Conclusion
The purpose of this guide was to introduce certain concepts related to Privileged Access Management solutions, specifically Privileged Access Management and to alert you to specific considerations that should be kept in mind when building out your PAM deployment.
PAM makes broad use of inheritance across many objects so that configuration and management of the system can be simplified, but to achieve this goal you need to plan for it.
It’s important to get started in the right direction to minimize the changes that may need to be done later, but it is also important to understand that changes can be made later.
Plan, test and deploy, let users login and start using PAM, then reflect on their behavior and requirements and adopt changes were needed.
For additional guidance, consider reviewing common standards and regulations mandated in your geography or industry. Regulations like NIST, GDPR, ISO and HITRUST can also be helpful when implementing specific policies in PAM.
In the end, a PAM solution deployed in any configuration (even our default settings) is much better than a PAM solution not deployed.