EXPERT SPEAK
stakeholders . Users believe they are entitled to access privileges to perform their jobs , and they will never request that their privileges be removed . However , excessive privileges are problematic . Malware often acts within the user ’ s context – the more privileged the user , the further the malware can travel in potentially destructive East – West movements .
Implementing PAM solutions goes beyond technology . It requires changing ingrained habits of users with fixed access privileges . It is crucial to adopt advanced , flexible solutions that automate PAM and integrate with other platforms without friction . Additionally , investing in educational efforts helps VIP users adhere to the new access policy , which benefits them , the company , and the country ’ s economy .
Similarly , the Zero Trust principle can unsettle users when first implemented . Since vulnerabilities often arise when companies place too much trust in individuals or devices , Zero Trust suggests
Malware often acts within the user ’ s context- the more privileged the user , the further the malware can travel . no user , even when allowed on the network , should be trusted by default . For this shift to succeed , it must be preceded by communication with business leaders and end-users to ensure everyone understands the reasoning behind the change . It ’ s advisable to adopt low-friction Zero Trust and PAM cybersecurity solutions – the verification should be seamless , with no delays or discomfort for the user .
In the era of threats amplified by Artificial Intelligence , organisations must not implement PAM without considering ZTNA , and vice versa . Combining both creates a layered defense against external and internal attacks . Those adopting this strategy will increase the resilience of their cloud environments to the increasingly devastating lateral attacks . •
42 www . intelligenttechchannels . com / latam