Evaluation Criteria For Priv 384458
Evaluation Criteria For Priv 384458
Evaluation Criteria For Priv 384458
Management
Published: 30 July 2019 ID: G00384458
Table of Contents
Evaluation Criteria...................................................................................................................................2
Privileged Access Governance and Administration............................................................................5
Required.....................................................................................................................................5
Preferred.................................................................................................................................... 6
Optional......................................................................................................................................6
Privileged Account Discovery and Onboarding..................................................................................6
Required.....................................................................................................................................7
Preferred.................................................................................................................................... 7
Optional......................................................................................................................................8
Privileged Credentials Management.................................................................................................. 8
Required.....................................................................................................................................8
Preferred.................................................................................................................................. 12
Optional....................................................................................................................................13
Privileged Session Management..................................................................................................... 13
Required...................................................................................................................................13
Preferred.................................................................................................................................. 16
Optional....................................................................................................................................17
Privileged Access for Applications and Services............................................................................. 18
Required...................................................................................................................................18
Preferred.................................................................................................................................. 19
List of Figures
Evaluation Criteria
Privileged access management (PAM) is an essential, but complex, identity and access
management (IAM) discipline. It includes not only privileged credential management functionality but
also privileged session management (human/interactive), and privileged access for application and
This research presents comprehensive evaluation criteria to use when defining your requirements
and making PAM product selections and architecture decisions. Gartner developed this evaluation
framework to address current and future needs of its customers, categorizing PAM features as:
■ Required: Required features are essential features needed to develop, deploy and manage an
enterprise-grade PAM solution. Such solutions meet the minimum level of PAM features and
functions needed by typical Gartner clients. PAM products meeting fewer than all the required
criteria may still be employed for specific purposes in which there is some workaround for a
missing piece.
■ Preferred: Preferred features are supplementary features not necessary to satisfy the minimum
requirements of the typical large enterprise. However, they are frequently desired to address
specific needs, such as larger scales, better management and improved functionality. Gartner
considers these criteria to be “nice to have.” Such features often separate the best solutions
from good or average ones.
■ Optional: Optional features may be unique requirements of specific use cases or emerging
criteria that will become more important as time progresses.
Gartner considers the satisfaction of 100% of the required features as indicative of a mature PAM
solution that is ready for deployment in large-enterprise environments. Enterprises may choose to
deploy solutions that do not meet 100% of the required criteria, but they need to be aware of the
trade-offs associated with deploying a less complete solution.
This list of features is representative of typical requirements, but enterprises will want to add their
own requirements as well. Furthermore, they should not neglect the typical qualitative requirements
checklist they would use for any on-premises software or cloud-delivered solution, such as vendor
viability, performance testing, documentation quality, customer support capabilities, pricing and
contract terms.
It is important to note that privileged access provisioning and deprovisioning is not a PAM solution
capability. Privileged access assignment is usually performed by identity governance and
administration (IGA) tools or through external directories. PAM systems may interact with IGA tools
to trigger automatic provisioning or deprovisioning of privileged access rights to users — based on
profile attributes, roles, group memberships, or approved access requests. PAM systems may also
interact with external directories to trigger tasks to assign, and revoke privileges using a centralized
user and group structure. For example, smaller organizations may leverage user directories such as
Microsoft Active Directory (AD) for their user life cycle management. The PAM solution should have
the ability to integrate with AD so that the creation of users and group-based authorization for
access are granted and revoked entirely by the directory administration.
Required
■ Privileged access roles: The PAM solution must define key roles for privileged access
governance processes, such as requesters, approvers and reviewers:
■ Requester role: This role is defined with specific attributes to enable fine-grained
authorization for privileged access.
■ Approver role: This role is defined to respond to access requests by approving or denying
the requested access. A user can only be granted an approver role by explicit assignment
from an authorized administrator.
■ Reviewer (auditor) role: This role is defined with read-only rights for the purposes of
auditing. This role can review reports and session details, and export data for use in other
audit and reporting systems.
■ Privileged access policy: The PAM solution must define rules for granting permissions to
privileged access. In case of privileged accounts, these policies can be enforced for registered
users in an integrated directory (e.g., Active Directory) through role-based or attribute-based
access control mechanisms. The simplest form is by assigning a privileged role to a user or
adding a user to a privileged group. In the case of endpoints, these policies can be enforced for
to elevate privilege to execute a command or application.
