Privileged Access Management an essential step for DSPT

See how PAM is the solution for compliance with the NHS Data Security and Protection requirements.

Securing privileged access has never been so important. Privileged User Accounts, due to their elevated permissions, are a prime target to hackers; if credentials are exploited, hackers can wreak havoc to key NHS systems and critical data.

It’s no surprise then that NHS Digital’s Data Security and Protection Toolkit (DSP Toolkit) clearly states in Standard 4 that NHS organisations must ‘closely manage privileged user access in the network and information systems supporting the essential service’.

To demonstrate DSPT compliance, NHS IT teams must have access to well documented, auditable proof of their efforts to protect privileged access, as well as ensure that only the principle of ‘least privilege’ is applied and that permissions are revoked when no longer required. Any access to personal confidential data on IT systems must be attributable to individuals.

ITHealth partnered with Osirium to simplify your compliance journey. In this recorded webinar, we cover how you can:

  • Investigate and analyse privileged user sessions through comprehensive audit trails and session recording - Who, what, where, when.
  • Minimise the exposure of sensitive credentials by applying the model of mapping identities of people to roles on the systems and devices that need to be administered.
  • Automate privileged tasks that might otherwise normally need an administrator.
  • Grant 3rd parties time-limited, ‘least privilege’ access to your systems securely without the need to provide them with privileged passwords.
  • Centrally manage all your privileged credentials and exceed compliance requirements.
Click to chat