<section title="16.4. Privileged Access Management"><subsection title="Objective"><paragraph
    title="16.4.1."


><![CDATA[<p class="NormS16C4">To ensure Privileged Access Management (PAM) is incorporated into IT Governance and that privileged accounts are managed in accordance with agency’s PAM policy.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="16.4.2."


><![CDATA[<p class="NormS16C4">This section provides information and guidance on the establishment and operation of an agency’s Privileged Access Management policy and control mechanisms.  This is sometimes also described as Privileged Account Management.  In the context of this section the terms are synonymous.</p>]]></paragraph>
<paragraph
    title="16.4.3."


><![CDATA[<p class="NormS16C4">Reference to other sections in this document is essential.&nbsp; In particular:</p>
<ul>
<li><a title="System users" href="http://nzism.gcsb.govt.nz/ism-document#Section-12444">3.5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; System Users</a>;</li>
<li><a title="Documentation fundamentals" href="http://nzism.gcsb.govt.nz/ism-document#Section-12683">5.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Documentation Fundamentals</a>;</li>
<li><a title="Change management" href="http://nzism.gcsb.govt.nz/ism-document#Section-13048">6.3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Change Management</a>;</li>
<li><a title="Information security awareness and training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">9.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Information Security Awareness and Training</a>;</li>
<li><a title="Identification, authentication and authorisation" href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">16.1&nbsp;&nbsp;&nbsp; Identification, Authentication, and Authorisation</a>;</li>
<li><a title="System access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15483">16.2&nbsp;&nbsp;&nbsp; System Access</a>;</li>
<li><a title="Privileged user access" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">16.3&nbsp;&nbsp;&nbsp; Privileged User Access</a>;</li>
<li><a title="MFA" href="http://nzism.gcsb.govt.nz/ism-document#Section-15681">16.7&nbsp;&nbsp;&nbsp; Multi-Factor Authentication</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="16.4.4."


><![CDATA[<p class="NormS16C4"><strong>Privileged Access Management (PAM)</strong> – sometimes also described as Privileged Account Management, refers to a set of processes and tools for granting, controlling, monitoring, and auditing privileged access.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.5."


><![CDATA[<p class="NormS16C4">A <strong>Privileged Account</strong> is a user account with high levels of access to systems, devices and data.&nbsp; Privileged accounts may, for example, be able to install or remove software, delete data, upgrade operating systems, or modify system or application configurations.&nbsp; They may also have access to data that is not normally accessible to standard users.</p>]]></paragraph>
<paragraph
    title="16.4.6."


><![CDATA[<p class="NormS16C4">Privileged accounts invariably have direct or indirect access to most or all IT assets of an agency or organisation.&nbsp; When used improperly or maliciously, privileged accounts represent a significant security threat to operations, often exposing sensitive data, impeding operations or damaging IT systems.&nbsp; Any compromise of these accounts is, therefore, a significant business, operational and reputational risk.</p>]]></paragraph>
<paragraph
    title="16.4.7."


><![CDATA[<p class="NormS16C4"><span class="TextRun SCXW257963467 BCX8"><span class="NormalTextRun SCXW257963467 BCX8">Risks associated with privileged accounts have increased in recent years with the expansion of endpoints and use of </span><span class="NormalTextRun SCXW257963467 BCX8">new technologies</span><span class="NormalTextRun SCXW257963467 BCX8"> including Cloud, Internet of Things (IoT) and the rapid and significant increase in remote and working from home</span><span class="NormalTextRun SCXW257963467 BCX8"> environments</span><span class="NormalTextRun SCXW257963467 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.8."


><![CDATA[<p class="NormS16C4">Managing, controlling, monitoring and reviewing privileged access is fundamental to mitigating the risks posed by insider and external threats, privilege escalation threats, preventing unauthorised data access and data breaches, and meeting compliance requirements.</p>]]></paragraph>
<paragraph
    title="16.4.9."


><![CDATA[<p class="NormS16C4">There are many types of privileged access including:</p>
<ul>
<li><strong>Root</strong>, <strong>Domain </strong>and other <strong>Administrator </strong>accounts are typically used for installing, updating and removing software, changing configurations and administering system passwords.</li>
<li><strong>Service Accounts</strong>, which may include local or domain accounts, are typically used for running processes, such as web servers, database servers, and application servers.&nbsp; These may also include the ability to change passwords.</li>
<li><strong>Emergency Accounts</strong>, sometimes referred to as “DRP”, “firecall”, or “breakglass” accounts. <span class="NormalTextRun SCXW182070699 BCX8">These are highly privileged accounts that are critical for </span><span class="NormalTextRun SCXW182070699 BCX8">maintaining</span><span class="NormalTextRun SCXW182070699 BCX8"> administrative access in case of emergency. While access to these accounts normally requires managerial approval as a security measure, they should only ever be used when normal administrative accounts are unavailable and when critically necessary.</span></li>
<li><strong>System </strong>or <strong>Application Accounts </strong>are characteristically used by devices and systems for running operating system components and owning related files.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.10."


><![CDATA[<p class="NormS16C4">Traditional administrative or management solutions are typically based on strong password management.&nbsp; Modern systems, especially in a cloud environment, require a more structured and robust means of access control and management.&nbsp; This should include the use of Multi-Factor Authentication (See Section 16.7 - Multi-factor Authentication) to provide access to privileged accounts.</p>]]></paragraph>
<paragraph
    title="16.4.11."


