Privileged accounts are everywhere in the IT environment. They give IT the building blocks for managing vast networks of hardware and software that power the information- driven world. Yet for most people, they’re invisible.
This chapter gives you the basics of privileged account management (PAM) — understanding privileged accounts, what they do, and why it’s so important to protect access to them as the “keys to the kingdom” of your growing information empires.