Identity-Centrify PAM in Action: A Step-by-Step Approach

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Identity-Centrify PAM in Action

A Step-by-Step Approach
Harden
Environment
with High
Identity Assurance
Consolidation
Discover with Least
and Vault Access &
Privilege
RISK REDUCTION

Centralize management of
Service/App accounts
Enforce host-based session,
Consolidate Identities and file, and process auditing &
Minimize Break Glass integrate with SIEM
Discover and Register all
Machines Establish Alternate Admin Vault Secrets
Accounts
Vault Shared, Alternate ML-Based Command
Danger Admin, and Local Admin Just Enough Privilege – Monitoring & Alerting
Zone Accounts Roles, Elevation
Enforce MFA at NIST
Establish Secure Admin Just-in-Time Access – ITSM Assurance Level 3
Environment /IGA Workflow
Leverage FedRAMP
Enforce Session Auditing and Enforce MFA at NIST authorized to operate
Monitoring Assurance Level 2 services

MATURITY

©2020 Centrify Corporation. All Rights Reserved. 1

You might also like