• Our channels:
  • Cyber Risk
  • Chief IT
  • Australian Security
  • Asia Pacific
  • Southeast Asia
  • Space
  • Smart Cities
  • Drones & Robotics
  • Video Systems
  • Podcast
  • MySec.TV
  • Best in Tech
  • MySmartTech
Australian Cyber Security Magazine
Navigate
  • Australian Cyber Security Magazine
  • News
    • Featured
    • Editor’s Desk
    • Skills & Training
    • Governance, Risk & Compliance
    • Hacking & Penetration Testing
    • Information Security
    • Strategy & Architecture
    • MySecurity TV
    • Cyber Security Weekly Podcast
  • Contributors
  • Magazines
  • Events
  • RESOURCES
  • TRAINING
  • SHOP
  • Advertise
  • Subscribe

NCCoE Seeks Comments on Draft Privileged Acocunt Management Practice Guide

0
By ACSM_admin on October 3, 2018 APP-ACSM, CyberTech Verticals, End-Point Security, Information Security, Strategy & Architecture

Download the Latest Draft Cybersecurity Practice Guide

We are excited to announce the release of draft National Institute of Standards and Technology Special Publication 1800-18: Privileged Account Management for the Financial Services Sector. The National Cybersecurity Center of Excellence (NCCoE) seeks your feedback. The comment period is open until November 30, 2018. Submit comments online or via email to financial_nccoe@nist.gov.

About the Guide

Privileged accounts provide elevated, often unrestricted access to an organization’s underlying information systems and technology, making them rich targets for both external and internal malicious actors. Often referred to as the “keys to the kingdom,” these accounts have been used in successful attacks to gain access to corporate resources and critical systems (e.g., “crown jewels”), resulting in data breaches.

Complex organizations, including financial services companies, face challenges in managing privileged accounts, which opens a significant risk to their business. If used improperly, these accounts can cause significant operational damage, including data theft, espionage, sabotage, ransom, or bypassing important controls.

To address these challenges, the NCCoE developed a draft practice guide providing practical guidance to financial services companies who are interested in implementing a Privileged Account Management (PAM) solution.

This draft practice guide demonstrates a PAM solution that uses commercially available products to appropriately secure and enforce organizational policies for the use of privileged accounts. The NCCoE developed a PAM reference design that outlines how monitoring, auditing, and authentication controls can combine to prevent unauthorized access to — and allow rapid detection of unapproved use of — privileged accounts. Our standards-based example solution uses commercially available products and can be used in whole or in part.

The comment period is open until November 30, 2018, and comments may be submitted online or via email to financial_nccoe@nist.gov.

Share. Twitter Facebook Pinterest LinkedIn Tumblr Email

Related Posts

  • APP-ACSM | Cyber Security | Editor's Desk | Featured | May 23, 2025

    Configuration compromise leads to 90 bounties – Hack the Hacker Series

  • Featured | Information Security | Movers & Shakers | Network Security | Technology | May 23, 2025

    ACMA Partners With Ireland’s ComReg to Combat Phone Scams

  • APP-ACSM | Featured | Technology | Women in CyberSecurity | May 21, 2025

    BT Helps Get More Women Into Cyber

ENJOY OUR OTHER CHANNELS

  • The Australian Cyber Security Magazine covers the broad domain of cybersecurity with news, updates and contributed articles from leading security professionals from
    across the world. The Editorial importantly sets the scene for a challenging threat landscape, with continued reports of serious data breaches.

    MySecurity Media Pty Limited
    ABN 54 145 849 056
    A: GPO Box 930 Sydney NSW 2001
    E: promoteme@mysecuritymedia.com
    W: www.mysecuritymedia.com

  • NETWORK

    • Marketplace
    • Community
    • Contributors
    • Lead Publication
    • Promote Your Brand
    • Privacy Policy
  • NEWS

    • Featured
    • Editor’s Desk
    • Skills & Training
    • Governance, Risk & Compliance
    • Hacking & Penetration Testing
    • Information Security
    • Strategy & Architecture
  • DOWNLOAD APP

  • EVENTS
    > Find a Speaker
    > New Arrivals
    > Upcoming Events
    > Past Events
    > Register an Event
  • RESOURCES
    > Reports
    > Whitepapers
    > Research
    > Books
    > COVID 19 Resources
    > Magazines
    > Podcasts
    > MySecurity TV
    > Australia in Space TV
  • PRODUCTS
    > Solution Products
    > Online Store
    > TeePublic Store
    > Promote Your Brand

    TRAINING
    > Courses
    > Webinars – Live
    > Webinars – On Demand
    > Learn Security Platform
  • COMMUNITY
    > Indo-Pacific Space and Earth Network
    > Space and Earth - Partners and Advisory
    > IPRAAC
    > IPSEC
    > Security & Risk Professional Insight Series
    > Women in Security Awards
    > Partners
    > Speakers
    > Providers
    > Promote Your Brand
  • NEWS CHANNELS
    > MySec.TV
    > Australia in Space TV
    > Cyber Security Weekly Podcast
    > Cyber Risk Leaders
    > Chief IT
    > Drones & Robotics
    > Space & Defense
    > Australia in Space
    > Smart Cities Tech
    > Video Systems
    > Asia Pacific Security Magazine
    > ASEAN Technology & Security
    > Australian Cyber Security Magazine
    > Australian Security Magazine

© My Security Media. All Right Reserved 2019.   Privacy Policy | Terms & Conditions | Competition T&Cs