SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
Privilege Elevation and Delegation Management (PEDM) solutions are a class of privileged access management (PAM) solutions that are designed to grant user access to privileged corporate environments on a granular basis.
In 2017, analysts at Gartner divided the PAM market into two primary solution groups: Privileged Account and Session Management (PASM) and PEDM. PEDM solutions aim to improve upon the limitations of PASM solutions, which offer temporary admin access on an “all-or-nothing” basis.
On occasion, a user may need temporary access to secure IT resources that they typically would not have access to. On these occasions, organizations need a way to grant and them immediately revoke that access, because even a temporary admin account is just as much at risk to being stolen or compromised as a full admin account would be.
PASM solutions typically grant temporary admin access via a password vault. The vault grants the user access to the required server, and then logs all of their activity during that admin session for monitoring purposes. Once the session is done, the admin access is revoked.
The problem with PASM solutions is that they typically grant access on an “all-or-nothing” basis, so the temporary admin would be able to access everything on the target server, even the applications or scripts the user doesn't actually need or should be prohibited from accessing. If those temporary credentials were comprised, a bad actor would have unfettered access to the target server during the open session.
PEDM seeks to solve this challenge by eliminating the need for admin accounts and granting access to secure resources on a more granular basis.
PEDM solutions typically aim to eliminate admin accounts altogether, instead allowing sysadmins to operate with regular user accounts. Sysadmins are granted admin privileges only to the individual applications, scripts or tasks that they need to manage. As a result, it’s easier for organizations to reduce or eliminate the number of accounts within their network that have any sort of admin access, which reduces the attack surface and the risk of external threats or human error.