Select a maturity level for each pillar by navigating to its section. Your overall posture is visualised below. Click any pillar card to jump to its detail view.
Coverage Maturity
Secure Credentials
Privileged credentials are the primary target in over 80% of breaches. This pillar focuses on eliminating credential sprawl, enforcing vaulting, rotating secrets automatically, and ensuring no standing access persists beyond its need.
Level
-
TA0006
Credential Dumping T1003LSASS extraction, SAM database access, DCSync attacks
-
TA0006
Kerberoasting / AS-REP Roasting T1558Offline cracking of service account tickets
-
TA0008
Pass-the-Hash / Pass-the-Ticket T1550Reuse of credential hashes without needing plaintext
-
TA0003
Hardcoded & Embedded Secrets T1552Credentials in code repos, scripts, config files
-
TA0001
Brute Force / Password Spray T1110Systematic credential guessing at scale
-
TA0006
Unsecured Credentials in Files T1552.001Passwords stored in text files, spreadsheets, wikis
-
Secret Server
Centralised PAM VaultEliminates credential sprawl. Single authoritative store for all privileged accounts with granular RBAC.
-
Secret Server
Automated Password RotationScheduled & event-driven rotation. Immediate rotation on suspected compromise. Zero standing access.
-
Secret Server
Just-in-Time (JIT) AccessRequestโapproveโexpire workflow. Ephemeral credentials with automatic revocation.
-
DevOps Secrets Vault
Secrets Injection for PipelinesRemoves hardcoded secrets from CI/CD. Dynamic secrets delivered at runtime via API.
-
Account Lifecycle Mgr
Account Discovery & GovernanceDiscovers unmanaged accounts. Automates provisioning/deprovisioning tied to HR systems.
-
Cloud Suite
Cloud Identity VaultingManages AWS/Azure/GCP service principals, IAM roles, and API keys within unified policy.
Minimise Attack Surface
Reducing the available attack surface limits an adversary's options after initial access. This pillar covers least-privilege access, removal of local admin rights, session brokering, and cutting unnecessary entitlements.
Level
-
TA0004
Privilege Escalation via Local Admin T1068Exploiting local admin rights to escalate to SYSTEM or Domain
-
TA0008
Lateral Movement with Over-Privileged Accounts T1021Using broad entitlements to pivot across network segments
-
TA0003
Abuse of Remote Services T1021.001RDP, WinRM, SSH exploitation leveraging excessive rights
-
TA0005
Access Token Manipulation T1134Token impersonation enabled by unconstrained delegation
-
TA0006
Dormant / Orphaned Account Exploitation T1078Valid accounts that were never deprovisioned
-
Privilege Manager
Local Admin Removal (LAPS+)Removes persistent local admin rights. Elevates only specific approved tasks without broad rights.
-
Privilege Manager
Least-Privilege PoliciesEndpoint privilege policies enforce minimum required access. Policy-based elevation with justification.
-
Secret Server
Session Brokering / ProxyingUsers connect to systems through an authenticated session broker without ever seeing credentials.
-
Account Lifecycle Mgr
Entitlement Reviews & CertificationRegular access reviews. Automatic deprovisioning of orphaned accounts. SoD enforcement.
-
Cloud Suite
Cloud Privilege Right-sizingAnalyses and reduces over-permissioned cloud IAM roles. Enforces least-privilege cloud entitlements.
Control Applications
Application control prevents malware, ransomware, and unauthorised tools from executing. This pillar covers allowlisting, application behaviour policies, and preventing living-off-the-land (LotL) attack techniques.
Level
-
TA0002
Malicious Script Execution T1059PowerShell, cmd, VBScript abuse for payload delivery
-
TA0005
Living-off-the-Land (LotL) T1218mshta, regsvr32, certutil, rundll32 abuse to evade AV
-
TA0002
Ransomware Execution T1486Encryption binaries launched with privilege
-
TA0005
DLL Side-Loading / Hijacking T1574Malicious DLLs loaded by trusted application processes
-
TA0003
Software Supply Chain Compromise T1195Trojanised software updates and dependencies
-
Privilege Manager
Application AllowlistingTrust-based execution control. Only approved apps run. Reputation-based auto-allow for trusted publishers.
-
Privilege Manager
Application Behaviour PoliciesBlock/allow based on process lineage, file hash, publisher cert, path, and network destination.
-
Privilege Manager
Greylisting & Sandbox ElevationUnknown apps enter a sandbox mode. Approval workflow for new software requests.
-
Privilege Manager
LotL Technique BlockingSpecific policies to block known LotL execution paths. Restricts dangerous interpreter invocation.
-
Secret Server
Launcher-based Session ControlPrivileged sessions launched only via approved launchers โ prevents arbitrary client execution.
Monitor & Audit
Comprehensive visibility across privileged sessions, credential usage, and access patterns is essential for compliance, forensic investigation, and real-time threat detection. This pillar ensures every privileged action leaves an immutable trace.
Level
-
TA0005
Log Tampering & Deletion T1070Clearing event logs to cover tracks post-compromise
-
TA0009
Exfiltration over Privileged Sessions T1048Data theft conducted through unmonitored admin connections
-
TA0003
Insider Privilege AbuseLegitimate users accessing systems beyond their role without detection
-
TA0009
Undetected Long-Term Presence T1078APT persistence via valid accounts with no session visibility
-
TA0005
Audit Trail Gaps for ComplianceMissing records enabling regulatory violations and failed audits
-
Secret Server
Session Recording & PlaybackFull video and keystroke capture of all privileged sessions. Tamper-proof storage with searchable metadata.
-
Secret Server
Privilege Event Audit TrailImmutable log of every secret view, checkout, rotation, and access request. Exportable for SIEM.
-
Connection Manager
Session Metadata EnrichmentEnriches connection logs with user identity, target, duration, and commands run. Feeds SIEM/SOAR.
-
Privilege Manager
Endpoint Privilege Event LoggingLogs every elevation event, blocked application, and policy exception across all endpoints.
-
Secret Server
Compliance Reporting (SOX, PCI, HIPAA)Pre-built reports for major compliance frameworks. Access certification evidence packaging.
Detect & Respond
Detection capability determines how quickly a breach is identified and contained. This pillar maps Delinea's threat detection features to active attack scenarios โ from anomalous session behaviour to credential misuse and privilege abuse indicators.
Level
-
TA0011
Anomalous Session Activity T1078Off-hours logins, impossible travel, unusual command patterns
-
TA0006
Credential Stuffing / Replay T1110.004Repeated authentication attempts with stolen credential lists
-
TA0008
Lateral Movement Detection Evasion T1021Slow, low-volume lateral movement to avoid signature detection
-
TA0040
Ransomware Pre-indicatorsMass file access, shadow copy deletion, backup targeting
-
TA0009
Data Exfiltration via Admin Tools T1041Large data transfers through trusted admin channels
-
Secret Server
Anomalous Access AlertsRule-based and ML-assisted alerting on unusual checkout patterns, off-hours access, geo-anomalies.
-
Secret Server
Automated Session TerminationPolicy-driven kill of suspicious active sessions. Instant credential rotation on alert trigger.
-
Privilege Manager
Endpoint Threat DetectionReal-time alerts on blocked application events, policy violations, and anomalous elevation requests.
-
Connection Manager
SIEM/SOAR Event ForwardingStructured session event feeds to Splunk, Sentinel, QRadar. Enables playbook automation on PAM events.
-
Secret Server
Workflow-based Incident ResponseAutomated ticket creation, approver notification, and account lockdown integrated with ITSM platforms.