• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Leveraging Passwordless Administration

by CXO Staff
September 14, 2020
in Opinions

Morey Haber, BeyondTrust, shares insights on passwordless administration and why it is a critical layer for an effective endpoint security strategy.

data protection security cybersecurity
Morey Haber, BeyondTrust
Morey Haber, BeyondTrust

Passwordless administration — a use case offered via Privileged Access Management (PAM) — refers to the ability to perform administrative functions on an endpoint without the need for privileged or administrator credentials. The concept of passwordless administration is generally linked to just-in-time (JIT) privileged access management, since the methods of applying passwordless administration can cover several technologies to temporarily elevate the user or the application (preferred method) for the specific requested task. In other words, in lieu of entering secondary administrative credentials for a task that requires elevation, the user is trusted based on context (or attributes) to run the application in an elevated state — without an additional challenge and response mechanism.

The need for Passwordless Administration

The mushrooming quantity of administrative accounts with excessive privileges makes them an easy and favored target for threat actors. Each of these admin accounts is an attack vector that offers a successful attacker administrative capabilities over the entitlements to which the admin account is assigned.

Typically, administrative accounts are assigned with privileges en masse, since administrative functions are needed by end users all the way through to true system, network, and database administrators — the accounts that often have access to the organisation’s most valuable information (trade secrets, etc.).

Unfortunately, administrative/superuser accounts are also often assigned to regular end users so they can add a printer, run a specific program, or even change network settings.

Consider the following applications and tasks that still need administrative rights on a standard Windows endpoint:

  • The ability to modify system settings or change operating system features within Windows Settings or Control Panel
  • The ability to install or uninstall applications
  • The ability to edit the registry, or modify files within the Windows operating system or protected files within program files
  • The ability to execute programs that require administrative rights based on how they are compiled or their interaction with the operating system, network, or file system
  • The ability to execute programs that have their own update mechanisms to provide the latest versions for security and features
  • The ability to install browser plug-ins and extensions

All these are valid use cases and require administrator credentials to perform the tasks. While modern Windows systems have made huge headways in managing privileges, in a typical day, a user will need to have administrative rights to perform any of these functions. Typically, this is granted by issuing a secondary administrator account for the host, or worse, just making their current credentials a local administrator. The outcome of both of these choices is high-risk configurations that greatly expand the threat surface of malware, ransomware, and malicious behaviour.

The dilemma becomes how to remove administrative credentials from both personas to mitigate the risks from a threat actor targeting these accounts. The answer is relatively simple — passwordless administration, which can enable users to perform these job-related functions without requiring any additional credentials or introducing unnecessary risks.

With Forrester Research implicating privileged credentials in 80% of breaches, the elimination of privileged passwords wherever possible greatly reduces the threat surface. This premise is further buttressed by the fact that 77% of Microsoft critical vulnerabilities can be mitigated by the removal of admin rights, and a similar reduction is also demonstrable by enforcing least privilege on third-part applications.

As such, every endpoint security strategy should consider using passwordless administration as a layer of security after antivirus to mitigate the most prevalent privileged attack vectors. This approach precedes the implementation of any EDR, MDR, or XDR strategy — or even the use of dedicated web proxy and protocol inspection technologies. Why? Because simply by removing administrative rights and enforcing reputation-based application control, vast threat surface can be eliminated outright or at least condensed. This includes for such threats as dangerous payloads and fileless malware.

Steps to implement Passwordless Administration

Passwordless administration only requires two preliminary steps within any organisation to move it from concept to reality. First it is essential to identify which tasks require administrative privileges to operate and next, identify which users need to execute them.

Then, passwordless administration can be applied based on features available in many operating systems (although they are limited) or by deploying a privileged access management solution for your environment.

Passwordless Administration Methods

Passwordless administration can come in a variety of forms and support zero trust architectures, software-defined perimeters, and change control best practices for any environment. Consider following security controls:

  • Zero Trust: All applications are considered blacklisted unless explicitly allowed based on attributes, and the privileges for execution are strictly controlled. Detailed logging is provided for all privileged activity and application privileges are elevated, never the end user, to ensure the control and data planes for zero trust remain completely separate.
  • Software-Defined Perimeter: All applications and user privileges are controlled on the endpoint for maximum endpoint security. The software executing on the endpoint actually becomes hardened as a part of your software security strategy. This includes controlling functions like blocking child processes and attribute-based context control for application runtime (i.e. allowing an application to run while in the office, but blocking it when run at home or on a wireless network).
  • Change Control: All application execution and modifications, including software updates, can be controlled with complete integration into an ITSM solution to ensure no inappropriate activity, changes, or malware infects the system.
  • Reputation Services: Application control can be performed by attributes and verified against third-party sources and origin of the executable to ensure that no malware is present.

If you consider the context of all of these security controls, it is possible to perform passwordless administration based on rules and policies for operating system tasks and applications that need administrative rights.

The key to effectively implementing this strategy starts with a universal privileged management approach to privileged access management. Management, information technology, and information security professionals must agree that a user should not have local administrative rights, and all and users should operate with standard user privileges. Then, policies and rules can be set in place to perform elevation for the proper tasks using industry standard best practices for endpoint privilege management.

Tags: BeyondTrustendpoint securityfeatured4Morey HaberPasswordless
ShareTweet

Related Posts

How the Middle East is becoming a global hub for experiential digital innovation
Opinions

How the Middle East is becoming a global hub for experiential digital innovation

Across the Middle East, governments and private enterprises are investing heavily in experiential digital experiences that blur the lines between...

June 18, 2025
Channel Vision Strategy: Empowering cyber resilience
Opinions

What most businesses get wrong about data security

In today's AI-driven world, vast amounts of data are generated daily across industries like finance, e-commerce, healthcare, and government services....

June 11, 2025

Discussion about this post

Latest Issue

Massive data breach exposes 16 billion credentials

Massive data breach exposes 16 billion credentials

June 20, 2025
Pure Storage introduces the Enterprise Data Cloud

Pure Storage introduces the Enterprise Data Cloud

June 19, 2025
HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

HCLSoftware targets Middle East growth with XDO Framework launch in Dubai

June 18, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.