Learning Library

← Back to Library

IT's Secret: Shared Privileged Passwords

Key Points

  • IT staff routinely warn users not to write down or share passwords, yet many organizations secretly share privileged account credentials among administrators to simplify management.
  • Sharing a single password across dozens of privileged accounts creates a security risk, as it bypasses the very advice given to regular users.
  • The underlying problem is the impracticality of maintaining unique passwords for many privileged users across numerous systems.
  • A more secure approach is to implement a Privileged Access Management (PAM) solution that authenticates admins via strong multifactor methods (e.g., tokens, biometrics) instead of direct password logins.
  • PAM dynamically generates, stores, and rotates unique passwords for each system, allowing admins to work without ever knowing the credentials and ensuring passwords are changed immediately after use.

Full Transcript

# IT's Secret: Shared Privileged Passwords **Source:** [https://www.youtube.com/watch?v=hVLaRQ3TjGk](https://www.youtube.com/watch?v=hVLaRQ3TjGk) **Duration:** 00:04:18 ## Summary - IT staff routinely warn users not to write down or share passwords, yet many organizations secretly share privileged account credentials among administrators to simplify management. - Sharing a single password across dozens of privileged accounts creates a security risk, as it bypasses the very advice given to regular users. - The underlying problem is the impracticality of maintaining unique passwords for many privileged users across numerous systems. - A more secure approach is to implement a Privileged Access Management (PAM) solution that authenticates admins via strong multifactor methods (e.g., tokens, biometrics) instead of direct password logins. - PAM dynamically generates, stores, and rotates unique passwords for each system, allowing admins to work without ever knowing the credentials and ensuring passwords are changed immediately after use. ## Sections - [00:00:00](https://www.youtube.com/watch?v=hVLaRQ3TjGk&t=0s) **IT's Privileged Password Sharing Secret** - The speaker reveals that many IT teams bypass password best practices by using a single shared password for privileged accounts across numerous systems, despite advising users never to write down or share passwords. - [00:03:21](https://www.youtube.com/watch?v=hVLaRQ3TjGk&t=201s) **Enhanced PAM with Monitoring Layer** - The speaker describes how integrating a surveillance and oversight component—offering session‑recording, playback, and multifactor authentication—into a privileged access management system creates a stronger, more user‑friendly security solution. ## Full Transcript
0:00The IT department has  a dirty little secret I'm going to let you 0:03in on. But first, let me ask you: What did they  always tell you never to do with your password? 0:09I'm going to bet the first thing  they say is "Don't write it down." 0:14And number two "Don't share it." Because if  you share it, well then we don't know who's 0:20actually logged in. Now, the dirty little  secret: What do you think they do with their 0:26most sensitive accounts? The thing we call  privileged accounts like root, and sysadmin, 0:31and database administrators, and things  like that. Here's the dirty little secret -- 0:38They share them. Not every organization, but a lot do. They have a different use case that 0:44they're trying to deal with. So in your case,  you're one person here and you are logging in 0:51to maybe a couple of different systems. And  so you have your password and you should 0:58keep that in your head and you should not  share it. And you log in and that's that. 1:03Well, in their case, they've got lots of users.  Maybe they've got, in this fictitious example, 1:09five privileged users that need to log in  to maybe 100 of these different servers. 1:17So now if they have unique passwords, that would be 500 passwords that they have to keep up with 1:23and manage. That's a problem. So instead of having this where they log in separately with separate, 1:32unique passwords, they set one password to all of them. They share it amongst the privileged users and 1:38they tell them "Don't tell it to anybody." But  the fact is, they're sharing. Well, now we know 1:42intuitively that that is the wrong thing to do.  This advice they gave you is the right advice. 1:48They're just not following it. And the reason  they're not following it is because of this. Now, 1:53what could they do that would be better?  I'll suggest to you a better solution would 1:58be to have your administrators logging in, not directly to these systems with their passwords, 2:06but in fact, will insert a layer in between.  We'll call it PAM -- privileged access management 2:15system. And what the PAM system does is it says these users up here log directly into the PAM 2:22system and they'll use something like, that I  talked about in a previous video, multifactor 2:28authentication. So not just a password. In fact, maybe not a password at all, but we would use 2:34something you have like a phone or something like that that's pre-registered, something you are like 2:39a biometric looking at your face. So we'll use  some form of strong multifactor authentication to 2:44know that this privilege users who they claim to be, then this system will maintain the passwords 2:50that are unique and constantly changing to all of the systems they need to log into. So they 2:56check out the password, the credentials to log into a system. They don't even need to know what 3:01they are. They do their work, and when they're done, they check the account back in. And once 3:06that's done, the password is literally changed. So they can't even use that same password over 3:11again. There's no reuse and therefore no sharing that's going on in this case. Now, we always know 3:17which one of the five people was logged on  to this system at a particular point in time. 3:22And in a good PAM system, we'll also add a  surveillance and oversight layer as well. 3:28And in that, we'll actually see all the things  that those users type during their session. 3:34It's a digital monitoring and playback type  system. And once we have that level of oversight, 3:41now, we have a much stronger solution. So  if the IT department will follow their own 3:47advice and not share passwords and use a PAM  system, they can get a much stronger security 3:52solution that's actually easier for  their end users, their privileged users, 3:57because now they have a solution that gets  multifactor, gets them in, it's more secure, 4:03it's easier, and we have the monitoring and  oversight to ensure that it's, in fact, a better 4:08solution all the way around. Thanks for watching.  Please remember to like this video and subscribe 4:13to this channel so we can continue to bring you  content that matters to you.