Privilege access management (PAM) is complex and possesses a risk to businesses.
End users have become one of the largest attack-surfaces for threat actors (e.g. Phishing). As businesses focus on technology to gain a competitive edge, the management of users becomes more complex and has risen in importance due to the need for rapid change in the IT landscape due to technology focus in business strategy.
Privileged accounts are great targets for intruders because small breaches can cause significant data leaks. Some of the challenges regarding management of privileged accounts might be:
- Lack of automated tools to manage accounts increases risk of human errors
- Too many tools to manage accounts creates poor overview
Functions & Requirements
- Available both on premise and in the cloud.
- Establish a Secure Vault: Store privileged credentials in an encrypted, centralised vault.
- Discover Privileges: Identify all service, application, administrator, and root accounts to curb sprawl and gain full view of your privileged access.
- Manage Secrets: Provision and deprovision, ensure password complexity, and rotate credentials.
- Delegate Access: Set up RBAC, workflow for access requests, and approvals for third parties.
- Control Sessions: Implement session launching, proxies, monitoring, and recording.
Learn more about Secret Server at the Secret Server ressource library.
Read more about system requirements here.