{"id":26864,"date":"2020-08-07T06:51:57","date_gmt":"2020-08-07T06:51:57","guid":{"rendered":"http:\/\/35.232.100.111\/?page_id=26864"},"modified":"2022-11-28T11:22:44","modified_gmt":"2022-11-28T11:22:44","slug":"pam-101","status":"publish","type":"page","link":"https:\/\/sectona.com\/pam-101\/","title":{"rendered":"PAM 101 – a beginner’s guide to privileged access management."},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

PAM 101<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Learn everything about privileged access from concepts to frameworks. We are here to help you find the technical friendly informations with our pam 101 concepts.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t
Try Sectona<\/a>\r\nContact Us<\/a>\r\n\r\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n
\n\t
\n\t\t
\n\t\t\t\"Visual\n\t\t<\/div>\n\t<\/div>\n\t\t
\n\t\t\t\t
\n\t\t\n
\n\t\t\t
\n\t\t\t\n\t\t\t\tAll\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n\t\t\t\tAccess Control\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n\t\t\t\tAccount Management\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n\t\t\t\tAuthentication\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n\t\t\t\tPassword Management\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n\t\t\t\tSession Management\n\t\t\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\n
\n\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Understanding\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tAccess Control<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tThe Principle of Least Privilege<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Role\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tAccess Control<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tRole-Based Access Control (RBAC)<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Just-In-Time-Access-PAM-101-Featured-Image\"\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tAccess Control<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tThe Basics of Just-In-Time Access (JIT)<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Threat-Analytics-PAM-101-Featured-Image\"\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tSession Management<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tThreat Analytics – Analysing Potential Security Breaches<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Video-Session-Logging-PAM-101-Featured-Image\"\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tSession Management<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tVideo Session Logging – Recording Activities of Privileged Accounts<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"User-Event-Logging-PAM-101-Featured-Image\"\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tSession Management<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tUser Event Logging – Monitoring Event Logs of Privileged Users<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Password-Rotation-PAM-101-Featured-Image\"\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tPassword Management<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tPassword Rotation: Need to Rotate Privileged Account Passwords<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n\t\t\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\n
\n\t
\n\t\t\t\n\t\n\t\t\"Password-Reconciliation-PAM-101-Featured-Image\"\n\t\t
\n\t\t\t\t\t<\/div>\n\n\t\t<\/a>\t<\/div>\n<\/div>\n\n\t
\n\t\t
\n\t\t\t\n
\n\t\t\t
\n\t\t\t\t\n\tPassword Management<\/a>\t\t<\/div>\n\t\t<\/div>\n\n

\n\t\t\n\tPassword Reconciliation – Enabling Synchronized Password Management<\/a><\/h2>\n\n\n\tRead More<\/a>\n\t\t<\/div>\n\t<\/figcaption>\n\t\t\t<\/figure>\n\t\t\t\t\t<\/article>\n\t\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\n
\n\t
\n\t\t\n\t\t\tLoad More<\/span>\n\t\t\t<\/span> Loading More...<\/span><\/span>\n\t\t\tYou\u2019ve reached the end of the list<\/span>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

PAM 101 Learn everything about privileged access from concepts to…<\/p>\n","protected":false},"author":35,"featured_media":49440,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_post_transparent":"disable","_kad_post_title":"hide","_kad_post_layout":"fullwidth","_kad_post_sidebar_id":"","_kad_post_content_style":"unboxed","_kad_post_vertical_padding":"hide","_kad_post_feature":"hide","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_vp_format_video_url":"","_vp_image_focal_point":[]},"_links":{"self":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages\/26864"}],"collection":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/comments?post=26864"}],"version-history":[{"count":8,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages\/26864\/revisions"}],"predecessor-version":[{"id":53157,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/pages\/26864\/revisions\/53157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/media\/49440"}],"wp:attachment":[{"href":"https:\/\/sectona.com\/wp-json\/wp\/v2\/media?parent=26864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}