Security Control - Risk-based Privileged Access Management  
Description Step-up authentication based on risk posture
Components and Required Capabilities

Privileged Access Management

  • Must have the ability to query Fraud & Risk for risk posture
  • Must have the ability to provide step-up authentication for high risk postures
  • Must have the ability to identify sensitive applications

Fraud & Risk

  • Must have the ability to send risk status to requesting tool as a defined value (low, moderate, high, extreme)
Best Practice Recommendation

Where additional identities are required, for certain privileged roles (e.g. DBA), or test accounts, a Privileged Access Management solution should be implemented to ensure the integrity and security of this access.  

Interaction Diagram