Common use cases for risk scoring
Osirium PAM reports on a wide range of valuable information to assist in evaluating sources of risk.
The following are examples of a large selection of tools that Osirium PAM provides administrators with to gauge the security of their provisioned devices:
The Summary tab on the User-Rights Audit Report provides an overview of how Osirium PAM minimises the need for privileged access to your devices.
This tab provides you with a breakdown of user engagement, including a chart indicating the proportion of users who have engaged in full usage of devices (run tasks and made device connections), device connections only, tasks only and PAM UI only.
If you find the proportion of users engaged in full usage unusually high, consider developing or enabling more tasks to run on devices to reduce your risk profile.
The Management Report also helps administrators evaluate the security of their devices.
This report includes a breakdown of the Osirium PAM password management coverage. High proportions of Managed and Fully managed passwords indicate strong Osirium PAM device protection.
If you are concerned that a specific device may be compromised or was subject to suspicious access, you can use the following Osirium PAM tools to help determine what steps to take next:
The Device Access Report provides a list of device connections made through Osirium PAM, detailing information on the user IP address and access level, as well as the time and duration of the session. Filtering the list for the device of interest may reveal a suspicious session.
After identifying the user responsible, you may want to investigate that user's activity across all devices. If session recording is enabled on the device, you can view a recording to see exactly what happened on the device during the session. However, it may not be practical to enable session recording for every device.
The Behaviour Analytics Report generates graphs on posture, latent threat and suspicion by time.
Generating a user posture chart is useful when investigating a user. Suspicion is based on individual user logins, particularly when made from multiple IP addresses.