Building an internal
security policy
that holds.
A practical, framework-aligned guide to governing Delinea Platform usage — from role definition to audit-ready controls.
Admin Roles & Responsibilities
Delinea's role-based access model separates duties across three administrative tiers. Assigning the right role to the right person is the foundation of your governance posture.
- Full platform configuration access
- Create / remove Admin and Auditor accounts
- Define global password & session policies
- Manage licencing and integrations
- Emergency break-glass account holder
- Approve all Tier-1 change requests
- Manage vaults, secrets, and connections
- Onboard / offboard end-users and groups
- Apply and test session-recording policies
- Configure connectors and target systems
- View (not export) audit logs
- Respond to and escalate alerts
- Read access to all audit logs and reports
- Export audit evidence for compliance reviews
- Review session recordings (read-only)
- Generate compliance dashboards
- No ability to modify any configuration
- No access to secret values
| Capability | Owner | Admin | Auditor |
|---|---|---|---|
| Global policy configuration | ✔ Full | ✖ | ✖ |
| User & role management | ✔ All | ~ Tier 2 | ✖ |
| Secret vault management | ✔ | ✔ | ✖ |
| View secret values | ✔ | ~ Scoped | ✖ |
| Session recording playback | ✔ | ✔ | Read |
| Audit log access | ✔ | ~ View | ✔ Export |
| Approve change requests | Tier 1+2 | Tier 2 | ✖ |
| Platform licencing | ✔ | ✖ | ✖ |
Session-Timeout & Password Complexity
Baseline security settings form the backbone of your hardening posture. Use the interactive controls below to explore recommended configurations and understand the rationale behind each value.
NIST SP 800-53 AC-12 recommends ≤ 15 minutes for privileged sessions. Shorter values reduce risk exposure.
Even active privileged sessions should terminate and require re-authentication after a hard ceiling.
SOC 2 CC7.2 & ISO 27001 A.12.4.1 require log retention sufficient for security investigations (min. 90 days).
NIST SP 800-63B and CIS Benchmark recommend ≥ 14 characters for privileged accounts. 16+ is best practice.
Lower values reduce brute-force windows but increase helpdesk burden. 5 is the industry consensus.
*NIST SP 800-63B recommends removing periodic expiry in favour of breach detection.
Change-Approval Process
Every modification to platform settings introduces risk. A structured change-approval workflow ensures accountability, traceability, and rollback capability.
Tier 1 examples: global password policy changes, integration of new identity providers, breaking-glass procedures, licence modifications.
Tier 2 examples: vault creation, new target connections, session policy updates.
Tier 3 examples: individual user onboarding, secret rotation for existing entries.
// Approval Workflow — Tier 1 Change
Governance & Audit Framework Mapping
Understanding how Delinea Platform controls map to SOC 2 Trust Service Criteria and ISO 27001 Annex A controls is essential for audit readiness. Use these mappings to gather evidence and identify gaps.
Draft Security Policy Template
Complete the fields below to generate a customised Delinea Platform security policy for your organisation. All fields are editable and the completed document can be copied or downloaded.
Knowledge Check
Test your understanding of Delinea Platform security governance. Select the best answer for each question.