© Morey J. Haber, Darran Rolls 2020
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/978-1-4842-5165-2_13

13. Privileged Access Management

Morey J. Haber1  and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 
Privileged Access Management (PAM) is a subdiscipline within the Identity Governance framework. The PAM universe can be implemented and operate on its own or be integrated into an organization’s Identity Access Management (IAM) program. Figure 13-1 illustrates IAM at a high level and all of the potential technology and security disciplines included in the framework.
../images/480623_1_En_13_Chapter/480623_1_En_13_Fig1_HTML.png
Figure 13-1

IAM Disciplines Model

Organizations may choose ...

Get Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.