MODULE 01
/
Privileged Access Management
Module 01 Foundations
Privileged Access Management
Understanding what PAM is, why it matters, and the core controls that protect your most sensitive access paths.
🎯
Learning Objective
By the end of this module, you'll understand what privileged access is, why it's the #1 attack target, and how PAM controls reduce risk.
πŸ”‘
What is Privileged Access?

Privileged access refers to accounts, credentials, or permissions that have elevated rights beyond those of a standard user β€” the ability to modify system configurations, access sensitive data, install software, or make changes that affect multiple users or systems.

74%
of breaches involve privileged credential abuse
3Γ—
more costly breaches involving privileged access
83%
of organizations experienced an identity-related breach in 2023
πŸ—οΈ Types of Privileged Accounts β€” Click to explore
πŸ›‘οΈ
Local Admin
Full control over a single endpoint
🌐
Domain Admin
Control over entire AD domain
βš™οΈ
Service Accounts
Run applications and processes
πŸ”
Root / Superuser
Unrestricted Unix/Linux access
☁️
Cloud IAM Roles
AWS, Azure, GCP super-roles
πŸ—οΈ
SSH Keys & Certs
Cryptographic privileged access
⬆ Click any account type above to learn more
⬑ Core PAM Controls
🏦
Privileged Account Vaulting
β–Ό
Credentials for privileged accounts are stored in an encrypted, access-controlled vault β€” never in spreadsheets, scripts, or memory. Users check out credentials for a session and they are rotated automatically afterwards. This ensures no shared static passwords and a full audit trail of who accessed what, when.
πŸ–₯️
Privileged Session Management (PSM)
β–Ό
All privileged sessions (RDP, SSH, database, web) are proxied through a session management layer. Sessions are recorded, monitored in real-time, and can be terminated instantly. Keystroke logging and video recording provide forensic evidence and support compliance requirements (SOX, PCI-DSS, HIPAA).
πŸ“
Least Privilege & Just-In-Time Access
β–Ό
Least privilege ensures accounts only have the minimum permissions needed for a task. Just-In-Time (JIT) access takes this further β€” privilege is granted only for the duration of an approved task and automatically revoked. This dramatically shrinks the attack surface by eliminating standing privilege.
πŸ”„
Credential Rotation & Management
β–Ό
PAM solutions automatically rotate passwords and API keys on a schedule or after each use. This prevents credential reuse attacks and limits the window of exposure if a credential is compromised. Modern PAM can also manage SSH keys, certificates, and cloud access tokens.
βœ…
Module Complete
You've covered the core concepts of Privileged Access Management. Continue to Module 2 to explore the broader identity security landscape.
Module 02 Threat Landscape
Identity Security
Why identity has become the new perimeter, and how modern threats exploit the identity attack surface.
πŸ’‘
The Shift: Identity IS the Perimeter
Traditional network perimeters have dissolved. With cloud, remote work, and SaaS, the question is no longer "are you inside the network?" but "who are you, and what are you allowed to do?"
⚠️
Human Identities

Employees, contractors, partners, and customers. Each has unique access needs that change over time. Joiners, movers, and leavers all represent risk if identity lifecycle isn't managed.

Employees Contractors Partners Customers
πŸ€–
Non-Human Identities (NHI)

Applications, services, bots, pipelines, and scripts that need access to resources. NHIs often outnumber humans 10:1 and are frequently invisible to security teams.

Service Accounts API Keys OAuth Tokens Certificates
⚑ The Identity Kill Chain β€” How attackers exploit identities
🎣
Initial Access
Phishing
Credential Theft
πŸ”
Reconnaissance
AD Enumeration
Bloodhound/Kerberoast
πŸ“ˆ
Privilege Escalation
Local Admin
to Domain Admin
🌍
Lateral Movement
Pass-the-Hash
Golden Ticket
πŸ’₯
Exfiltration
Data Theft
Ransomware
πŸ›‘οΈ
PAM disrupts every stage
By vaulting credentials, enforcing least privilege, and requiring MFA for privileged access, PAM makes each step of the kill chain significantly harder or detectable.
⬑ The Identity Attack Surface
Attack Vector Description PAM Control
Credential Stuffing Reusing leaked passwords across systems Vault + auto-rotation
Kerberoasting Extracting service account hashes from AD Strong SPN passwords, CID discovery
Pass-the-Hash Authenticating without knowing plaintext password Session isolation, MFA enforcement
Privilege Escalation Exploiting misconfigurations for higher access Least privilege, JIT access
Shadow IT Accounts Unmanaged accounts with excessive rights Continuous Identity Discovery

