What is Break the Glass Protocol?

Break the Glass is an emergency access protocol used in PAM to provide immediate and time-limited access to critical systems in exceptional circumstances.

"Break the Glass" is an emergency access protocol that allows users to bypass normal access controls to gain immediate and time-limited access to privileged accounts or critical systems during urgent situations. This approach is typically reserved for scenarios where waiting for standard access approvals or following regular access procedures could result in significant harm, operational disruption, or security risks.

An emergency break-glass access should only be used in situations when normal procedures are insufficient or unavailable. For example:

  • PAM tool is unavailable due to excessive downtime or maintenance
  • PAM tool failure – the authentication process fails due to the server being down
  • MFA is required but unavailable due to a network outage
  • Account problems due to a cyberattack – access to all accounts was removed
  • Account problems due to a locked password – the password was typed incorrectly too many times

"Break the Glass" mechanisms in PAM provide a critical balance between maintaining strong security controls and ensuring operational continuity during emergencies. By implementing this capability with appropriate safeguards, organizations can respond quickly to urgent situations while maintaining accountability and minimizing the risk of abuse.

This vital emergency protocol allows for rapid, controlled, and audited access to critical systems in times of urgent need. While it provides essential capabilities to address emergencies, it must be managed with strict controls and oversight to mitigate potential risks.

senhasegura
All-In-one PAM Solution

senhasegura is a leading cybersecurity company specializing in Privileged Access Management (PAM) solutions that help organizations tackle insider threats, risky user behavior, and secure devices and credentials. Our comprehensive platform ensures optimal protection of critical assets while offering exceptional customer support.

Full Bio and articles

Request a Demo or Meeting

Discover the power of Identity Security and see how it can enhance your organization's security and cyber resilience.

Schedule a demo or a meeting with our experts today.
70% lower Total Cost of Ownership (TCO) compared to competitors.
90% higher Time to Value (TTV) with a quick 7-minute deployment.
The Only PAM solution available on the market that covers the entire privileged access lifecycle.