The problem often lies in the simple fact that people are just people. They forget, make mistakes, easily confuse phishing emails with genuine ones, and generally behave in the least secure ways possible. It would be interesting to conduct a study on how many information security managers at large companies go prematurely grey.
The only way to mitigate these risks is to minimize human dependency. In our infrastructure audits, we always adhere to principles like “You can't leak a secret you don't know. It's hard to break something if you don't have the permission.” Building secure infrastructure is a lengthy process, but it goes much smoother and more transparently if you have a solid plan that describes it step-by-step. This often requires not only studying the client's infrastructure but also immersing ourselves in their business processes. This approach not only ensures security but also convenience.
For example, implementing
HashiCorp Vault allows employees to perform complex actions requiring privileged access to secrets without actually revealing them. Everything just automagically works and is logged. There is a minimal chance of users causing password or key leaks because they do not have direct access to them.
You might also want to look into
Teleport. It’s an excellent solution that enables you to implement a role-based access model in your company. They offer a great community version that allows you to roll out a role-based access model to company resources for free, record sessions, and keep extensive logs. Consider it if you’re looking for a PAM solution to start with.