><![CDATA[<p class="NormS16C4">In secure environments, privileged accounts should be reserved for network and system administrators to manage the access to and oversight of sensitive information and resources in support of normal agency or organisational operations.</p>]]></paragraph>
<paragraph
    title="16.4.12."


><![CDATA[<p class="NormS16C4">The characteristics and capability of privileged accounts are described at 16.3.3.  It is important to note that systems themselves, as well as human users, may have privileged account access.  As such it is important to clearly and individually identify all real persons, systems and devices with privileged account access.</p>]]></paragraph>
<paragraph
    title="16.4.13."


><![CDATA[<p class="NormS16C4">Access accounts or channels may have the following characteristics:</p>
<ul>
<li><strong>Regular access channels</strong>—protected channels that are subject to standard IT controls;</li>
<li><strong>Privileged access channels (PACs)</strong>— channels that might circumvent regular controls but are deemed necessary and legitimate operational channels for reasons of practicality or cost;</li>
<li><strong>Unintended channels</strong>—not demanded by any technical or business requirement and represent a vulnerability.</li>
</ul>]]></paragraph>
</block>
<block title="Emergency accounts (Break glass accounts) "><paragraph
    title="16.4.14."


><![CDATA[<p><span class="TextRun Highlight SCXW64583340 BCX8"><span class="NormalTextRun SCXW64583340 BCX8">Emergency </span><span class="NormalTextRun SCXW64583340 BCX8">accounts</span><span class="NormalTextRun SCXW64583340 BCX8"> (also known as break glass accounts) are highly privileged accounts and should only be used for </span><span class="NormalTextRun SCXW64583340 BCX8">maintaining</span><span class="NormalTextRun SCXW64583340 BCX8"> access to </span><span class="NormalTextRun SCXW64583340 BCX8">an </span><span class="NormalTextRun SCXW64583340 BCX8">organisation</span><span class="NormalTextRun SCXW64583340 BCX8">’</span><span class="NormalTextRun SCXW64583340 BCX8">s </span><span class="NormalTextRun SCXW64583340 BCX8">critical systems in emergencies. These accounts require </span><span class="NormalTextRun SCXW64583340 BCX8">additional</span><span class="NormalTextRun SCXW64583340 BCX8"> layers of protection and</span><span class="NormalTextRun SCXW64583340 BCX8">&nbsp;should never be used for regular administrative functions.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.15."


><![CDATA[<div class="SCXW4082012 BCX8">
<div class="ListContainerWrapper SCXW4082012 BCX8">
<p class="Paragraph SCXW4082012 BCX8"><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Additional</span><span class="NormalTextRun SCXW4082012 BCX8"> protections include:&nbsp;</span></span><span class="EOP SCXW4082012 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW4082012 BCX8">
<ul>
<li class="Paragraph SCXW4082012 BCX8"><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Break glass accounts are </span></span><strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">only</span></span></strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"><strong> </strong>used when normal authentication processes cannot be used, </span></span><strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">and</span></span></strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"><strong> </strong>when there is a critical need to access systems</span> <span class="NormalTextRun SCXW4082012 BCX8">(or testing these for disa</span><span class="NormalTextRun SCXW4082012 BCX8">s</span><span class="NormalTextRun SCXW4082012 BCX8">ter r</span><span class="NormalTextRun SCXW4082012 BCX8">ecovery)</span><span class="NormalTextRun SCXW4082012 BCX8">.</span></span></li>
<li class="Paragraph SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"><strong>Use of non-expiring passwords</strong>:</span><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8"> passwords for break glass accounts should not expire. This helps prevent lockouts during emergencies.</span></span></li>
<li class="Paragraph SCXW4082012 BCX8"><strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">No individual association</span></span></strong><span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">: </span><span class="NormalTextRun SCXW4082012 BCX8">ensure</span><span class="NormalTextRun SCXW4082012 BCX8"> emergency accounts are not associated to an individual user.</span></span></li>
<li class="Paragraph SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Central logging</span><span class="NormalTextRun SCXW4082012 BCX8"> and auditing</span><span class="NormalTextRun SCXW4082012 BCX8"> of all actions related to use of break glass </span><span class="NormalTextRun SCXW4082012 BCX8">accounts</span> <span class="NormalTextRun SCXW4082012 BCX8">should be </span><span class="NormalTextRun SCXW4082012 BCX8">performed</span><span class="NormalTextRun SCXW4082012 BCX8">.</span> <span class="TextRun Highlight SCXW4082012 BCX8"><span class="NormalTextRun SCXW4082012 BCX8">Accounts are tested after credentials are changed.</span></span><span class="EOP SCXW4082012 BCX8">&nbsp;</span></li>
</ul>
</div>
</div>]]></paragraph>
<paragraph
    title="16.4.16."


><![CDATA[<p><span class="TextRun Highlight SCXW165431320 BCX8"><span class="NormalTextRun SCXW165431320 BCX8">E</span><span class="NormalTextRun SCXW165431320 BCX8">mergency accounts</span><span class="NormalTextRun SCXW165431320 BCX8"> should be excluded </span><span class="NormalTextRun SCXW165431320 BCX8">from MFA policy. MFA </span><span class="NormalTextRun SCXW165431320 BCX8">on </span><span class="NormalTextRun SCXW165431320 BCX8">break glass</span><span class="NormalTextRun SCXW165431320 BCX8"> accounts </span><span class="NormalTextRun SCXW165431320 BCX8">should be managed through other mechanisms outside system policy</span><span class="NormalTextRun SCXW165431320 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.17."


