Skip to main content

Multi-layered security architecture - Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager is designed to be secure. It is protected using a multi-layered security architecture, which includes running on a hardened OS, using file system ACLs, providing strong application-level user authentication, filtering user inputs, encrypting sensitive data, enforcing application-level ACLs and storing log data indefinitely.

Privileged Access Manager never requires plaintext passwords to be stored in configuration files or scripts and does not store plaintext passwords anywhere. Privileged Access Manager does not ship with a default administrator password -- one must be typed in at installation time.

These security measures are illustrated in Figure [link].


    Network architecture security diagram

Read More:

  • Multi-layered security architecture:
    Security is implemented as multiple layers, each of which acts to protect Privileged Access Manager data and embedded privileges.
  • Hardened server platform:
    Privileged Access Manager runs on a locked-down, hardened operating system.
  • Use of encryption:
    Use of Encryption to protect sensitive user data in storage and transit.
  • Web form input protection:
    Inputs to web forms in Privileged Access Manager are automatically protected against bogus data, buffer overruns and more.
page top page top