Overview#
Privileged Identity are valid Digital Identities used to gain access to Applications or Operating System.Privileged Identity are the subjects of Privileged Account Management systems.
Privileged Identity provide elevated, often non-restrictive Access Control to the underlying platform that non-privileged user accounts would not have access too.
Privileged Identity are designed to be used by sysadmins to deploy and manage IT technology, like Operating Systems, network devices, applications and more.
Privileged Identity are the often the proverbial keys to the infrastructure – which is why attackers or Bad Actor insiders seek to steal them.
We use the term Privileged Identity interchangeably, but here are the most common Privileged Identity found across most Organizational Entity's environment(s):
- Local Administrative Accounts - These non-personal accounts provide administrative access to the Local device. (root or Microsoft Windows Local Administrative Accounts)
- Domain Administrative Accounts - These accounts give privileged administrative access across a Security Domain
- Emergency Accounts - These provide unprivileged users with administrative access to secure systems in an emergency
- Service Accounts or Application Accounts- These can be privileged local or Security Domain accounts that are used by an application
More Information#
There might be more information for this subject on one of the following:- Digital Identity
- Domain Administrative Accounts
- Elevated Token
- Emergency Identity
- IDSA Integration Framework
- Identify and Authenticate access to system components
- Internal Attacker
- Kerberos Forged Ticket
- Kerberos Service Account
- Local Administrative Accounts
- Policy Administration Point
- Privileged Access Management
- Privileged Account Management
- Privileged User Management
- Service Account
- Wendy
- Windows Logon