Phone Number +1-202-802-9399 (US)

THANK YOU!

Access Your PAM Policy Template Below

How to Use this Template to Create Your Own PAM Policy

  • Download the template
  • Open the template as a Microsoft Word document.
  • Remove the “About this Template” and “Customizing the Template” instructions and other author comments.
  • Replace the current logo and add your company logo in the upper left corner.
  • Replace “Company X” with the name of your organization throughout the document.
  • Update all of the company-specific contact information.
  • Update the effective date.
  • Revise any policy guideline to meet your organization’s policies.
  • Revise the Violations section to meet your organization’s policies.
  • Rename the document and save your changes.
  • Obtain your management and auditors’ approval of the completed policy.
  • Distribute the policy according to your management guidance.
Privileged Access Management Policy Template Cover

The only enterprise-grade PAM solution available both
in the cloud and on-premise

Discover, Manage, Provision, and Delegate Access To All Privileged Accounts from a Central Dashboard

Protect
Privileged Access

Discover, Vault

Secret Server

Secret Server

  • Secrets Management
  • Privileged Account Discovery
  • Privileged Session Management
Database Access Controller

Database Access
Controller

  • MFA for Database Access

Secure
Sensitive Code

Provision, Decommission

Account Lifecycle Manager

Account Lifecycle
Manager

  • Non-Human Account /
    Access Management
  • Service Account Governance
DevOps Secrets Vault

DevOps Secrets
Vault

  • High Velocity Secrets Management

Control
Cloud Access

Authenticate, Audit

Cloud Access Controller

Cloud Access
Controller

  • IaaS & SaaS Apps
  • Granular Role Based Access Control
Remote Access Controller

Remote Access
Controller

  • Secure Browser Connection
  • Access Control for Remote Workers

Lock Down
Devices

Elevate, Enforce

Privilege Manager

Privilege Manager

  • Endpoint Privilege Elevation
  • Least Privilege Enforcement
  • Application Access Control
Identity Bridge

Identity Bridge

  • UNIX/LINUX User Management

Ready to get started with one of our solutions? Try one free for 30 days. Looking for pricing? Request a quote

What’s New

Forrester Wave PAM 2020 Thumbnail

Privileged Account Incident Response Template

What the SolarWinds Sunburst hack taught us—be prepared! With this free, customizable Cyber Security Incident Response Plan Template, you can help your team lead the fight against an attack.

Learn More

windows discovery tool

Definitive Guide(TM) to Endpoint Privilege Management

Understand the key roles of enterprise privilege management, least privilege, and application control. Get practical insights to build your own effective defense-in-depth endpoint security strategy.

Learn More

Your First Step to Implementing Your Least Privilege Policy

See which IT systems and users have higher privileges than they need with a quick scan of your environment.

Learn More