■ Privileged access request: The PAM solution must provide a business-friendly interface where
privileged users may request access to privileged accounts and credentials, as they start a
session, or persistently. This is to implement the approvals processes for privileged access. The
request can include granular information such as specific accounts and system, time and
duration of access, and reason for access.
■ Privileged access request approval: The PAM solution must gather any necessary approvals
for new privileged access requests. The approval process includes an authorized user who
controls whether to grant or deny access to a privileged account. The simplest form of approval
Preferred
■ ITSM tools integration: The PAM solution should automate access request approvals through
integration with the enterprise ticketing systems (e.g., ServiceNow or BMC Remedy/Helix
ITSM). This integration validates a specific change management ticket that has been approved
(and in this case, privileged access approval is implicit). A user must provide a ticket number
before the system grants any access. The integration then verifies whether the ticket number is
accurate, in the correct state and assigned to the user requesting access. Alternatively, ITSM
systems could be used to create a new request for privileged access.
■ Identity governance and administration tools integration: The PAM solution should provide
connectors and/or APIs that allow external IGA tools to govern long-term privileged access
(which should be exceptional, not a rule), provision/deprovision privileged accounts and ensure
segregation of duties. IGA integration should enable central management and control of all
identities, including privileged identities and entitlements, to quickly detect and mitigate access
risks of privileged users, while ensuring compliance. Segregation of duties (SOD) controls check
for policy violations, such as segregation of duties for existing and new privileged access
requests.
Optional
■ SCIM connectors: The PAM solution can leverage the System for Cross-domain Identity
(SCIM) connectors to create users, manage group membership, remove users, and report on
general user and group information in target systems. SCIM is a broad standard integration that
could allow for any governance tool to integrate with target systems.
Preferred
■ Discovery mechanism: The PAM solution autodiscovery should find new systems and
endpoints within the enterprise using multiple mechanisms, such as:
■ AD scan: Connect to Microsoft AD and query for systems and devices to manage, and
automatically add them to the PAM system.
■ LDAP scan: Connect to an LDAP directory and query for systems and devices to manage,
and automatically add them to the PAM system.
■ Configuration management database (CMDB) query: Connect to an existing CMDB,
query for systems and devices to manage, and automatically add them to the PAM system.
■ IP scan: Perform a scan of IP ranges and identify systems and devices to manage and
automatically add them to the PAM system.
■ Simple Network Management Protocol (SNMP) scan: Use SNMP to identify systems and
devices to manage, and automatically add them to the PAM system.
■ SSH keys scan: Discover SSH keys, and where they are stored and leveraged in the
environment.
Optional
■ IGA integration: The PAM solution should optionally provide connectors and/or APIs that allow
external IGA systems to automatically provision and deprovision privileged users.
■ Orphan privileged users discovery and offboarding: The PAM solution should leverage
integration with IGA tools to identify orphan users with privileged access and offboard them
from the system.
Required
■ Access to PAM server:
■ PAM server access channels: The PAM solution must be accessible through a web
console and API at minimum. Other means of access, such as client software, are optional.
■ PAM server authentication: The PAM solution must positively confirm the identity of
privileged users or entity (application or service) before granting access to any privileged
credentials.
■ PAM server multifactor authentication: The PAM solution must have the ability to require
multifactor authentication for users of the solution.
■ PAM server single sign-on (SSO) and federated authentication: The PAM solution must
have the ability to leverage federated authentication for users of the solution to gain access
to the PAM server.
■ Access to managed credentials:
■ Managed credentials visibility: The PAM solution must restrict the view that solution users
have over the managed credentials to only the systems for which they have been given the
capability to request access.
■ Managed credentials grouping: The PAM solution must have the ability to automatically
categorize managed credentials into logical groups to allow assignment of permission and
Preferred
■ Pluggable architecture for not-yet-defined target systems: The PAM solution should have
the ability to be extended using a pluggable architecture for platforms that are not yet covered.
These would include new cloud services or on-premises devices and systems that are not
simply SSH- or Telnet-based. The solution should allow users to create their own custom
extensions to discover and manage these systems/devices and related privileged accounts.
