Privileged Access Workstations (PAWs) SHALL be configured, and privileged business activities SHALL require the use of a PAW.
Business administrators perform a wide range of privileged actions within their network infrastructure, including configuring Mobile Device Management (MDM) systems, managing cloud resources, and editing configuration files on network hardware. These are considered privileged actions because they are high-level activities that should only be performed by authorized personnel, and they directly impact the confidentiality, integrity, and availability of the organization. Over the past decade, the cybersecurity industry has placed significant emphasis on securing privileged user activities.
A significant risk many administrators take is performing privileged actions on the same devices they use for general business or personal activities. This is especially common in small businesses, where users often rely on a single device for both work and home use. This practice can lead to data leakage and an increased attack surface. It also raises the risk of mixing identities and exposing sensitive data, such as cardholder information, across different contexts.
To mitigate these risks, organizations should implement Privileged Access Workstations (PAWs). These are endpoint devices dedicated exclusively to performing privileged activities. In essence, a PAW creates a secure, isolated environment that prevents privileged business resources from coming into contact with other data sources. This significantly reduces the attack surface by confining critical activities to a hardened platform and eliminating many potential entry points for attackers.
A PAW should be a stable desktop or laptop with a hardened operating system. The system should allow access to resource dashboards via a web browser, along with any necessary proprietary applications for administrative tasks. No additional software should be installed or permitted, including applications commonly used elsewhere in the organization. Application control policies, such as AppLocker, should be enforced to maintain this restriction. If the organization does not rely on third-party cloud platforms, external internet access should be disabled, limiting connectivity to the local network only. Additional controls should include highly restrictive host-based firewalls and file integrity monitoring tools.
For mobile businesses that primarily use laptops, an additional device should be designated as a PAW. This device does not need high-end specifications, as its primary functions will be limited to accessing web dashboards and running lightweight administrative tools. However, it should meet modern hardware security standards, including a Trusted Platform Module (TPM) and UEFI Secure Boot. The device should also utilize a virtual private network (VPN) to securely connect to the business network when performing privileged tasks. An always-on VPN configuration can further simplify secure usage.
For very small businesses with limited cybersecurity budgets, acquiring a dedicated workstation may not be feasible. In such cases, virtualization can serve as a practical alternative. While not as secure as physical separation, it can still provide a strong level of isolation when properly implemented. Administrators can install a hypervisor (such as VirtualBox, VMware Workstation, Hyper-V, or Parallels) on their primary device and create a dedicated virtual machine for privileged activities. Because minimal data should be stored on the PAW, the virtual machine does not require significant system resources.
The virtual machine’s operating system can be selected based on preference; however, using a Linux distribution can reduce costs due to its open-source nature. Distributions such as Ubuntu or Linux Mint are user-friendly and well-suited for PAW use cases, as they include minimal pre-installed software and provide a clean environment for administrative work. Regardless of the operating system chosen, it is essential to keep it up to date and apply appropriate hardening measures, such as implementing CIS Benchmarks or similar security guidelines.
