PAM Architecture

  • Haber M
  • Hibbert B
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Privileged Access Management (PAM) provides an automated password and session management solution that provides secure access control, auditing, alerting, and recording for any privileged account. The technology is designed to manage a local or domain shared administrator account; a user's personal admin account; service, operating system, network device, database (A2DB), and application (A2A) accounts; and even SSH keys, cloud, and social media. By improving the accountability and control over privileged passwords, IT organizations can minimize privileged threats and achieve compliance objectives.

Cite

CITATION STYLE

APA

Haber, M. J., & Hibbert, B. (2018). PAM Architecture. In Privileged Attack Vectors (pp. 107–118). Apress. https://doi.org/10.1007/978-1-4842-3048-0_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free