This Privileged Access Workstation (PAW) Survey conducted by Cybersecurity Insiders revealed a lot about how organizations are approaching privileged access security.
First – there seems to be a resounding agreement that Windows systems & IT admins need to use separate operating systems for sensitive and corporate activities. Nearly all respondents (94%) agree that IT admins are at increased risk of compromise if they use the same device to connect to sensitive/privileged assets and their corporate, internet-exposed network. I would guess that 10 or 15 years ago this number may be in the range of 60% to 70%. The fact that almost all respondents agree proves that we’ve all understood the importance of securing privileged access. And no surprise – these are the accounts and access points that cyber attackers target in their attacks.
Second – We all agree that securing privileged access is critically important! Of the 200 respondents, 87% said it’s highly critical to isolate privileged environments and 8 out of 10 organizations are prioritizing privileged user security. These statistics show that not only are we aware of the risks around privileged access, but we’re doing something about it by prioritizing privileged security projects.
The challenge then comes in how to implement PAW and this is true for many organizations. I’ve personally spoken to many organizations that know they want to isolate privileged access, but aren’t sure which method is best for their organization, team, and existing infrastructure. The truth is, it’s not an easy decision because there are a number of different paths all with pros and cons.
The complexity around implementing privilege access security is why we wanted to support this survey, to help organizations benchmark their efforts against those of other security professionals.
If you learned something, please share!
Please share the infographic below to help spread this knowledge. Use the embed code below the graphic for easy publishing.