT access vs permanent standing privileges β what is the key security advantage of JIT?
βΌ Reveal Answer
Q3. An engineer uses the break-glass account at 2am to restore a production database. What MUST happen next?
βΌ Reveal Answer
Q4. What makes service accounts vulnerable to Kerberoasting, and how does Vault auto-rotation mitigate this?
βΌ Reveal Answer
Q5. What is the purpose of a Privileged Access Workstation (PAW), and why can't an admin use their regular laptop for admin tasks?