00:30 What is Identity
00:50 What is a privileged identity
01:19: Protecting Identity
02:00: What does PAM prevent?
02:10: Lateral Movement
03:00 Blast Radius
03:20 Identity Problem / Solution
04:33 Delinea Features & Deployment
06:00 Secrets
06:57 RBAC for Secrets & Personas
07:58 Secret Settings
08:34 Secret Template
09:48 Secret Policies
11:44 Use Case 1 - Remote Password Changing
12:59 Use Case 2 - Passwordless
15:22 Use Case 3 - Launchers and Session Monitoring
16:47 Conclusion
PAM, or Privileged Access Management, is a cybersecurity strategy designed to safeguard sensitive data and critical systems by controlling and monitoring access to privileged accounts and resources within an organisation. These privileged accounts typically have elevated permissions, allowing users to perform tasks such as configuring systems, accessing sensitive information, or making significant changes to the IT infrastructure.
Delinea's Privileged Access Management (PAM) solution offers a comprehensive suite of tools and processes to effectively manage, monitor, and audit privileged access within an organisation. With robust password management capabilities, Delinea allows administrators to securely store, rotate, and control access to privileged account credentials, reducing the risk of unauthorized access and credential theft. Session monitoring features enable real-time visibility into privileged user activity, allowing administrators to track and audit all actions performed within privileged sessions to detect and respond to suspicious behaviour promptly.
This video explains fundamental principals when it comes to PAM, specifically Delinea and use cases related to an implementation.
DM me on Linked In -
[ Ссылка ]
Ещё видео!