- Role-based, attribute-based, & just-in-time access to infrastructure
- Connect any person or service to any infrastructure, anywhere
- Logging like you've never seen
In homage to the episode “Pam’s Replacement” from The Office, we present our take on Pam’s earnest quest to make Dunder Mifflin's data and systems more secure.
The Wake-Up Call
Once upon a dreary Monday morning, as Pam Beesly entered the Dunder Mifflin Scranton office, she overheard a news piece on the radio about a local competitor’s customer database getting breached and losing confidential data. The thought of it sent a cold shiver down her spine, prompting her to take a deep dive into the security state of Dunder Mifflin’s systems.
Dwight, the self-proclaimed Assistant to the Regional Manager and the office's unofficial security officer, reassured her that they were using a state-of-the-art Privileged Access Management tool they purchased in 2005, CyberArk. "CyberArk is like the Schrute of digital security," he said with a chest-thumping pride, although Pam had her doubts.
"CyberArk is like the Schrute of digital security."
Security Nightmare Unveiled
Pam decided to investigate further. What she discovered was an IT and security disaster. To her horror, she found out only one person was using CyberArk to access a Windows Server (that hadn’t been patched in 5 years). That first server took so long to get set up that they abandoned the project, and no one even realized it.
Every other employee had resorted to jotting down passwords on post-its, saving them in code, or worse, in plain text documents on their desktops. And for some unfathomable reason, everyone had admin access to everything. The interns, seemingly innocuous, had guessed the AWS password and had been running a lucrative Bitcoin mining operation for the last three months.
Their newfound wealth, exhibited by their new cars parked outside, was a testament to the gaping security holes in the system. Dwight’s claim of CyberArk being the Schrute of digital security seemed to be more of a fantasy than reality.
Realization dawned upon Michael about the importance of the secure environment Pam had initiated. He decided to hold an office meeting to educate everyone on cybersecurity, albeit in his own Michael Scott way. The agenda included a competition to see who had the most secure system password. It was a bizarre blend of cybersecurity awareness and classic Dunder Mifflin shenanigans.
The Meeting Shenanigans
As the meeting commenced, everyone was keen to prove the strength of their passwords, well, everyone except Jim and Pam. It was a field day for Jim, whose penchant for mischief found a fertile ground. Each employee naively shared their real passwords: Dwight's was "BeetKing1978", Angela's was "SprinklesForever," Kevin's was "ChiliMaster," and Creed, well, he wasn’t sure what a password was. Jim’s grin widened.
A treasure trove of opportunities for mischief had landed in Jim’s lap. The loose security protocols turned into fodder for his pranks, with Dwight being the usual victim of his shenanigans. The next 48 hours were a security circus with Jim orchestrating pranks that exploited the laughably lax identity security, like changing Dwight’s desktop wallpaper to various photos of Mose and changing the contract renewal dates for all his clients to a date in 2027. Michael, on the other hand, was obviously making the situation worse, sharing his password - “PASSWORD123” - on a conference call with clients while trying to explain how secure their data was.
Pam's PAM Solution Hunt
Amidst the chaos, Pam delved into researching a simpler and more effective solution to their Privileged Access woes. Upgrading their CyberArk deployment seemed daunting, and she was concerned they’d be back in the same place they were today – not enough coverage and not nearly enough utilization. Someone at corporate recommended another legacy PAM, but Pam didn’t think they could stomach the long deployment.
That’s when she stumbled upon StrongDM. With customer reviews that say, “Secure, simple and compliant way to provide access to all teams” and “Straightforward and easy to deploy,” StrongDM seemed like the knight in shining armor Dunder Mifflin desperately needed.
She spent the next few days convincing Michael and the rest of the office to switch to StrongDM, which promised Dynamic Access Management (DAM) – a modern-day security miracle that could prevent them from becoming the next headline. She demonstrated how it could seamlessly integrate with their systems and eliminate the need for post-it note passwords and admin free-for-all.
The ease of use StrongDM brought to the table made even the staunchest of technophobes in the office give it a thumbs up. All the Dunder-heads found it intuitive and began practicing secure access management without a hitch. However, Michael took some convincing because he thought that a difficult-to-use PAM might make it harder for hackers.
A Safer Digital Fortress
Finally, with a unanimous (though somewhat clueless) nod from the office and corporate, they made the switch. StrongDM Dynamic Access Management became the new hero, and Pam was lauded for her initiative. Even Dwight had to begrudgingly admit, “Well, I suppose it’s better than a beet-farming security protocol.”
As Pam sat back in her chair, she couldn’t help but smile. The office was now a safer digital fortress, though the shenanigans of its occupants remained as unpredictable as ever. You never know what tomorrow will bring.
Want to see StrongDM in action? Book a demo.
About the Author
StrongDM Team, Dynamic Access Management platform, StrongDM puts people first by giving technical staff a direct route to the critical infrastructure they need to be their most productive.