SHARE
Facebook X Pinterest WhatsApp

Five Tips to Secure Privileged and Shared Accounts

Failing to manage shared passwords adequately can expose organizations to serious vulnerabilities, particularly in the case of privileged accounts where a disgruntled employee could potentially have the power to hold an entire network hostage. Keeping track of privileged user and shared access accounts is also important for accountability. Unfortunately, however, many organizations simply don't know for […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Jul 26, 2010

Failing to manage shared passwords adequately can expose organizations to serious vulnerabilities, particularly in the case of privileged accounts where a disgruntled employee could potentially have the power to hold an entire network hostage.

Keeping track of privileged user and shared access accounts is also important for accountability. Unfortunately, however, many organizations simply don't know for sure who has access to shared passwords. Far too often, the entire IT department knows the details of what is supposed to be a limited-access password.

All kinds of employees, from office administrators and temporary workers to nurses and civil servants require access to shared account logons for enterprise applications and systems for all kinds of reasons. IT managers, therefore, need to strike a balance between providing the flexibility required to meet end users’ needs and ensuring security and compliance with corporate policy and the latest industry regulations and legislation.

Use these tips to close the security gaps associated with shared password management as well as introduce a cost-efficient way for your organizations to comply with data protection and PCI DSS regulations that prohibit the sharing of accounts between users.

Five Tips to Secure Privileged and Shared Accounts - slide 1

Click through for tips on securing access to privileged and shared account data. 

Five Tips to Secure Privileged and Shared Accounts - slide 2

Put in place a scalable and flexible method for regularly changing passwords, as well as a reliable way of ensuring that all passwords generated are unique on every system and suitably complex.

Five Tips to Secure Privileged and Shared Accounts - slide 3

Centralize shared account storage and control so that a user must make a request to use a shared password. This can then be approved or denied based on pre-established policies set by the organization. This ensures that the organization has visibility and hence control each time a privileged credential is accessed or used.

Five Tips to Secure Privileged and Shared Accounts - slide 4

Ensure that all passwords for shared accounts are concealed so that a user never actually knows the password of an account that is checked out. This prevents the inadvertent or malicious sharing of passwords, as well as sabotage by rogue administrators.

Five Tips to Secure Privileged and Shared Accounts - slide 5

To facilitate regulatory compliance, it is also important to tie shared account usage to the user within the organization’s identity management system so that the actual user of a shared password is known at all times.

Five Tips to Secure Privileged and Shared Accounts - slide 6

For some particularly sensitive accounts, organizations might also want to consider controlling the usage of privileged or shared password by policy. For example, by setting a limited time window for their use, or prescribing maximum number of logons.

Five Tips to Secure Privileged and Shared Accounts - slide 7

A further security measure could be to introduce two-factor authentication at the point of logon to ensure that the person using the account is actually the person authorized to check it out.

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.