180 Servers Deleted, Company Loses 15 B! How Can PAM One Identity Prevent It?
180 Servers Deleted, Company Loses 15 B! How Can PAM One Identity Prevent It?
Imagine a company losing 15 billion Rupiah because of one upset former employee. That’s what happened when a former employee deleted 180 virtual servers after being fired, causing a huge loss for the company.
How Could This Happen?
After leaving the company, the employee still had access to the system. With the administrator credentials still active, he managed to log in to the system and run a script to delete the servers one by one.
Solution: One Identity Privileged Access Management (PAM)
If companies implement One Identity PAM, incidents like this can be prevented! One Identity offers a variety of advanced features to secure privileged access and prevent abuse of privileges:
✅ Safeguard for Privileged Sessions – Monitor and record privileged user sessions, so suspicious activity can be detected early.
✅ Safeguard for Privileged Password – Manage access to authorized accounts, with randomly generated passwords and 2-factor authentication by admins
✅ Safeguard for Privileged Analytics – Analyze access sessions to identify high-risk users and detect suspicious behavior before a breach occurs.
✅ Least Privileged Access – Grant access only as needed, avoiding excessive privileges that can be abused.
Related Link : Ransomware That Infiltrates Processors: A New Threat in Cybersecurity
How to Prevent Incidents Similar to One Identity PAM:
1. Grant privileged account access only to the right people
One Identity PAM ensures that privileged access is only granted to authorized people through a multi-factor authentication system by the admin
2. Grant privileged account access only for a certain period
Privileged access is only valid for a certain period, for example, it can only be accessed for 2 hours.
3. Ensure that the privileged account that is granted has the right authority
The privileged account rights are limited to only the tasks that are needed, for example, it cannot delete data or change certain data. The goal is to reduce the risk of access abuse.