■ Access to cloud providers’ secrets: The solution should be able to further integrate with cloud
providers to allow seamless secret management. For example, the solution can be further
integrated with Amazon CloudWatch and AWS Lambda to enable the automatic onboarding of
SSH keys as new instances are created to reduce risk. This includes deleting the SSH keys as
these instances are terminated. This integration is ideally suited for elastic cloud environments
where new instances are routinely spun up and down dynamically.
Required
■ People interactive privileged access:
■ On-premises: The PAM solution must have the ability for authorized users on a typical
organization’s internal network to log in with their domain account to manage and use
privileged credentials that they are authorized to access.
■ In the cloud: The PAM solution must have the ability for authorized users to manage and
use privileged credentials outside the organization’s standard network in an environment
that is hosted by a vendor that supports the infrastructure of many entities. This may require
installing a credential management server in the cloud environment to enable users to verify,
update and reconcile privileged accounts in the cloud.
■ Third-party remote: The PAM solution must have the ability for authorized third parties or
contractors to gain privileged access to authorized target systems to perform authorized
tasks.
■ Privileged access to target systems:
■ Automated login with privileged credentials: The PAM solution must provide automated
login to managed endpoints using privileged credentials without revealing the credentials to
users. This is implemented when users directly use a privileged credential to access a
system.
Viewing sessions to target systems and taking part in controlling them should be according to
predefined policies and configurations. This enables authorized users to supervise live sessions
and enables two users to perform a procedure concurrently. Access to this capability requires
explicit authorization.
■ Session auditing and review: The PAM solution must have the ability for recorded sessions to
be audited and reviewed for compliance and remediation purposes. It should be possible to add
comments and mark sessions as reviewed, with attribution to the user completing the activity.
Access to this capability requires explicit authorization.
■ Remote privileged access: The PAM solution must record and control secure remote
privileged access sessions, whether inside a company network or from a third-party or
contractor outside of the corporate network. The solution must offer zero-install secure access,
such as using an HTML5 gateway that tunnels the session between the end user and the
session management proxy machine using a secure WebSocket protocol. This approach, for
example, eliminates the requirements to open an RDP connection from the end user’s machine.
Instead, the end user requires only a web browser to establish a connection to a remote
machine through the session management solution. This can eliminate the need for allowing
RDP protocol to flow inbound from less secure networks toward more secure networks.
Preferred
■ Access console:
■ Web or native remote access console: The PAM solution should enable alternative
remote access through HTML5 or a thick client that removes the need to connect through
native access methods like an RDP client or PuTTY, which must be run locally.
■ Mobile remote access console: The PAM solution should enable native iOS and Android-
based consoles that allow for privileged session run from mobile devices. It should be noted
that this option is less common but may be useful for certain use cases.
■ Access console verification: The PAM solution should define the networks on which your
access consoles may run or require two-factor authentications to log into the access
console (as needed using a risk-based approach).
■ MFA (including smart cards) for sensitive sessions: The PAM solution should provide the
ability to reauthenticate users using methods other than password entry. Messages should be
configurable to allow authentication options, including password, smart card, algorithm-based
response codes and designated user override. When messages are requesting credentials, they
should be presented on the secure endpoint interface for enhanced security.
Optional
■ Session sharing: The PAM solution should have the ability to allow a user to share a session
with a team member with appropriate permissions to enable team collaboration.
■ Long-standing sessions between multiple users: The PAM solution should have the ability to
run a session in the background while allowing users to connect to the session. This is
particularly useful for manufacturing environments that have a limited number of terminal-based
sessions (sometimes serial protocols) that are used by multiple users.
■ Access invite: The PAM solution must have the ability to invite an internal or external user with
appropriate permissions into a shared session with one-time, limited access.
■ Session recording autostart: The solution supports autostart session recording when a policy
is violated or when unusual behavior is detected.
■ Session command filtering: The PAM solution must have the ability to restrict unauthorized
commands if they are executed by a privileged user on a network device or any SSH-based
target system. SSH commands whitelisting or blacklisting in managed sessions gives an
organization the ability to block unauthorized SSH commands if attempted by a privileged user
on a network, device or any SSH-based target system. Users can connect transparently to a
Required
■ Application-to-application or application-to-database: The PAM solution must have the
ability to secure application-to-application (or database) access by enabling proactive controls
on privileged credentials embedded in applications, service accounts and scripts. These
controls include rotation of accounts that applications use. The solution should provide
application admins and developers with easy-to-use software tools to access credentials from
the vault (safe) or a secure cache using a single function call in a CLI or native API for COM,
Java, C/C++ and .NET on a variety of platforms. This enables organizations to eliminate hard
code and automate the rotation of credentials.