><![CDATA[<div class="ListContainerWrapper SCXW222682364 BCX8">
<p class="Paragraph SCXW222682364 BCX8"><span class="TextRun Highlight SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Emergency accounts should have MFA without being associated to any user. </span><span class="NormalTextRun SCXW222682364 BCX8">Examples of</span> <span class="NormalTextRun SCXW222682364 BCX8">how this can be </span><span class="NormalTextRun SCXW222682364 BCX8">accomplished</span><span class="NormalTextRun SCXW222682364 BCX8"> are</span><span class="NormalTextRun SCXW222682364 BCX8">:&nbsp;</span></span><span class="EOP SCXW222682364 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW222682364 BCX8">
<ul>
<li class="Paragraph SCXW222682364 BCX8"><span class="TextRun Highlight SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Utilisation of a </span><span class="NormalTextRun SCXW222682364 BCX8">password</span></span>
<ul>
<li class="Paragraph SCXW222682364 BCX8"><span class="TextRun Highlight SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Pass</span><span class="NormalTextRun SCXW222682364 BCX8">word</span><span class="NormalTextRun SCXW222682364 BCX8">s can be split into </span><span class="NormalTextRun SCXW222682364 BCX8">two and</span><span class="NormalTextRun SCXW222682364 BCX8"> stored in separate safes with strict limitations on authorised personnel accessing each safe.<br><br></span></span></li>
</ul>
</li>
<li class="Paragraph SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Use of FIDO2 security keys</span>
<ul>
<li class="Paragraph SCXW222682364 BCX8"><span class="NormalTextRun SCXW222682364 BCX8">Two separate keys can be registered and stored in separate safes with strict limitations on authorised personnel accessing each safe.<br><br></span></li>
</ul>
</li>
<li class="Paragraph SCXW222682364 BCX8">Virtualisation<span class="NormalTextRun SCXW222682364 BCX8">, </span><span class="NormalTextRun SCXW222682364 BCX8">noting this option cannot be associated to an individual user</span><span class="NormalTextRun SCXW222682364 BCX8">.</span></li>
</ul>
</div>]]></paragraph>
<paragraph
    title="16.4.18."


><![CDATA[<p><span class="TextRun Highlight SCXW181059006 BCX8"><span class="NormalTextRun SCXW181059006 BCX8">It is important to consider adequate </span><span class="NormalTextRun SCXW181059006 BCX8">storage and access of </span><span class="NormalTextRun SCXW181059006 BCX8">break glass</span><span class="NormalTextRun SCXW181059006 BCX8"> accounts </span><span class="NormalTextRun SCXW181059006 BCX8">in disaster recovery plans</span><span class="NormalTextRun SCXW181059006 BCX8">.</span> <span class="NormalTextRun SCXW181059006 BCX8">Storage, including how (and when) to access these accounts should be included in disaster recovery planning (DRP) (Chapter 3)</span><span class="NormalTextRun SCXW181059006 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title="Attacks on privileged accounts"><paragraph
    title="16.4.19."


><![CDATA[<p>Privileged accounts frequently allow unrestricted access the IT infrastructure, often including data residing on those systems.&nbsp; The very high level of access and capability associated with privileged accounts makes them a prime target for external attackers and malicious insiders.&nbsp; A compromise of a privileged account can be extremely damaging and may even take down systems, such as in ransomware attacks.</p>]]></paragraph>
<paragraph
    title="16.4.20."


><![CDATA[<p>Compromised privileged accounts represent one of the largest security vulnerabilities an organisation. A compromise may allow attackers to take full control of an organisation’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations.&nbsp; Stolen, abused or misused privileged credentials are identified in a very high proportion of successful breaches.</p>]]></paragraph>
<paragraph
    title="16.4.16."


><![CDATA[<p class="NormS16C4">Common attack methods may include:</p><ul>
<li>Probes and scans;</li>
<li>endpoint targeting;</li>
<li>System and design vulnerability exploitation;</li>
<li>Social engineering (including phishing, email spoofing, etc); and</li>
<li>Malware implants.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.22."


><![CDATA[<p><span class="TextRun Highlight SCXW124756854 BCX8"><span class="NormalTextRun SCXW124756854 BCX8">These attack methods are </span><span class="NormalTextRun SCXW124756854 BCX8">essentially the</span><span class="NormalTextRun SCXW124756854 BCX8"> same as attack methods on standard accounts. The difference, however, is the level of access an attacker gains once successful, and the increase of risk to entities and </span><span class="NormalTextRun SCXW124756854 BCX8">organisations</span><span class="NormalTextRun SCXW124756854 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title="Governance and Control"><paragraph
    title="16.4.23."


><![CDATA[<p class="NormS16C4">Privileged accounts are frequently used to deploy and maintain IT systems and necessarily exist in nearly every connected device, server, database, and application.&nbsp; Privileged accounts may extend beyond an agency-controlled IT infrastructure to include, for example, employee-managed corporate social media accounts.&nbsp; Most agencies and other organisations can typically have many more privileged accounts than employees, sometimes as many as two or three times the number of employees.&nbsp; It is not unusual for some privileged accounts to be unidentified, overlooked, unmanaged, and therefore unprotected.</p>]]></paragraph>
<paragraph
    title="16.4.24."


