© Morey J. Haber 2020
M. J. HaberPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-5914-6_12

12. PAM Architecture

Morey J. Haber1 
(1)
Heathrow, FL, USA
 

A successful privileged access management (PAM) architecture should secure privileges across every user, session, and asset. Traditionally, the first significant piece of a PAM solution that organizations look to implement is an automated credential management solution that provides secure access control, auditing, alerting, and recording for any privileged session. Other central pieces of PAM include least privilege management and remote access management. These three solutions should all be integrated and work together for your entire privilege universe.

Privileged credential management ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.