Many organizations have outsourced their IT and OT to external service providers. Generic parts of the infrastructure such as the network and workplaces, as well as components such as process automation, have been invested with third parties when it comes to maintenance. Appropriate measures are required to control the work carried out by external service providers.
The Amsterdam Energy Company has dozens of suppliers that manage specific IT and OT components. More and more often, you see that these activities take place remotely from the supplier's location or from a home office.
In doing so, the supplier has direct control in the following areas.
In order to gain control as an organization with regard to the management tasks to be carried out by third parties, Navaio has implemented a PAM solution at AEB.
The user of a privilege account must not be aware of the current passwords for critical systems and applications. The PAM solution protects these credentials with a Vault.
Each time a privilege user requests access, the PAM solution creates a unique password for the specific session. In the case of highly critical systems, an approval flow can be applied.
The user is authenticated using a password and a second factor.
The PAM solution gives third party employees remote access based on role based access (RBAC) without providing AEB domain credentials to these employees.
The PAM solution sets up a session for each individual privilege user. This session can be recorded based on command line activity and/or video. In addition, you can watch in real time during a session.
The PAM solution provides real-time insight into active sessions and provides insight into possible abuse with privilege accounts based on behavioral analysis.
The PAM solution supports a break glass procedure.
The PAM solution supports a break glass procedure.
The PAM solution has a clear audit trail
Navaio uses Delinea's Secret Server and Microsoft Entra as selected PAM products. In doing so, various starting points were considered.
These principles provide direction. If you want to know more about the different solutions, implementation methods and how they translate to your organization, please contact us.
Sander Baas
Many organizations have outsourced their IT and OT to external service providers. Generic parts of the infrastructure such as the network and workplaces, as well as components such as process automation, have been invested with third parties when it comes to maintenance. Appropriate measures are required to control the work carried out by external service providers.
Healthcare organizations often work with a dynamic schedule; on the same day, an employee at two care locations may have to work with another group of clients. In addition, healthcare has a higher than average deployment of self-employed workers and the information that healthcare workers work with is highly sensitive to privacy. These properties make Healthcare a domain with specific requirements for the lifecycle of identities and access control to applications and information.