><![CDATA[<p class="NormS16C4">Governance ensures that privileged accounts are properly approved, controlled, monitored and decommissioned throughout their entire lifecycle.&nbsp; A PAM policy defines the roles, policies and mechanisms for access requests, as well as the workflow for privileged access approvals and delivery.&nbsp; Monitoring and auditing ensure that account permissions and usage remain appropriate over time.&nbsp; PAM governance is a fundamental part of IT Governance as it can influence other IT security systems, such as identity and access management systems.</p>]]></paragraph>
<paragraph
    title="16.4.25."


><![CDATA[<p class="NormS16C4"><span class="TextRun SCXW172537762 BCX8"><span class="NormalTextRun SCXW172537762 BCX8">To support strong IT Governance, it is vital that security efforts are </span><span class="NormalTextRun SCXW172537762 BCX8">coordinated,</span><span class="NormalTextRun SCXW172537762 BCX8"> and technology investment managed</span><span class="NormalTextRun SCXW172537762 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW172537762 BCX8">This includes the integration of PAM into the Information Security Policy, Systems Architecture, IT Security Strategy and Risk Management Plan. The sensitivity of data and operations should be assessed by undertaking an impact assessment.</span></span><span class="EOP SCXW172537762 BCX8">&nbsp;</span></p>]]></paragraph>
<paragraph
    title="16.4.26."


><![CDATA[<p class="NormS16C4">Underpinning any PAM is the principle of enforcement of least privilege.&nbsp; This is defined as the minimisation of access rights and permissions for users, accounts, applications, systems, devices and computing processes to the absolute minimum necessary in order to perform routine, authorised activities and maintain the safe and secure operation of agency or organisational systems.</p>]]></paragraph>
<paragraph
    title="16.4.27."


><![CDATA[<p><span class="TextRun SCXW230104649 BCX8"><span class="NormalTextRun SCXW230104649 BCX8">Enforcing the principle of least privilege </span><span class="NormalTextRun SCXW230104649 BCX8">assists</span> <span class="NormalTextRun SCXW230104649 BCX8">organisations</span><span class="NormalTextRun SCXW230104649 BCX8"> in minimising their systems attack surface</span><span class="NormalTextRun SCXW230104649 BCX8"> and </span><span class="NormalTextRun SCXW230104649 BCX8">supporting audit and compliance</span><span class="NormalTextRun SCXW230104649 BCX8"> within </span><span class="NormalTextRun SCXW230104649 BCX8">agencies</span><span class="NormalTextRun SCXW230104649 BCX8">.</span><span class="NormalTextRun SCXW230104649 BCX8">&nbsp; </span><span class="NormalTextRun SCXW230104649 BCX8">This also can reduce risk, complexity, and costs for </span><span class="NormalTextRun SCXW230104649 BCX8">organisations</span><span class="NormalTextRun SCXW230104649 BCX8">.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.28."


><![CDATA[<p class="NormS16C4">Provision of unnecessary system privileges or data access rights will magnify the impact of misuse or compromise of that users account and can even be devastating. &nbsp;Account privileges should be established to provide a reasonable but minimal level of system privileges and rights needed in order to support the purpose and role. &nbsp;The granting of elevated or excessive system privileges should be carefully controlled and managed.</p>]]></paragraph>
<paragraph
    title="16.4.29."


><![CDATA[<p class="NormS16C4">Risks associated with access to privileged accounts include:</p>
<ul>
<li>Misuse of privileges;</li>
<li>Increased attacker capability;</li>
<li>Circumventing established security and oversight controls;</li>
<li>Severe system disruption or failure; and</li>
<li>Significant data compromise and/or loss.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.30."


><![CDATA[<div class="SCXW148547555 BCX8">
<div class="ListContainerWrapper SCXW148547555 BCX8">
<p class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">The principles of PAM controls are to:</span></span><span class="EOP SCXW148547555 BCX8">&nbsp;</span></p>
</div>
<div class="ListContainerWrapper SCXW148547555 BCX8">
<ul>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Establish and </span><span class="NormalTextRun SCXW148547555 BCX8">maintain</span><span class="NormalTextRun SCXW148547555 BCX8"> an inventory of privileged </span><span class="NormalTextRun SCXW148547555 BCX8">accounts;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Assess the risk</span><span class="NormalTextRun SCXW148547555 BCX8">(s)</span><span class="NormalTextRun SCXW148547555 BCX8"> of each privileged </span><span class="NormalTextRun SCXW148547555 BCX8">account</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun Highlight SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Enforce the principle of least&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">privilege</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Use Multi-Factor Authentication for access to privileged a</span><span class="NormalTextRun SCXW148547555 BCX8">ccounts;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Minimise access to only essential&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">activities</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="TextRun SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Minimise the number of privileged&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">access</span> <span class="NormalTextRun SCXW148547555 BCX8">channels</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure each channel and user can be uniquely&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">identified</span><span class="NormalTextRun SCXW148547555 BCX8"> (prevent or minimise sharing of credentials, particularly with accounts such as “root” or “admin”</span><span class="NormalTextRun SCXW148547555 BCX8">);</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">all </span><span class="NormalTextRun SCXW148547555 BCX8">logs are periodically </span><span class="NormalTextRun SCXW148547555 BCX8">reviewed</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure strong and strict change control procedures are&nbsp;</span><span class="NormalTextRun SCXW148547555 BCX8">implemented</span><span class="NormalTextRun SCXW148547555 BCX8">;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Ensure the a</span><span class="NormalTextRun SCXW148547555 BCX8">uthorisation, activation and deactivation of privileged access channels is strictly enforced</span><span class="NormalTextRun SCXW148547555 BCX8">;&nbsp;</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Regularly audit and review PAM controls</span><span class="NormalTextRun SCXW148547555 BCX8">; and</span></li>
<li class="Paragraph SCXW148547555 BCX8"><span class="NormalTextRun SCXW148547555 BCX8">Reduce scope creep through regular reviewing of privilege user accounts.</span><span class="EOP SCXW148547555 BCX8">&nbsp;</span></li>
</ul>
</div>
</div>]]></paragraph>
<paragraph
    title="16.4.31."