πŸ”’ PAM + Identity Security: A Unified Approach

  • Discover all identities β€” including those you don't know about
  • Assess and prioritize risk across the entire identity landscape
  • Protect privileged credentials with vaulting and session controls
  • Detect anomalous identity behavior in real time
  • Respond automatically to identity-based threats
βœ…
Module Complete
You understand the modern identity threat landscape. Next: the specific challenge of identity discovery.
Module 03 Core Challenge
The Identity Discovery Challenge
You can't protect what you can't see. Understanding why discovering all identities is hard β€” and essential.
🚨
The Visibility Gap
Most organizations have 3–5Γ— more identities than they think. Unknown accounts β€” stale, orphaned, or shadow β€” are among the most common breach entry points.
40%
of all accounts are orphaned or stale
10:1
ratio of machine identities to human identities
197
average days to identify an identity-based breach
πŸ”Ž
Why Identity Discovery Is Hard

Modern enterprise environments span on-premises Active Directory, cloud directories (Entra ID, Okta), dozens of SaaS applications, DevOps pipelines, IaaS environments, and legacy systems β€” each with its own identity store. Identities are created by IT, by developers, by automation, and even by shadow IT with no central oversight.

πŸ—ΊοΈ Where Identities Hide β€” The Discovery Surface
🏒
Active Directory
Local & domain accounts, SPNs, GPOs
☁️
Cloud Directories
Entra ID, Okta, AWS IAM, GCP
πŸ—„οΈ
Databases
Shared DB accounts, local DBAs
πŸ“±
SaaS Apps
Salesforce, GitHub, Slack admins
πŸ”§
DevOps / CI-CD
Pipeline service accounts, tokens
πŸ€–
Automation / RPA
Scripts, bots, service principals
⬑ Common Discovery Failures
πŸ‘»
Orphaned Accounts
β–Ό
Accounts belonging to employees who have left the organization but were never disabled or deleted. These are frequently targeted by attackers because they have no active owner who would notice anomalous activity. Manual offboarding processes almost always leave gaps.
πŸŒ‘
Shadow Admin Accounts
β–Ό
Accounts that have effective admin privileges through indirect group memberships, ACL delegations, or GPO permissions β€” without being in any obvious "Admins" group. These are invisible to standard account audits and represent one of the most dangerous blind spots in Active Directory environments.
πŸ”—
Service Account Sprawl
β–Ό
Service accounts are created as applications are deployed, but rarely cleaned up when apps are decommissioned. They often have static passwords, excessive permissions, and no owner. Many are also used interactively by humans, bypassing intended controls and creating significant audit risk.
πŸ”‘
Unmanaged SSH Keys & API Credentials
β–Ό
SSH keys, API tokens, OAuth credentials, and cloud service principals are frequently created by developers and never tracked centrally. They may grant powerful access, never expire, and live in source code, container images, or configuration files where they can be exfiltrated.
🎯
Why Periodic Discovery Isn't Enough
Point-in-time scans miss the dynamic nature of modern environments. Identities are created, modified, and escalated continuously β€” sometimes by attackers already inside the network. Only continuous, automated discovery can keep pace.
βœ…
Module Complete
You now understand the identity discovery challenge in depth. Ready to learn how Delinea's CID solves it?
Module 04 Delinea Platform
Delinea Continuous Identity Discovery
How Delinea CID provides always-on visibility across the entire identity attack surface β€” and automatically connects discoveries to remediation.
πŸ”Ά Delinea Platform Feature β€” Continuous Identity Discovery (CID)
πŸš€
What is Delinea CID?
Delinea Continuous Identity Discovery is a capability within the Delinea Platform that automatically and continuously discovers all identities β€” human and non-human, managed and unmanaged β€” across your entire environment, assesses their risk, and drives remediation through integrated PAM workflows.
DISCOVERY SOURCES
🏒 Active Directory
☁️ Cloud Directories
πŸ’» Endpoints
πŸ“± SaaS & Apps
πŸ”‘ Credentials
↓↓↓
DELINEA CID ENGINE
πŸ”„ Continuous Scan
πŸ•ΈοΈ Relationship Mapping
πŸ“Š Risk Scoring
⚑ Change Detection
↓↓↓
AUTOMATED OUTPUTS & REMEDIATION
πŸ—ΊοΈ Identity Inventory
🚨 Risk Alerts
🏦 Vault Enrollment
🎫 ITSM Workflows
⬑ Key CID Capabilities
♾️
Continuous, Agentless Discovery
β–Ό
Unlike periodic scans, CID continuously monitors identity stores and endpoints for new accounts, permission changes, and anomalies β€” in real time. It operates agentlessly, scanning Active Directory, cloud directories, and endpoints without requiring software installation on each system. This means new accounts are discovered within minutes of creation, not during the next scheduled audit.
πŸ•ΈοΈ
Relationship & Entitlement Mapping
β–Ό
CID doesn't just list accounts β€” it maps the full web of relationships: group memberships, ACL delegations, SPN assignments, trust relationships, and effective permissions. This surfaces shadow admins and privilege escalation paths that are invisible in raw account listings. You can see exactly how an account can become an admin, even through a chain of indirect memberships.
πŸ“Š
Automated Risk Scoring & Prioritization
β–Ό
Each discovered identity receives an automated risk score based on factors like: stale/inactive status, privilege level, whether credentials are in the vault, password age, exposure in cloud vs. on-prem, and anomalous behavior indicators. This allows security teams to prioritize remediation rather than drowning in undifferentiated alerts.
πŸ”„
Automated Vault Enrollment & Remediation
β–Ό
When CID discovers an unmanaged privileged account, it can automatically trigger a workflow to enroll the account in the Delinea vault, reset its password, assign an owner, and begin managing its lifecycle β€” without manual intervention. For accounts that can't be immediately vaulted, CID raises a ticket in ServiceNow, Jira, or other ITSM tools to track remediation.
πŸ€–
Non-Human Identity (NHI) Coverage
β–Ό
CID specifically targets the explosion of non-human identities: service accounts, API keys, OAuth tokens, managed identities, service principals, and certificates. It tracks their usage, ownership, expiry, and privilege level β€” and flags those that are over-privileged, unused, or about to expire before they become a security gap or operational incident.
CID Discovery Output Sample β€” Privileged Account Risk Report
# Delinea CID β€” Identity Risk Summary (Sample)

