How does a lack of PAM tooling leave an organisation exposed?
There are countless examples where careless storage/assignment of privileged credentials/entitlements have left companies vulnerable. They fall into two main categories:
Users have too much access to start with (access that far exceeds their day-to-day responsibilities)
Privileged credentials are stored in an insecure manner across the environment.
In the first instance, once an account with privileged access has been compromised, limited preventative controls can be relied upon to mitigate the risk of an attacker abusing this account. The attacker may have the ability to circumvent and turn off security controls such as EDR software and logging and monitoring tools. These types of attacks have been seen in the market, and once an attacker has this access, they can cause significant damage to the IT estate.