■ Identity management for nonhuman entities: The PAM solution must provide identity
management capability for registering and managing the life cycle of nonhuman entities, such
as machines, applications or services. The solution should provider user and group
management to enable authentication and authorization of nonhuman entities, to
programmatically access other system resources that use managed credentials or secrets for
programmatic access to other nonhuman entities. This includes providing:
■ Multiple authentication strategies: The PAM solution must have the ability to implement
credential-based and/or attributed-based authentication, including flexible and extensible
security automation workflows for a variety of system-to-system use cases. Examples are
secrets management, SSH, traffic authorization, container environments and custom
access control scenarios. The attribute authentication mechanism can be based on central
Preferred
■ DevSecOps: The PAM solution should have the ability to enable automation pipelines by
managing embedded secrets that are used by machine identities (applications, microservices,
applications, CI/CD tools, APIs, etc.) and users throughout the DevSecOps pipeline. This
includes secrets management for sensitive data, such as API keys, certificates, passwords,
SSH keys and tokens. Secrets are securely stored and managed in an encrypted and access-
controlled container and can be automatically rotated based on policy. The solution should
ensure that applications deployed in autoscaling environments, such as AWS, can dynamically
and securely access secrets.
■ Robotic process automation (RPA) digital worker/bots: The PAM solution should enable
digital workers or software robots to securely retrieve credentials needed to perform their
functions. It should also rotate those credentials used in RPA to ensure compliance with
corporate policies and industry guidelines. The solution can expand the application-to-
application technology to retrieve credentials used for RPAs.
Optional
■ Support for emerging standards/frameworks: The PAM solution should optionally provide
support for emerging standards such as Secure Production Identity Framework for Everyone
(SPIFFE) and System V Interface Definition (SVID) authentication for use cases such as
implementing resource identifiers and authentication in Kubernetes. SPIFFE is an emerging set
of open-source standards for securely identifying software systems in dynamic and
heterogeneous environments.
Required
■ Privileged activity logging: The PAM solution must log all activities that are carried out for all
covered systems. This includes comprehensive logs of all requests and responses by the
system, including a complete and detailed account of what happened on sensitive systems and
who performed what activity. Examples are all changes carried out by administrators in the
audit trail, including username, time stamp, activity performed, IP address and old/new values.
Also, the solution should enable configurable log management, including rotation. Other key
features include:
Preferred
■ Customizable system and application event data: For privileged elevation and delegation,
the PAM solution should capture event information to accommodate for multiple storage
scenarios. This information should be able to reside on the endpoint and/or in a common
location with a common format for troubleshooting and audit purposes. It should be also able to
transport back to a central administration point and logged transparently or anonymously to
accommodate for specific regions or compliance purposes.
■ Privileged activity monitoring: For privileged elevation and delegation, the PAM solution
should allow privileged operations to be monitored. The privileged monitoring reports should
include a list of the applications, tasks, scripts and privileges they require. It should also include
the actual privileged operations that were performed, such as access to the registry and file
system, and interactions with system services and kernel-level objects. This allows creation and
update of privileged access control policies that reflect use in the environment.
Optional
■ General Data Protection Regulation (GDPR) pseudonymization support: The PAM solution
should have the option for responding to “right to erasure” requests by searching for specific
criteria supplied by the requester. The results can be reviewed and subsequently anonymized
with an automatically generated term or a custom replacement.
Preferred
■ Privileged access baselining: The PAM solution should have the ability to create mathematical
baselines or averages for regular users to determine their normal usage of privileged accounts.
The solution baselining is required for the analytics of what privileged access is happening
(privileged events) in the environment. Based on the numerical relevance of the events that are
above the normal baseline, the solution should respond proactively to high-risk events to stop
attacks.
■ Privileged session risk scoring: The PAM solution should have the ability to identify high-risk
privileged sessions by assigning a risk score based on the baselining of events. This is the
ability to detect irregularities or potentially malicious activities in real time to increase the
organization’s security by alerting on high-risk events and giving a proactive response.
