Layer7 Privileged Access Management

Expand all | Collapse all

CA PAM Best Practises

Jump to Best Answer
  • 1.  CA PAM Best Practises

    Posted 09-10-2018 07:57 AM

    Hi,

     

    Can I get best practises docs to be followed while implementing fresh CA PAM? Also some list of policies to be configured while implementing new PAM if any.

     

     

     

    Best Regards,

    Shahbaz Shaikh



  • 2.  Re: CA PAM Best Practises
    Best Answer

    Posted 09-10-2018 09:35 AM

    Shahbaz,

     

    For a new implementation of CAPAM, please check in the CAPAM 3.2 documentation at the following areas, but you should read as much as possible of the Deploying and Implementation process from beginning to end:

     

    Deploying - CA Privileged Access Manager - 3.2 - CA Technologies Documentation 

     

    Implementing - CA Privileged Access Manager - 3.2 - CA Technologies Documentation 

     

    For policies, there are a few different types, view here for a list and description.  The Access policy is the most important in setting up CAPAM first, because the Access policy is what connects a user/group to a target device (server).  The other policies are once the users and devices are setup, you can configure recording, password and Access restriction policies.

     

    • Access types (access method applets, TCP/UDP and application services)
    • Access restrictions (command filters, socket filters)
    • Passwords (which involve Devices and resident applications)
    • Recording (graphical or command line)

    Provision Access Policies - CA Privileged Access Manager - 3.2 - CA Technologies Documentation 

     

    I hope this helps.

     

    Anthony