Locking down Hitachi ID Privileged Access Manager servers
Hitachi ID Privileged Access Manager is a security application, and should be locked down accordingly.
In the same way that it makes sense to harden and protect the operating
system and physical installation of a firewall, it makes sense to
minimize the number of components running on a Privileged Access Manager server, to
lock it down, limit logical and physical access to it, and keep its
operating system and web server at current patch levels.
- Multi-layered security architecture:
Security is implemented as multiple layers, each of which acts to protect Privileged Access Manager data and embedded privileges.
- Hardened server platform:
Privileged Access Manager runs on a locked-down, hardened operating system.
- Use of encryption:
Use of Encryption to protect sensitive user data in storage and transit.
- Web form input protection:
Inputs to web forms in Privileged Access Manager are automatically protected against bogus data, buffer overruns and more.