■ Privileged account threat detection: The PAM solution should have the ability to identify
specific high-risk users and systems by correlating granular privileges, system vulnerabilities,
and threat data from a variety of sources. This is the ability to detect a potential threat in admin-
time by reviewing anomalous privileged user behavior against the baseline considering asset
vulnerability and compliance policies to detect the threat of a high-risk event.
■ Privilege threat alerting: The PAM solution should have the ability to notify security
administrators of high-risk events using appropriate notification mechanisms such as reports,
email, text messages, or external systems, such as security information and event management
(SIEM) or ITSM, when the risk exceeds a specified threshold.
■ Analytics dashboards: The PAM solution must provide dashboards that summarize the
analysis results to provide operation insights to security management.
Optional
■ Machine learning: The PAM solution should leverage machine learning to build a behavior
model for every privileged user that can automatically adapt as the user’s job and access
changes over time. The machine learning capability can be part of a PAM solution internally or
provided by a UEBA solution externally via integration. In the case of external machine learning
capability, the solution should forward all privileged user access and activity data to the external
analytics engine.
■ Analytics to enhance endpoint policy management: The PAM solution should have the ability
to use the data captured on the endpoints for policy creation or enhancement. The solution
should provide dashboards and drill-in reports that show application usage reports, such as
applications that were unable to be executed with elevated privilege or blocked from on-
demand elevation. This centralized data should be accessible directly from the policy engine to
build the contents of your application’s elevation or blocking rules using recorded metadata
without having to manually enter the information.
■ Privilege threat countermeasure: The PAM solution should have the ability to continuously
monitor the use of privileged accounts that are managed, as well as accounts that are not yet
managed, and to look for indications of abuse or misuse. The solution should act by executing
appropriate countermeasures to stop high-risk or security events. Examples are:
■ Terminate or suspend active suspicious sessions: The solution should analyze activity in
privileged sessions based on a set of activities and activity patterns associated with a
configurable risk score, per session type, that the security team configures. Sessions with
high-risk suspicious activities can be configured to automatically suspend or terminate. This
suspension or termination can also be done by authorized users who view a live session.
■ Lock out privileged users that show abnormal activity patterns: The solution should
distinguish in real time between normal and abnormal behavior, and raise an alert and lock
out the user of the privileged account that is being misused.
■ Onboard unmanaged accounts upon detection: The solution should have the ability to
configure remediation initiation and actions. An example would be the detection of an
account that is not centrally stored and managed, so it is automatically onboarded to the
PAM solution.
■ Trigger credential rotation on suspected compromised accounts or credentials: The
solution should take automatic remediation of a detected privileged account that has been
hacked. The automatic fix would be to rotate the credential.
■ Reauthentication: The solution should halt the privileged user’s session, requiring the user
to reauthenticate when the risk exceeds a specified threshold.
This is like robotic process automation for IT operation processes that require privileged access. For
example, the PAM solution should be able to spin up a container for each relevant IT operation
process and provide it with a one-time key and the necessary data to perform the required tasks,
such as the identities and devices involved. The script or code within the secure container can only
ask for appropriate keys and credentials from the PAM solution that can verify the container (one-
time) key and data before requesting the actual identity’s keys/credentials from the PAM tool. The
key objective is to reduce the complexity and errors in privileged operations and achieve higher
efficiency.
Required
■ Automate recurring tasks: The PAM solution must have the ability to automate any repeated
job or action that can be performed by a user to improve efficiency and reduce risk. The
solution should leverage session management to run tasks without exposing the credential or
providing full account access to the users. It should only launch the applications or clients
necessary to perform the task at hand with the least privilege. The automation should include
pre- and post- actions and allow users to automate maintenance and provisioning of tasks. An
example is to start and stop services for both Windows and UNIX/Linux systems. The user
selects the automated start/stop task, which prompts the user to select the service to be
managed. The information can be prepopulated or added as a part of a drop-down list to further
limit the control the user has over this account and the server. Another example is to automate
deployments through remote SSH command execution on target systems in both on-premises
and cloud environments.
■ Automate privileged tasks: The PAM solution must have the ability to operationalize privileged
tasks by working to find opportunities to automate, script and integrate with other systems. The
idea is to automate all the steps in a task to remove the opportunities for manual errors.
