Privileged Access Management: Beyond Just Passwords | Lorikeet Security Skip to main content
Back to Blog

Privileged Access Management: Beyond Just Passwords

Lorikeet Security Team February 26, 2026 10 min read

In nearly every penetration test we conduct, the path from initial access to full environment compromise runs through a privileged account. A developer's laptop gets phished, and the attacker finds cached admin credentials. A service account with domain admin privileges is using the same password it was created with three years ago. An API key with production database access is sitting in a public GitHub repository.

Privileged accounts are the keys to the kingdom, and most organizations manage them with the same rigor they apply to regular user accounts: which is to say, not enough. Passwords get stored in shared spreadsheets, admin access is granted permanently "because it's easier," and service accounts proliferate without inventory or oversight.

Privileged Access Management (PAM) is the discipline of fixing this. But PAM is not just about password vaults. Modern PAM encompasses just-in-time access provisioning, session recording and monitoring, service account governance, and the policies that tie them all together. This guide covers what actually works.


Why Privileged Accounts Are the Primary Target

To understand why PAM matters, you need to understand how attackers think about privileged access. In a typical attack chain, initial access gives an attacker a foothold, usually as a regular user. From there, the immediate priority is privilege escalation: finding a way to gain admin, root, or other elevated access.

Once an attacker has privileged access, they can:

This is not theoretical. In our Active Directory penetration testing engagements, we routinely escalate from a standard user account to domain admin within hours. The paths are almost always the same: cached credentials on workstations, service accounts with excessive privileges, and Kerberoastable accounts with weak passwords.

From our testing data: In over 75% of internal network penetration tests, we achieve domain admin access within the first 48 hours. The most common privilege escalation path involves compromising a service account, which typically has a weak or never-rotated password and permissions far beyond what the service actually needs.


The Core Components of Modern PAM

Effective PAM is built on several interconnected components. Implementing just one without the others leaves significant gaps. Here is what a complete PAM program includes:

Privileged account discovery and inventory

You cannot manage what you do not know about. The first step is identifying every privileged account in your environment: human admin accounts, service accounts, application accounts, root and built-in administrator accounts, cloud IAM roles with elevated permissions, database admin accounts, and network device admin accounts.

Most organizations are surprised by the number of privileged accounts they find. We commonly see environments where the number of service accounts with admin-level permissions exceeds the number of human admin accounts by a factor of five or more.

Credential vaulting and rotation

Privileged credentials should be stored in a centralized vault (CyberArk, HashiCorp Vault, 1Password Business, etc.) rather than in spreadsheets, config files, or people's heads. The vault provides encrypted storage, access logging, and automated rotation.

Rotation is critical. A password that never changes is a password that can be compromised without detection. Automated rotation means that even if a credential is stolen, it becomes invalid within hours or days rather than remaining valid indefinitely.

Just-in-time (JIT) access

This is the most impactful PAM control for reducing risk. Instead of granting permanent admin access, users request elevated access when they need it, receive approval, and the access automatically expires after a defined period (typically 1-4 hours).

JIT access eliminates the concept of standing privileged access. If there are no always-on admin accounts, there are no always-on admin accounts to compromise. An attacker who compromises a user's workstation finds a standard user account, not an admin credential.

Session recording and monitoring

When privileged access is used, the session should be recorded and monitored. This means capturing the commands executed, files accessed, and changes made during the privileged session. Session recording provides accountability (who did what and when), forensic evidence (what happened during an incident), deterrence (people behave differently when they know they are being recorded), and compliance evidence for auditors.

Least privilege enforcement

Every account should have the minimum permissions required for its function. This applies to human accounts (a developer does not need production database admin access for daily work) and to service accounts (a monitoring agent does not need write access to the systems it monitors). Implementing least privilege requires understanding what each account actually needs, which is why discovery and inventory come first.


Service Account Management

Service accounts are the most neglected category of privileged accounts and, consequently, the most frequently exploited. They deserve special attention in any PAM program.

The service account problem

Service accounts are created to run applications, scheduled tasks, integrations, and automated processes. They typically need elevated permissions to function. And they have several properties that make them attractive to attackers:

Managing service accounts properly

Effective service account management requires:

  1. Complete inventory. Identify every service account, what it does, what systems it accesses, what permissions it has, and who owns it
  2. Scoped permissions. Reduce each service account's permissions to the minimum required for its function. If a monitoring service only needs read access, remove write and admin permissions
  3. Automated rotation. Rotate service account passwords on a defined cadence (every 30-90 days). Use a vault that can handle the rotation and automatically update the dependent systems
  4. Ownership assignment. Every service account should have a named human owner who is responsible for its security and who participates in access reviews
  5. Decommissioning process. When a system or integration is retired, its service accounts should be disabled and eventually deleted. This requires maintaining the inventory and checking it against active systems

PAM for Cloud Environments

Cloud environments introduce PAM challenges that traditional on-premises solutions were not designed for. IAM roles, temporary credentials, cross-account access, and infrastructure-as-code all require a modern approach to privileged access.

AWS IAM best practices

Multi-cloud considerations

Organizations using multiple cloud providers face the additional challenge of maintaining consistent PAM policies across AWS, GCP, Azure, and any other platforms in use. Federated identity (using a single IdP across all cloud providers) provides a foundation, but each cloud's IAM model has unique quirks that require provider-specific knowledge. This is an area where cloud security assessments provide significant value.


What Penetration Testers Look For

Understanding how pentesters target privileged accounts helps you prioritize your PAM investments. Here are the specific techniques we use and what they exploit:

Technique What It Exploits PAM Control That Prevents It
Kerberoasting Service accounts with SPNs and weak passwords Strong password policy, managed service accounts, rotation
Credential Harvesting Cached admin credentials on workstations JIT access (no standing admin credentials to cache)
Pass-the-Hash Reusable NTLM hashes from privileged sessions Credential guard, admin tiering, LAPS
Golden Ticket Compromised KRBTGT account hash KRBTGT password rotation, admin tiering
Cloud IAM Abuse Over-permissioned IAM roles and policies Least privilege, regular IAM access reviews
Service Account Pivot Service accounts with domain admin on multiple systems Scoped permissions, credential vaulting
Config File Credentials Passwords stored in plaintext config files Credential vaulting, secrets management

Each of these techniques is well-documented and widely used by both penetration testers and real-world attackers. The PAM controls that prevent them are also well-understood. The gap is usually not knowledge but implementation.


Implementing PAM: A Practical Roadmap

PAM implementation does not have to be a massive, multi-year project. Here is a phased approach that delivers value incrementally:

Phase 1: Foundation (Month 1-2)

Phase 2: Control (Month 3-4)

Phase 3: Maturity (Month 5-6)

Phase 4: Optimization (Ongoing)


PAM and Compliance

PAM controls map directly to requirements in every major compliance framework:

Organizations with mature PAM programs consistently have smoother audits because the controls, monitoring, and evidence are built into the system rather than assembled manually before each audit cycle.

The bottom line: Privileged access management is not optional for any organization that takes security seriously. Every major breach, every successful ransomware attack, and every significant penetration test finding involves privileged access at some point in the chain. Investing in PAM reduces your attack surface, improves your compliance posture, and directly addresses the techniques that real attackers use against real environments.

Find out how attackers exploit your privileged accounts

Our penetration testing specifically targets the privilege escalation paths that lead to full environment compromise. We show you exactly how an attacker would move from initial access to domain admin, and how to stop them.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!