Skip to content

Commit

Permalink
Merge pull request #8082 from GSA/update-3-links
Browse files Browse the repository at this point in the history
Update 2022-11-10-the-privileged-identity-playbook-guides-management-…
  • Loading branch information
ToniBonittoGSA authored Oct 18, 2024
2 parents 47b82e9 + a5a7723 commit 3167836
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ Information systems are the backbone of federal websites and digital services. O

Privileged users perform various security-related duties that make them targets for cybercriminals or malicious insiders. The misuse or compromise of privileged user accounts has resulted in the most high-profile federal and private security breaches. Therefore, it is critical for federal agencies to identify privileged users and protect their access to high-value assets.

The General Services Administration’s (GSA) Identity, Credential, and Access Management (ICAM) team has created the [Privileged Identity Playbook](https://playbooks.idmanagement.gov/playbooks/pam/) as a practical guide to help federal agencies manage their privileged user accounts as part of an overall agency ICAM program. Managing privileged user accounts actively decreases the cyber risk to your agency's mission.
The General Services Administration’s (GSA) Identity, Credential, and Access Management (ICAM) team has created the [Privileged Identity Playbook](https://www.idmanagement.gov/playbooks/pam/) as a practical guide to help federal agencies manage their privileged user accounts as part of an overall agency ICAM program. Managing privileged user accounts actively decreases the cyber risk to your agency's mission.

The three main ways to identify a privileged account or user are:

Expand All @@ -41,7 +41,7 @@ You should manage privileged users as distinct and separate identities to decrea
* Jeopardize sensitive information or infrastructure, knowingly or unknowingly.
* Compromise the three core elements of information security: availability, confidentiality, and integrity.

Your agency can use the [Privileged Identity Playbook](https://playbooks.idmanagement.gov/playbooks/pam/) to manage privileged users following governmentwide best practices. The playbook includes a four-step process aligned with the [Federal Identity, Credential, and Access Management Architecture](https://playbooks.idmanagement.gov/arch/) (FICAM), designed for insider threat, identity management, and risk management professionals interested in mitigating privileged user risk. For risk management professionals, the playbook also includes a [NIST 800-53 revision 5](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final) privileged user control overlay. We also encourage agencies and other IT program participants, such as cybersecurity program managers, to tailor this playbook to fit their unique organizational structure, mission, and technical requirements.
Your agency can use the [Privileged Identity Playbook](https://www.idmanagement.gov/playbooks/pam/) to manage privileged users following governmentwide best practices. The playbook includes a four-step process aligned with the [Federal Identity, Credential, and Access Management (FICAM) Architecture](https://www.idmanagement.gov/arch/), designed for insider threat, identity management, and risk management professionals interested in mitigating privileged user risk. For risk management professionals, the playbook also includes a [NIST 800-53 revision 5](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final) privileged user control overlay. We also encourage agencies and other IT program participants, such as cybersecurity program managers, to tailor this playbook to fit their unique organizational structure, mission, and technical requirements.

The Privileged Identity Playbook supplements existing federal IT policies and builds on the Office of Management and Budget Memorandum (OMB) [Memo 19-17 - Enabling Mission Delivery through Improved Identity, Credential, and Access Management (PDF, 1 MB, 13 pages)](https://www.whitehouse.gov/wp-content/uploads/2019/05/M-19-17.pdf) and OMB [Memo 22-09 - Federal Zero Trust Strategy](https://zerotrust.cyber.gov/federal-zero-trust-strategy/), as well as existing federal identity guidance and playbooks.

Expand Down

0 comments on commit 3167836

Please sign in to comment.