How to Use this Template to Create Your Own PAM Policy
- Download the template
- Open the template as a Microsoft Word document.
- Remove the “About this Template” and “Customizing the Template” instructions and other author comments.
- Replace the current logo and add your company logo in the upper left corner.
- Replace “Company X” with the name of your organization throughout the document.
- Update all of the company-specific contact information.
- Update the effective date.
- Revise any policy guideline to meet your organization’s policies.
- Revise the Violations section to meet your organization’s policies.
- Rename the document and save your changes.
- Obtain your management and auditors’ approval of the completed policy.
- Distribute the policy according to your management guidance.

The only enterprise-grade PAM solution available both
in the cloud and on-premise
Discover, Manage, Provision, and Delegate Access To All Privileged Accounts from a Central Dashboard
What’s New
Privileged Account Incident Response Template
What the SolarWinds Sunburst hack taught us—be prepared! With this free, customizable Cyber Security Incident Response Plan Template, you can help your team lead the fight against an attack.
Definitive Guide(TM) to Endpoint Privilege Management
Understand the key roles of enterprise privilege management, least privilege, and application control. Get practical insights to build your own effective defense-in-depth endpoint security strategy.
Your First Step to Implementing Your Least Privilege Policy
See which IT systems and users have higher privileges than they need with a quick scan of your environment.