discovered_identities: 4,821
previously_known: 1,340 # what IT thought they had
newly_discovered: 3,481 # the visibility gap

risk_breakdown:
critical: 47 # unvaulted domain admin creds, shadow admins
high: 203 # stale privileged accounts, old SSH keys
medium: 891 # over-privileged service accounts
low: 2,340

auto_enrolled_to_vault: 38 # critical accounts auto-vaulted
tickets_raised: 212 # remediation workflows triggered
scan_coverage: "AD, Entra ID, AWS IAM, 12 endpoints"
last_scan: "continuous" # not a point-in-time
πŸ†
CID vs. Traditional Discovery
TraditionalDelinea CID
FrequencyPeriodic / manualContinuous
CoverageAD onlyMulti-source
NHI SupportLimitedFull coverage
Risk ScoringManualAutomated
RemediationSeparate toolIntegrated
πŸ“‹
Use Cases
  • Eliminate unmanaged privileged accounts before an audit
  • Detect and remediate shadow admin paths in Active Directory
  • Gain full NHI inventory for SOC 2 / ISO 27001 compliance
  • Continuously enroll new service accounts as they are created
  • Track certificate expiry across all systems to prevent outages
  • Identify dormant admin accounts as breach indicators
βœ…
Module Complete
Excellent! You've covered Delinea CID in depth. One last step β€” test your knowledge.
Module 05 Assessment
Knowledge Check
Answer the questions below to test your understanding. Select the best answer for each question.
Question 01 of 06
What does PAM stand for, and what is its primary purpose?
Password and Monitoring β€” to log all user activity across the network
βœ“
Privileged Access Management β€” to secure, control, and audit access to accounts with elevated permissions
Public Access Management β€” to manage access for external partners and customers
Patch and Monitoring β€” to automate software updates across endpoints
Question 02 of 06
What is "Just-In-Time" (JIT) access and why is it important?
Access that is granted automatically to all users based on their department
A technique to speed up authentication by caching credentials locally
βœ“
Access that is granted only for the duration of a specific approved task, then automatically revoked β€” eliminating standing privilege
A scheduling system that rotates which admins have access each hour
Question 03 of 06
A "shadow admin" in Active Directory is best described as:
An admin account that is used only at night to avoid detection
βœ“
An account that has effective admin privileges through indirect group memberships or ACL delegations, without being in an obvious admin group
A backup administrator account that is kept disabled until needed
An admin who works remotely and connects via VPN
Question 04 of 06
Why do most organizations have far more identities than they think?
Because Active Directory automatically duplicates accounts for redundancy
Because users create personal accounts for convenience
βœ“
Because identities exist across many different systems (AD, cloud, SaaS, DevOps), machine and non-human identities vastly outnumber humans, and orphaned accounts are rarely cleaned up
Because IT departments have to create test accounts for every system
Question 05 of 06
What is the key differentiator of Delinea's Continuous Identity Discovery (CID) compared to traditional periodic scans?
CID uses AI to predict which accounts will be compromised
βœ“
CID continuously monitors identity stores in real time, covering multi-source environments, NHIs, and automatically triggering vault enrollment and remediation workflows
CID only scans Active Directory but does it much faster than competitors
CID requires agents on every endpoint to provide continuous monitoring
Question 06 of 06
Which of the following is NOT typically a PAM control?
Privileged account vaulting and credential rotation
Privileged session recording and monitoring
Just-In-Time access provisioning
βœ“
Managing end-user password complexity policies for standard accounts