<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Life's like a box of chocolates 🍫 Your access shouldn't be. Register for our new webinar.

Search
Close icon
Search bar icon

The Access Management Bill of Rights

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

I'm continuously shocked by how poorly the PAM industry has treated customers to date. Shame on CyberArk, Delinea, and all the rest of you for persisting with such predatory models.

  • The business model is "squeeze the blood out of them, then squeeze harder."
  • The deployment model is "you'll never stop paying our Professional Services fees if you ever want a deployment."
  • The support model is "you'll pay maintenance forever because you can't keep this stuff alive without us, much less upgrade it."
  • The adoption model is "it's supposed to be painful, you'll get used to it."

The world deserves better. YOU deserve better. 

Here's my bill of rights for admins and privileged users:

  1. You have the right to a product that covers your entire infrastructure, not just the 4 things your PAM or secret store decided are enough.
  2. You have the right to streamlined, simple deployment without the need for professional services.
  3. You have the right to not fear, but embrace your PAM partner because they actually care about solving your problems and not the balance in your bank account.
  4. You have the right to say "YES!" because anyone can use the technology to do their job without suffering.
  5. You have the right to get time back because automation, cloud-native concepts, and resiliency were design principles from day one.
  6. You have the right to full visibility of activities, and should have the option to connect it all to your monitoring tools so that you have the security awareness to react to events and make good decisions.
  7. You have a right to simply and easily produce access-related evidence for audits and investigations.
  8. As a privileged user, you have a right to securely and easily connect to the infrastructure needed to do your job using your preferred tools or methods.
  9. You have a right to easily add new technologies to your stack, knowing that it will not take weeks or months of work to be added to your privileged access management tool.
  10. You have the right to be confident that all access tied to a specific user has been deprovisioned when they change teams or get a new role.
  11. You have the right to easily request access to the tools you need, and have those requests approved and provisioned, or declined, within a reasonable timeframe–not days or weeks.
  12. You have the right to an easily-managed identity lifecycle across your infrastructure, supported by open standards such as SCIM, OIDC, and SAML, so you can meet compliance requirements.

You deserve better than the solutions provided by PAM providers. And this bill of rights is the starting point for demanding it.

Your PAM shouldn't scare you and your users to death. Make a change—StrongDM is the Dynamic Access Management platform (a better, more modern and flexible PAM) that puts you back in control of your business. Our G2 customer reviews can't be beat!


About the Author

, Chief Executive Officer (CEO), before joining StrongDM, Tim founded Evident.io—the first real-time API-based cloud security platform. In 2018, Palo Alto Networks (PANW) acquired Evident.io, and Tim joined the executive team at PANW. As the first Chief Cloud Officer, Tim helped outline GTM and product strategy with the C-suite for the cloud business. Tim also served as the principal architect for Adobe's Cloud Team, designing and scaling elastic AWS infrastructure to spark digital transformation across the industry. Tim’s love for innovation drives his interest as an investor in true market disrupters. He enjoys mentoring startup founders and serving as an advisor.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

Vendor Access Management (VAM) Explained
Vendor Access Management (VAM) Explained
Vendor Access Management (VAM) is the systematic control and oversight of vendor access to an organization's systems, applications, and data. It involves processes such as onboarding and offboarding vendors, utilizing solutions for Just-in-Time access, ensuring security, and streamlining workflows to minimize operational inefficiencies.
What Is Fine-Grained Access Control? Challenges, Benefits & More
What Is Fine-Grained Access Control? Challenges, Benefits & More
Fine-grained access control systems determine a user’s access rights—to infrastructure, data, or resources, for example—once past initial authentication. Unlike coarse-grained access control (CGAC), which relies on a single factor, such as role, to grant access, FGAC relies on multiple factors. For example, it may consider policies (policy-based access control, or PBAC), attributes (attribute-based access control, or RBAC), or a user’s behavior in a certain context (behavior-based access control, or BBAC).
Implicit Trust vs. Explicit Trust in Access Management
Implicit Trust vs. Explicit Trust in Access Management
Trust is an essential cornerstone in access management. However, not all trust is created equal. When it comes to how you approach access, two types of trust stand out: implicit trust and explicit trust.
Joiners, Movers, and Leavers (JML) Process (How to Secure It)
Joiners, Movers, and Leavers (JML) Process (How to Secure It)
People come, and people go, and while digital identities should cease to exist after a departure, many times, this doesn’t happen. At any given time, organizations can have thousands of user identities to manage and track, so when processes aren’t automated, it’s easy for many identities to fall through the cracks. This phenomenon is called Identity Lifecycle Management, and when it comes to access and security, it’s worth the time to get it right.
Reduce Security Risk with StrongDM Device Trust
Reduce Security Risk with StrongDM Device Trust
We are thrilled to announce a new feature to our StrongDM® Dynamic Access Management (DAM) platform: Device Trust. This feature amplifies your organization's security posture by employing device posture data from endpoint security leaders CrowdStrike or SentinelOne.