><![CDATA[<p class="NormS16C4">It is also important to define all privileged accounts used by an agency or by other organisations, particularly where outsource arrangements are in place. &nbsp;It is fundamental for robust security to identify and record the business functions, related data, systems and access privileges.&nbsp; This is particularly important for agencies that create, store and process classified data.</p>]]></paragraph>
<paragraph
    title="16.4.32."


><![CDATA[<p class="NormS16C4">Without a comprehensive privileged accounts inventory, agencies and other organisations may overlook <strong>“backdoor”</strong> accounts which allow users to bypass proper controls and auditing. &nbsp;These may have been created during system development, by malicious insiders or by external attackers.&nbsp; Such unregistered accounts may be undetected for months or even years and can create a means of unauthorised and unmonitored access.&nbsp; Such accounts may also be used to erase activity logs to avoid detection.</p>]]></paragraph>
<paragraph
    title="16.4.33."


><![CDATA[<p class="NormS16C4">A privileged access inventory should include a description of the IT system, information asset, privilege description, privileged users and risk classification.&nbsp; This is essential information for assessing risk, the determining of controls and for identifying and managing use and misuse.<strong>&nbsp; </strong>Of note are:</p>
<ul>
<li>Local or Domain Server Admin accounts;</li>
<li>Domain Admin accounts that typically control Active Directory users;</li>
<li>System Admin accounts that manage databases;</li>
<li>Root accounts that manage Unix/Linux platforms;</li>
<li>Accounts that run and manage Windows applications, services, and scheduled tasks;</li>
<li>IIS application pools (.NET applications);</li>
<li>Networking equipment accounts that give access to firewalls, routers, switches, session border controllers, gateways and other similar devices, whether physical or virtual.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.34."


><![CDATA[<p class="NormS16C4">Privileged Access Management systems provide many of the capabilities and controls briefly described above and can facilitate PAM, as well as supporting strong IT Governance.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="16.4.35."


><![CDATA[<p>Additional information relating to Privileged Account and access management, including some policy examples, can be found at:</p>
<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p class="hero-text "><span class="TextRun SCXW135158925 BCX8"><span class="NormalTextRun SCXW135158925 BCX8">ISO/IEC 27001</span></span><span class="EOP SCXW135158925 BCX8">&nbsp;</span></p>
</td>
<td><span class="TextRun SCXW30954663 BCX8"><span class="NormalTextRun SCXW30954663 BCX8">ISO/IEC/ Standards NZ</span></span><span class="EOP SCXW30954663 BCX8">&nbsp;</span></td>
<td><a class="Hyperlink SCXW159235573 BCX8" rel="noopener noreferrer" href="https://www.standards.govt.nz/shop/ISOIEC-270012022" target="_blank"><span class="TextRun Underlined SCXW159235573 BCX8"><span class="NormalTextRun SCXW159235573 BCX8">Standards New Zealand</span></span></a><span class="EOP SCXW159235573 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW68462380 BCX8"><span class="NormalTextRun SCXW68462380 BCX8">Restrict Administrative Privileges</span></span><span class="EOP SCXW68462380 BCX8">&nbsp;</span></td>
<td><span class="TextRun SCXW10020922 BCX8"><span class="NormalTextRun SCXW10020922 BCX8">ASD</span></span><span class="EOP SCXW10020922 BCX8">&nbsp;</span></td>
<td><a class="Hyperlink SCXW43543802 BCX8" rel="noopener noreferrer" href="https://blueprint.asd.gov.au/security-and-governance/essential-eight/restrict-administrative-privileges/#:~:text=This%20page%20provides%20a%20template%20and%20guidance%20to,for%20Secure%20Cloud.%20Estimated%20reading%20time%3A%207%20minutes" target="_blank"><span class="TextRun Underlined SCXW43543802 BCX8"><span class="NormalTextRun SCXW43543802 BCX8">Restrict Administrative Privileges | ASD's Blueprint for Secure Cloud</span></span></a><span class="EOP SCXW43543802 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW5018897 BCX8"><span class="NormalTextRun SCXW5018897 BCX8">Identity and access management</span></span><span class="EOP SCXW5018897 BCX8">&nbsp;</span></td>
<td>NCSC - UK</td>
<td><a class="Hyperlink SCXW170278289 BCX8" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/10-steps/identity-and-access-management" target="_blank"><span class="TextRun Underlined SCXW170278289 BCX8"><span class="NormalTextRun SCXW170278289 BCX8">Identity and access management - NCSC.GOV.UK</span></span></a><span class="EOP SCXW170278289 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Securing privileged access</td>
<td>Microsoft</td>
<td><a class="Hyperlink SCXW217191223 BCX8" rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/overview" target="_blank"><span class="TextRun Underlined SCXW217191223 BCX8"><span class="NormalTextRun SCXW217191223 BCX8">Securing privileged access overview - Privileged access | Microsoft Learn</span></span></a><span class="EOP SCXW217191223 BCX8">&nbsp;</span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW154616449 BCX8"><span class="NormalTextRun SCXW154616449 BCX8">Manage emergency accounts in Microsoft Entra ID&nbsp;</span></span><span class="EOP SCXW154616449 BCX8">&nbsp;</span></td>
<td><span class="TextRun SCXW73268727 BCX8"><span class="NormalTextRun SCXW73268727 BCX8">Microsoft</span></span><span class="EOP SCXW73268727 BCX8">&nbsp;</span></td>
<td><span class="TextRun Underlined SCXW217191223 BCX8"><span class="NormalTextRun SCXW217191223 BCX8"><a class="Hyperlink SCXW101186309 BCX8" rel="noopener noreferrer" href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/security-emergency-access" target="_blank"><span class="TextRun Underlined SCXW101186309 BCX8"><span class="NormalTextRun SCXW101186309 BCX8">Manage emergency access admin accounts - Microsoft Entra ID | Microsoft Learn</span></span></a><span class="EOP SCXW101186309 BCX8">&nbsp;</span></span></span></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span class="TextRun SCXW22399984 BCX8"><span class="NormalTextRun SCXW22399984 BCX8">Privileged Account Management</span></span><span class="EOP SCXW22399984 BCX8">&nbsp;</span></td>
<td>MITRE Corporation</td>
<td><a class="Hyperlink SCXW244217405 BCX8" rel="noopener noreferrer" href="https://attack.mitre.org/mitigations/M1026/" target="_blank"><span class="TextRun Underlined SCXW244217405 BCX8"><span class="NormalTextRun SCXW244217405 BCX8">Privileged Account Management, Mitigation M1026 - Enterprise | MITRE ATT&amp;CK®</span></span></a><span class="EOP SCXW244217405 BCX8">&nbsp;</span></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title=" Policy Creation and Implementation"><paragraph
    title="16.4.36.R.01."

