Cloud computing has turned IT management on its head in multiple ways. Users have the power to procure and use cloud resources without the involvement of IT. In light of that, users have a greater need for privileged access to those resources, increasing the complexity of managing privileged accounts.
A privileged account allows the user to take administrator-level action, such as changing systems settings and permissions, adding users, and downloading software. Because of the power afforded to privileged accounts, they demand greater security than regular accounts. Many of the most notorious cyberattacks were executed through the successful exploitation of privileged accounts.
Any organization seeking to improve the security of its privileged accounts will quickly run into a couple of acronyms — PIM (privileged identity management) and PAM (privileged access management). The two terms are closely related and often used interchangeably but there are distinct differences.