Examples are:
■ Credential/password workflow automation: This task includes credential and password
request and grant/deny workflows via the system API.
■ Session activation automation: This task activates privileged sessions via the system API.
■ Session workflow automation: This task facilitates privileged session access via the
system API.
■ Asset onboarding and retirement automation: This task onboards or retires and
otherwise manages all assets supported by the solution via the system API.
Preferred
■ Automate privileged tasks: The PAM solution should preferably extend the automation to a
broader number of tasks. Examples are:
■ Governance automation: This task includes all delegation facilities supported by the
solution via the system API.
■ External control automation: This task includes programs that can be completely
controlled by external processes for orchestration and threat response via the system API.
■ Event sink and triggers automation: This task sends eventing information to external
resources in a variety of generic and program-specific output formats, such as syslog,
REST/JSON, external program/process, email, COM calls or named pipes.
■ File management automation: This task includes file storage management, such as file
upload, access and delegation via the system API
Optional
■ Automate privileged tasks: The PAM solution can optionally automate more tasks, such as:
■ Deployment of infrastructure automation: This task includes deployment activities for
components of the solution, such as web applications and services, and remote
components via the system API.
■ Network operations automation: This task includes network operations that require
changes across different hardware vendor platforms, such as port updates, DNS records
creation and routings record configuration.
■ CMDB update automation: This task includes updating CMDB records, such as CMDB
accuracy and data integrity validation, ITSM change request creation and ITSM ticket
round-trip updates.
Required
■ Role-based access controls: The PAM solution must enforce segregation of duties within all
areas of the solution. That includes defining entitlements for access to the management console
and policy engine, and back-end reporting to ensure segregation of duties regardless of the
deployment architecture selected. For example, if using Group Policy, access would be
controlled via Active Directory’s security model and provide the same security model provided
by standard Group Policy Objects (GPOs), including delegated administration. In this model,
administrator access is controlled via the permissions that have been set on the AD GPOs.
■ Policy-based filtering: The PAM solution must have flexible and granular policy-based filtering
features based on a wide variety of fixed or contextual conditions. The solution should allow
policies to be created for individual users or groups, computers and IP address ranges. For
Windows environments, the filters can be defined persistently or ephemerally for Windows
Management Instrumentation (WMI).
■ Operating systems controls:
■ Individual commands elevation: The PAM solution must have the ability to implement a
least-privilege solution by using an on-demand elevation feature for endpoints running on
the respective operating system in scope. The solution must allow users to request privilege
elevation rather using administrative accounts and privileged credentials. That requires the
solution to allow a regular nonadministrative user to run a command as a privileged user,
such as administrator or root, in order to do a job that normal users cannot perform.
■ Parent and child process control: The PAM solution must be able to control which
processes match a rule based on the parent or child process. The solution must have
granular control over the child process, allowing rights to be inherited or blocked for all child
processes or a restricted group of child processes based on launching context. Specifically:
■ Prevent shell escapes (UNIX/Linux): The PAM solution must have the ability to protect
against shell escapes in applications that present a threat by allowing subprocesses to
spawn with the same privileges as the parent application. The solution should be able
to prevent privilege elevation for subprocesses.
■ Prevent granular elevation of subprocesses (Windows): The PAM solution must have
the ability to protect against spawning subprocesses from file open dialogues that
present a threat by allowing the launch of an elevated instance of File Explorer or CMD.
The solution should be able to prevent privilege elevation for subprocesses.
■ Native OS prompt control: The PAM solution must provide the ability for full OS messaging
integration. This includes intercepting Windows User Account Control (UAC) prompts or
Mac Consent prompts to suppress or replace them with customized messages for
individual items, classes of items or globally. Additionally, it should be possible to allow
access self-authorization, after secondary user authorization or challenge-response
Preferred
■ Multiplatform support: The PAM solution should cover all key endpoints in an environment.
This includes Windows operating systems, Mac operating systems, and UNIX and Linux
implementations.
■ MFA (including smart cards) for elevated processes: The PAM solution should provide the
ability to reauthenticate users using methods other than password entry. Messages should be
configurable to allow authentication options, including passwords, smart cards, algorithm-
based response codes and designated user override. When messages are requesting
credentials, they should be presented on the secure endpoint interface for enhanced security.