    tags="Information Security Documentation,Access Control"


><![CDATA[<p class="NormS22C2">The requirement for an agency security policy is discussed and described in <strong>Chapter 5 – Information Security Documentation</strong>.&nbsp; A fundamental part of any security policy is the inclusion of requirements for the treatment of Privileged Accounts.&nbsp; This is most conveniently contained in a Privileged Access Management (PAM) section within the agency’s security policy.&nbsp; A PAM policy is a fundamental component of an agency’s IT Governance.</p>]]></paragraph>
<paragraph
    title="16.4.36.C.01."

    tags="Governance,Information Security Documentation,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="6835"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST establish a Privileged Access Management (PAM) policy</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.36.C.02."

    tags="Governance,Information Security Documentation,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="6836"
><![CDATA[<p class="Normal-nonumbering">Within the context of agency operations, the agency’s PAM policy MUST define:</p>
<ul>
<li>a privileged account; and</li>
<li>privileged access.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.36.C.03."

    tags="Governance,Information Security Documentation,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="6837"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST manage privileged accounts in accordance with the agency’s PAM policy</span><span>.</span></p>]]></paragraph>
</block>
<block title=" The Principle of Least Privilege"><paragraph
    title="16.4.37.R.01."

    tags="Access Control,privileged access"


><![CDATA[<p>The Principle of Least Privilege is discussed in the <strong>Context </strong>part of this section.&nbsp; This principle stipulates the minimisation of access rights and permissions for users, accounts, applications, systems, devices and computing processes to the absolute minimum necessary in order to perform routine, authorised activities and maintain the safe and secure operation of agency or organisational systems.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.37.R.02."

    tags="Access Control,privileged access"


><![CDATA[<p>The implementation of the Principle of Least Privilege requires limitations on the number and use of privileged accounts as well as minimising the numbers of users with these privileges.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.37.R.03."

    tags="Access Control,MFA,privileged access"


><![CDATA[<p>The use of privileged access should also follow the principle of least privilege by ensuring the use of two-factor or Multi-Factor Authentication for access to privileged accounts and ensuring that only activity requiring such access is undertaken.&nbsp; Refer to <a title="16.7 Multi-Factor Authentication" href="http://nzism.gcsb.govt.nz/ism-document#Section-15681">Section 16.7 – Multi-Factor Authentication</a>.&nbsp; User accounts without privileged access should be used for all other activities.&nbsp; Refer to <a title="16.3 Privileged User Access (PAM)" href="http://nzism.gcsb.govt.nz/ism-document#Section-15503">Section 16.3 – Privileged User Access</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.37.C.01."

    tags="Governance,Access Control,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6842"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST apply the </span><span>Principle of Least Privilege when developing and implementing a Privileged </span><span>Access Management (PAM) policy</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.37.C.02."

    tags="Governance,Access Control,MFA,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6843"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST use two-factor or Multi-Factor Authentication to allow access to privileged accounts</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.37.C.03."

