Shared accounts employ a single credential to authenticate multiple users. Though this may not fit every organization, there could be some circumstances that are organization dependent that could drive the use of shared admin accounts.
Shared admin accounts decrease the management overhead by reducing the privileged access footprints within your IT estate. However, they come along with risks that need to be carefully managed.
Since they are shared among many people across teams and departments, they need constant monitoring to ensure the access is always restricted to the right set of people for the right reasons at any given point in time. Any lapses here could lead to unauthorized access as well as opening up vulnerabilities for the hackers to exploit.
Producing a clean audit trail is a challenge as the logs will only show the shared username. There is no direct way of tying up each action against the individuals. This could lead to accountability issues.
Shared accounts must be managed like any other privileged accounts and must be used in combination with PAM. PAM brings in Session monitoring and recording capabilities along with audit log features.
This allows you to map the actions against individuals using the shared account ensuring accountability which otherwise would be difficult to achieve when multiple users share the same account.
Just like any other privileged account, you need to enforce robust automated password management features to shared admin accounts as well. PAM's continuous monitoring and controlling features along with the audit logs helps you to stay on top of all your privileged activities done using a shared admin account.