■ Active Directory bridge for UNIX/Linux: The PAM solution should have the ability to centralize
authentication and configuration management for UNIX, Linux and Mac environments. The PAM
solution should extend Active Directory’s Kerberos authentication and SSO, key Group Policy
capabilities to these platforms.
■ Elevation management: The PAM solution should have the ability to automate execution
approval or blocking based on factors like reputation, origin, installing user, group or process.
The solution should be able to identify trustworthy applications using broad trust attributes to
remove the need to update the solution for each application that shares a common trust
attribute. This includes whitelisting, using simple rules that trust the operating system and
business applications without having to add each individual application.
■ Full support for all OS applications, tasks, and scripts: The PAM solution should allow native
support for all applications, tasks and scripts on endpoints and servers within an organization.
Native support ensures secure application identification using multiple metadata without
elevating the rule engine using command line arguments. For Windows endpoints, this should
extend to executables, control panel applets, management console snap-ins, Windows installer
packages, Windows scripting host scripts, batch files, registry settings, PowerShell scripts,
remote PowerShell command execution, ActiveX controls, COM classes, Windows Store
applications, Windows services, applications downloaded from network locations based on
source URL, and scripts. Additionally, it should control DLL files that are allowed to run under
Optional
■ Elevate applications on demand: The PAM solution should have the option to allow end users
to selectively elevate an application, where the application does not normally require elevation
to function, or where the application has not been configured to automatically elevate. The
solution, in addition to elevating individual applications seamlessly, should provide users the
ability to elevate applications as needed by integrating with the shell to provide the user with an
on-demand elevation facility. This type of functionality is often deployed to advanced users,
such as developers or mobile workers, who require more flexibility.
■ Silent elevation of individual applications: The PAM solution should provide automatic
elevation of applications with no change to the user experience, based on policy for a user that
has logged on with standard (nonelevated) user rights. This is implemented without a prompt.
This policy may be used to target specific applications or to identify any application that triggers
user access control. These applications require granular audit and reporting centrally to assist
with policy refinements over time. This is especially important during the initial deployment,
before wider enterprise deployment.
Required
■ Multifactor authentication: The PAM solution must either provide built-in MFA requiring no
external or third-party MFA software/hardware, or integrate with MFA solutions by means of
multiple protocols. This includes external MFA vendors or MFA RADIUS when it is not desired to
use vendor-provided MFA solutions.
■ Single sign-on: The PAM solution must support all SSO protocols, such as Kerberos, SAML
and OAuth.
■ Enterprise directory: The PAM solution must integrate with LDAP and/or Active Directory to
access user and system metadata, such as entitlements for privileged access.
Preferred
■ McAfee ePO: The PAM solution should fully integrate with the McAfee ePolicy Orchestrator
(McAfee ePO) platform to provide end-to-end management of a solution from within McAfee
ePO as a single pane of glass.
■ Identity governance and administration (IGA): The PAM solution should have a bidirectional
integration using REST API with IGA capabilities. This is to exchange policy, entitlement, risk,
account, access and activity data between the two systems. When integrated, the IGA
capabilities automatically provision or deprovision privileged user entitlements as life cycle
events occur. Bidirectional integration provides greater visibility into and control over privileged
accounts in their environment. This type of integration is possible in most PAM and IGA tools.
For example, the solution can have the ability to provide credentials to an IGA and manage
those credentials. Where organizations manage and govern privileged access in the cloud, the
PAM solution should have bidirectional integration with cloud IGA or IDaaS services. The
solution can preferably use SCIM 2.0 REST endpoints to provision users and groups to the
available security providers.
Optional
■ External encryption services: The PAM solution should have the ability to integrate with a
variety of encryption-related services, such as:
■ SSL/TLS certificate management: The solution can request and automatically renew
SSL/TLS certificates used by secure remote access appliances. This allows for easy
administrations of SSL/TLS certificates.
■ Key management: The solution can choose to encrypt session data stored on appliances
using the key management interoperability protocol (KMIP). KMIP allows broad support for
the various key management solutions available.
■ Hierarchical storage management (HSM): The solution can use any PKCS #11-compliant
HSM for key and encryption management.
