Skip to main content

Locking down Hitachi ID Privileged Access Manager servers

Hitachi ID Privileged Access Manager is a security application, and should be locked down accordingly. In the same way that it makes sense to harden and protect the operating system and physical installation of a firewall, it makes sense to minimize the number of components running on a Privileged Access Manager server, to lock it down, limit logical and physical access to it, and keep its operating system and web server at current patch levels.

Read More:

  • Multi-layered security architecture:
    Security is implemented as multiple layers, each of which acts to protect Privileged Access Manager data and embedded privileges.
  • Hardened server platform:
    Privileged Access Manager runs on a locked-down, hardened operating system.
  • Use of encryption:
    Use of Encryption to protect sensitive user data in storage and transit.
  • Web form input protection:
    Inputs to web forms in Privileged Access Manager are automatically protected against bogus data, buffer overruns and more.
page top page top