Understand and Manage the Risks

A privileged access management (PAM) system becomes the sole repository of the most important credentials.

Risk

Description

Mitigation

Disclosure

  • Compromised vault
    → security disaster.

  • Encrypted vault.
  • Strong authentication.
  • Flexible authorization.

Data Loss

  • Destroyed vault
    → IT disaster.

  • Replicate the vault.

Non-availability

  • Offline vault
    → IT service interruption.

  • One vault in each of 2+ sites.

Customers must test failure conditions before purchase!