■ SNMP monitoring: The solution needs to be able to be monitored by external monitoring
systems via SNMP for the critical server components.
■ Robotic process automation: The PAM solution should have the ability to provide credentials
to a software robot process and manage those credentials. These credentials are retrieved
whenever software robot entities require the login credentials for a specific account. For
example, when an RPA process requests a credential, instead of the username and password, it
Required
■ Flexible deployment model: The PAM solution should offer deployment models that match a
variety of use cases. Examples are:
■ Physical appliance deployment: A hardened physical appliance to run the PAM software.
This alternative minimizes the administrative overhead to keep the solution operating in
production.
■ Virtual appliance deployment: A popular model is the capability to deploy a virtual
appliance within an existing VMware, Microsoft Hyper-V, Azure or AWS virtual infrastructure.
This alternative also minimizes the administrative overhead to keep the solution operating in
production.
■ Software-based deployment: Install and leverage software on a provided system that
leverages configured security policies.
■ Out-of-the-box installation scripts and templates: The PAM solution must have scripts and
templates to provide automated installation and deployment of PAM software on one or multiple
servers. If it is necessary, the installation scripts should check for prerequisites and install them.
■ Out-of-the-box configuration templates: The PAM solution must support out-of-the-box
configuration of common policies, operating system tasks and trusted applications. The
solution should come with out-of-the-box policy templates for all endpoint and server OSs.
These provide a comprehensive baseline configuration to enable organizations to fully and
quickly remove admin rights from end-user devices without compromising end-user
productivity, by providing a best-practice approach. This should use a UAC replacement (for
Windows) and on-demand strategy to facilitate rapid product adoption and rollout. For example:
■ Rules: To automatically approve trusted business applications, including those deployed via
SCCM or other trusted security sources, common third-party tools such as printer drivers,
and meeting software.
■ Exception handling process: To deal with unknown applications with a workflow suited to
multiple user types, such as a developer, field workers and task workers.
■ Granular service control: The PAM solution must have the ability to control the service action
(start/stop, pause/resume, configure) granularly. This is to prevent the need for elevating the
service console, which would allow the user to tamper with any other service.
Preferred
■ Agent-based: For privilege elevation and delegation capability, the PAM solution should have
the ability to use agents on the target systems for credential update (e.g., password changes).
This is useful for disconnected scenarios or workstations/laptops where the system may not be
powered on or connected when password changes are scheduled.
■ Agents MSI installers: The PAM solution should create downloadable MSI versions of the
agents so that the option for agent deployment can be managed through the organization
system management solution.
■ Silent installation options for agents: The PAM solution must have the ability to install
agents without user interaction or notification so that it minimizes disruption to end users.
■ Agentless deployment: The PAM solution should have the ability to manage credentials
without the need for agents on the target systems. This simplifies implementation and
eliminates the need for agent maintenance and patching over time.
■ Bulk deployment installers: The PAM solution should create mass deployable installer
packages for representative consoles and jump clients (e.g., Windows and Mac). Also, it should
create MSI packages for session recording viewers and support buttons (for Windows only).
■ Automatic installation of critical updates: The PAM solution should be kept up to date with
minimal disruption to production.
Optional
■ SaaS deployment: The PAM solution should support the emerging SaaS-based solutions
model for organizations that are limited in staff, physical resources and expertise, or have
strategic cloud-first initiatives.
“Best Practices for Privileged Access Management Through the Four Pillars of PAM”
Evidence
Gartner’s observations and recommendations are based on data from:
■ Ongoing discussions with large and midsize enterprises (including RFP and proposal review) in
public and private sectors such as government, financial services, insurance, manufacturing
and healthcare.
■ Vendor surveys, briefings, interviews and product demos from PAM vendors.
Corporate Headquarters
56 Top Gallant Road
Stamford, CT 06902-7700
USA
+1 203 964 0096
Regional Headquarters
AUSTRALIA
BRAZIL
JAPAN
UNITED KINGDOM
© 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This
publication may not be reproduced or distributed in any form without Gartner's prior written permission. It consists of the opinions of
Gartner's research organization, which should not be construed as statements of fact. While the information contained in this publication
has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of
such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice
and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner Usage Policy.
Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research
organization without input or influence from any third party. For further information, see "Guiding Principles on Independence and
Objectivity."