Module 3 – Security of Privileged Accounts (PAM + MFA)

Course Content
IT Team Cybersecurity Awareness Training
In Every employee contributes to cybersecurity, but it is the IT staff who serve as the primary guardians of Levino Capital’s digital framework. Unlike their non-technical counterparts, IT professionals encounter both technical challenges and human threats, including misconfigurations, insider misuse, and advanced attacks aimed at privileged accounts. Given their elevated access, attackers often see IT teams as prime targets, which means that even a single error such as reusing an admin password or postponing a patch can jeopardize the entire organization. Therefore, it is crucial for IT staff to maintain the utmost discipline, technical awareness, and strict compliance with established policies.
0/9
IT Team Cybersecurity Awareness Training

Administrator and root accounts represent the most critical types of access, often referred to as the “crown jewels” of IT. If these accounts are compromised, they grant attackers complete control over the environment. Therefore, IT personnel must implement multi-factor authentication for all admin accounts, utilize unique and strong passwords without reusing them across different systems, regularly rotate credentials, and promptly reset access when staff members leave. It is essential to employ Privileged Access Management tools to monitor and log all administrative activities. The dangers of inadequate controls are evident from an incident where an attacker discovered a shared admin password in a company wiki, leading to a total system breach; effective account management and PAM practices could have averted this situation.

Why this matters

Admin accounts = blast radius. Treat them like crown jewels.

Do this:

  • Enforce MFA on all admin/remote access.
  • Use dedicated admin accounts (no browsing, no email).
  • Store secrets in a vault/PAM and rotate regularly; never reuse.
  • Maintain a break-glass account: vaulted, tested, audited.

Mini-lab:

Review one admin group: remove stale members, confirm MFA, document how to request temporary elevation.

Do/Don’t:

  • Separate duties (approval vs execution).
  • Never share passwords, tokens, or OTPs.
Module 3 – Security of Privileged Accounts (PAM + MFA)
Scroll to top