    tags="Technical,Access Control,privileged access"


    classification="All Classifications"
    compliance="Should"
    cid="7550"
><![CDATA[<p><span class="NormalTextRun SCXW132241447 BCX8">Agencies</span> <span class="NormalTextRun SCXW132241447 BCX8">SHOULD</span><span class="NormalTextRun SCXW132241447 BCX8"> consider the use of </span><span class="NormalTextRun SCXW132241447 BCX8">time bound revocation to privileged accounts.</span></p>]]></paragraph>
</block>
<block title=" Strong Authentication process"><paragraph
    title="16.4.38.R.01."

    tags="Access Control,authorisation,PAM,privileged access"


><![CDATA[<p class="Normal-nonumbering"><span class="TextRun SCXW119438814 BCX8"><span class="NormalTextRun SCXW119438814 BCX8">T</span><span class="NormalTextRun SCXW119438814 BCX8">he</span></span><span class="TextRun SCXW119438814 BCX8"> <span class="NormalTextRun SCXW119438814 BCX8">approval and authorisation process for the granting of p</span><span class="NormalTextRun SCXW119438814 BCX8">rivilege</span><span class="NormalTextRun SCXW119438814 BCX8">d access should be based on the requirement to m</span></span><span class="TextRun SCXW119438814 BCX8"><span class="NormalTextRun SCXW119438814 BCX8">anage and protect </span><span class="NormalTextRun SCXW119438814 BCX8">organisational</span> <span class="NormalTextRun SCXW119438814 BCX8">systems and assets or as an operational necessity only</span><span class="NormalTextRun SCXW119438814 BCX8">.</span></span><span class="EOP SCXW119438814 BCX8">&nbsp;</span></p>]]></paragraph>
<paragraph
    title="16.4.38.C.01."

    tags="Governance,Access Control,authorisation,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6846"
><![CDATA[<p class="Normal-nonumbering"><span>As part of a </span><span>Privileged </span><span>Access Management (PAM) policy, agencies MUST establish and implement a strong approval and authorisation process before any privileged access credentials are issued</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.38.C.02."

    tags="Governance,Access Control,authorisation,PAM,privileged access"


    classification="All Classifications"
    compliance="Must Not"
    cid="6847"
><![CDATA[<p>Privileged Access credentials MUST NOT be issued until approval has been formally granted.</p>]]></paragraph>
</block>
<block title=" Suspension and Revocation of Privileged Access Credentials"><paragraph
    title="16.4.39.R.01."

    tags="Access Control,privileged access"


><![CDATA[<p>Because privileged accounts have high levels of trust associated with the issue of related credentials, any indication that credentials or accounts have been compromised or that credentials have been misused must be immediately investigated.&nbsp; Actions may include the immediate suspension of credentials.&nbsp; Revocation may follow depending on the outcome of the investigation.</p>]]></paragraph>
<paragraph
    title="16.4.39.R.02."

    tags="Access Control,Passwords"


><![CDATA[<p>The privileged access credentials for staff and other users (such as authorised contractors) should be suspended or revoked as part of exit procedures when staff leave the agency and when other users no longer undertake duties for the agency.&nbsp; This ensures the numbers of credentials are controlled, credentials are revoked when no longer required for operational purposes and that the risk of unauthorised activities and access is minimised.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.39.C.01."

    tags="Governance,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="6852"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies </span><span>MUST establish robust credential suspension and revocation procedures as part of the agency’s </span><span>Privileged </span><span>Access Management (PAM) policy</span><span>.</span></p>]]></paragraph>
<paragraph
    title="16.4.39.C.02."

    tags="Technical,Access Control"


    classification="All Classifications"
    compliance="Must"
    cid="7553"
><![CDATA[<p><span class="TextRun Highlight SCXW17435025 BCX8"><span class="NormalTextRun SCXW17435025 BCX8">Agencies</span> </span><span class="TextRun Highlight SCXW17435025 BCX8"><span class="NormalTextRun SCXW17435025 BCX8">MUST </span><span class="NormalTextRun SCXW17435025 BCX8">investigate any </span><span class="NormalTextRun SCXW17435025 BCX8">indication</span><span class="NormalTextRun SCXW17435025 BCX8"> of compromise or misuse </span><span class="NormalTextRun SCXW17435025 BCX8">of systems credentials or accounts</span></span><span class="TextRun Highlight SCXW17435025 BCX8"><span class="NormalTextRun SCXW17435025 BCX8">.</span></span></p>]]></paragraph>
</block>
<block title=" Privileged Account, Rights and Credential Inventory"><paragraph
    title="16.4.40.R.01."

    tags="Governance,Access Control,Passwords"


><![CDATA[<p>Account and credential “sprawl” is a continuing challenge as the number of users constantly changes and the number and variety of devices evolves and grows.&nbsp; The growing use of the Internet of Things (IoT) is a good example of this.&nbsp; A primary tool in the management and containment of sprawl is the creation and maintenance of an inventory of privileged accounts and the access rights and credential associated with those accounts together with a process of continuous discovery.&nbsp; This will assist in curbing privileged account sprawl, identifying potential insider abuse, and exposing external threats and malicious activity.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.40.C.01."

    tags="Governance,Access Control,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="6855"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST create and maintain a comprehensive inventory of privileged accounts and the associated access rights and credentials.</span></p>]]></paragraph>
</block>
<block title=" Monitoring and Review"><paragraph
    title="16.4.41.R.01."

    tags="Access Control,privileged access"


><![CDATA[<p>Privileged Accounts have high levels of system and data access and are a “high value target” for malicious cyber-attacks and insider misuse.&nbsp; Access to privileged accounts can be extremely damaging to systems and can cause data and privacy breaches as well as data loss.&nbsp;</p>]]></paragraph>
<paragraph
    title="16.4.41.R.02."

