Hitachi ID Privileged Access Manager secures sensitive passwords by periodically setting them to new, random values:
- On systems integrated via "push mode:"
- Periodically -- for example, every night between 3AM and 4AM.
- When users check accounts back in, after they are finished using them.
- When users request a specific password value.
- In the event of an urgent termination of a system administrator (randomize all passwords that person may have known).
- On systems integrated via "pull mode:"
- Periodically -- for example, every day.
- At a random time-of-day, to even out workload on the Privileged Access Manager service.
- Opportunistically, whenever network connectivity happens to be available from the managed endpoint to the central privileged access system.
Privileged Access Manager can enforce multiple password policies. There is a global password policy as well as sets of password rules in each managed system policy.
Password policies specify the complexity of both randomly chosen and manually selected passwords. In addition to mandating character types (lowercase, uppercase, digits, punctuation), each policy can specify minimum and maximum password lengths, prohibit the use of dictionary words, etc.
Randomizing privileged passwords on fixed IT assets
- On servers and other fixed systems, no local software is required.
- Password changes are initiated on a Privileged Access Manager server and are scheduled to happen, as often as hourly.
- Randomized password values are stored in a secure, replicated vault at a minimum of two physical locations.
- No software is installed on systems.
Randomizing privileged passwords on laptops or rapidly provisioned VMs
- On laptops, the endpoint initiates the password change process.
- Password changes initiated on the endpoint can be performed even when the device is off-site, behind a firewall, etc.
- Randomized timing improves reliability and reduces peak transaction volume.
- A minimal software footprint is required on the endpoint device.