Identity-Centrify PAM in Action: A Step-by-Step Approach
Identity-Centrify PAM in Action: A Step-by-Step Approach
Identity-Centrify PAM in Action: A Step-by-Step Approach
A Step-by-Step Approach
Harden
Environment
with High
Identity Assurance
Consolidation
Discover with Least
and Vault Access &
Privilege
RISK REDUCTION
Centralize management of
Service/App accounts
Enforce host-based session,
Consolidate Identities and file, and process auditing &
Minimize Break Glass integrate with SIEM
Discover and Register all
Machines Establish Alternate Admin Vault Secrets
Accounts
Vault Shared, Alternate ML-Based Command
Danger Admin, and Local Admin Just Enough Privilege – Monitoring & Alerting
Zone Accounts Roles, Elevation
Enforce MFA at NIST
Establish Secure Admin Just-in-Time Access – ITSM Assurance Level 3
Environment /IGA Workflow
Leverage FedRAMP
Enforce Session Auditing and Enforce MFA at NIST authorized to operate
Monitoring Assurance Level 2 services
MATURITY