    tags="Access Control,privileged access"


><![CDATA[<p>A key control in the ongoing integrity of privileged accounts and their associated credentials is a robust system of monitoring and review in order to maintain the inventory of privileged accounts and implement a process of continuous discovery to curb privileged account sprawl, identify potential insider abuse, and reveal external threats.&nbsp; This includes continuous data and operations impact assessments.</p>]]></paragraph>
<paragraph
    title="16.4.41.C.01."

    tags="Governance,Access Control,Passwords,Event Logging,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6859"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST create, implement and maintain a robust system of continuous discovery, monitoring and review of privileged accounts and the access rights and credentials associated with those accounts.</span></p>]]></paragraph>
<paragraph
    title="16.4.41.C.02."

    tags="Governance,Access Control,Incident Management,Passwords,Event Logging,Information Security Incidents,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6860"
><![CDATA[<p class="Normal-nonumbering">Privileged account monitoring systems MUST monitor and record:</p>
<ul>
<li>individual user activity, including exceptions such as out of hours access;</li>
<li>activity from unauthorised sources;</li>
<li>any unusual use patterns; and</li>
<li>any creation of unauthorised privileges access credentials.</li>
</ul>]]></paragraph>
<paragraph
    title="16.4.41.C.03."

    tags="Governance,Access Control,Incident Management,Passwords,Event Logging,Information Security Incidents,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6861"
><![CDATA[<p>Agencies MUST protect and limit access to activity and audit logs and records.</p>]]></paragraph>
</block>
<block title=" Response and Remediation"><paragraph
    title="16.4.42.R.01."

    tags="Access Control,Incident Management,privileged access"


><![CDATA[<p>Because privileged accounts have high levels of system and data access, a rapid response to unusual or anomalous activity is fundamental to the maintenance of the integrity of an agency’s systems and data.&nbsp; Any response must take urgent action to protect compromised accounts and systems based on defined policy and breach intelligence.&nbsp; This may include, for example, the immediate suspension of credentials, password rotation or deactivation of credentials.</p>]]></paragraph>
<paragraph
    title="16.4.42.C.01."

    tags="Governance,Access Control,Incident Management,Information Security Incidents,PAM,privileged access"


    classification="All Classifications"
    compliance="Must"
    cid="6864"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST develop and implement a response and remediation policy and procedure as part of an agency’s Privileged Access Management (PAM) policy.</span></p>]]></paragraph>
</block>
<block title=" User Education and Awareness"><paragraph
    title="16.4.43.R.01."

    tags="Information Security Documentation,Access Control,PAM,privileged access,training &amp; awareness"


><![CDATA[<p><span class="NormalTextRun SCXW42666293 BCX8">Privileged Account access may have procedures </span><span class="NormalTextRun SCXW42666293 BCX8">additional</span><span class="NormalTextRun SCXW42666293 BCX8"> to or that vary from an </span><span class="NormalTextRun SCXW42666293 BCX8">organisation’s</span><span class="NormalTextRun SCXW42666293 BCX8"> usual account security and maintenance processes and procedures</span><span class="NormalTextRun SCXW42666293 BCX8">.&nbsp; </span><span class="NormalTextRun SCXW42666293 BCX8">As an </span><span class="NormalTextRun SCXW42666293 BCX8">agency</span><span class="NormalTextRun SCXW42666293 BCX8"> will have </span><span class="NormalTextRun SCXW42666293 BCX8">established</span><span class="NormalTextRun SCXW42666293 BCX8"> a Privileged Account Management (PAM) policy, this can be conveniently dealt with as a separate or </span><span class="NormalTextRun SCXW42666293 BCX8">additional</span><span class="NormalTextRun SCXW42666293 BCX8"> component of user training and awareness</span><span class="NormalTextRun SCXW42666293 BCX8">. </span>Refer also to <a title="3.5 System Users" href="http://nzism.gcsb.govt.nz/ism-document#Section-12444">Section 3.5 - System Users</a> and <a title="9.1 Information Security Awareness and Training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 - Information Security Awareness and Training</a>.</p>]]></paragraph>
<paragraph
    title="16.4.43.R.02."

    tags="Governance,Access Control,privileged access,training &amp; awareness"


><![CDATA[<p><span class="TextRun SCXW247016944 BCX8"><span class="NormalTextRun SCXW247016944 BCX8">User training and awareness is necessary to provide specific training to users of privileged accounts. This training should provide detailed information specific to users of privileged accounts. This includes awareness of the characteristics and value of privileged accounts, the </span><span class="NormalTextRun SCXW247016944 BCX8">additional</span><span class="NormalTextRun SCXW247016944 BCX8"> responsibilities of users of these accounts, and the risk to </span><span class="NormalTextRun SCXW247016944 BCX8">organisations</span><span class="NormalTextRun SCXW247016944 BCX8"> and systems if these accounts get breached.</span></span></p>]]></paragraph>
<paragraph
    title="16.4.43.C.01."

    tags="Governance,Access Control,Passwords,PAM,privileged access,training &amp; awareness"


    classification="All Classifications"
    compliance="Must"
    cid="6868"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST implement a Privileged Access Management (PAM) policy training module as part of the agency’s overall user training and awareness requirement.</span></p>]]></paragraph>
</block>
</subsection>
</section>
