PAM is not a product you buy. It's a programme you run.

Most organisations that struggle with privileged access aren't struggling because they chose the wrong tool. They're struggling because nobody told them what running PAM well actually involves, and what it takes to keep it that way.

The technology is the easy part

PAM tools are mature and broadly available. The challenge has never really been the software.

 

The challenge is what comes after deployment: policies that need refining, accounts that need continuous onboarding, exceptions that accumulate, and reporting expectations that increase. What looked complete at go-live becomes an ongoing programme of refinement.

 

Most organisations underestimate this. Not because they weren't warned, but because the gap between implementation and operation only becomes visible once you're in it.

Person on computer in a server room
Why existing controls aren't enough

IAM, MFA, and endpoint security don't cover this

If you already have identity governance, MFA, and endpoint protection, do you really need a dedicated PAM programme? The wrong answer here is one of the most common reasons privileged access stays uncontrolled.

 

IAM and IGA

What it answers
Should this person have access? Manages entitlements, approvals, and lifecycle.

 

The gap
Doesn’t control what happens when access is used. A user can log into a domain controller with no meaningful audit trail.

MFA

What it answers
Can you prove it’s you? Strengthens authentication and reduces credential-based attacks.

 

The gap
Doesn’t limit what a privileged account can do once authenticated or provide session-level audit evidence.

Endpoint Detection

What it answers
Is something suspicious happening? Detects anomalous behaviour across devices.

 

The gap
Operates after the fact. Doesn’t prevent misuse of legitimate privileged access or provide governance evidence.

PAM

What it answers
How is privileged access controlled, monitored, and constrained in practice?

 

What it closes
Controls and evidences how privileged access is used - across every session, continuously.

IAM and IGA govern entitlements - they ensure access is provisioned, reviewed, and aligned to policy. PAM governs privilege in action. An environment can pass every access recertification exercise while still carrying significant privileged risk. If your audit exposure is in that category, strengthening IAM or endpoint detection won't close it.

How to approach it

The decisions that shape a PAM programme

The organisations that build effective PAM programmes consistently make the same early decisions well. The ones that struggle tend to have skipped one or more of them.

 

Start with definition, not deployment

1) Define what privilege means in your environment

Before any technology decision, define what counts as privileged access - which systems carry higher risk, which roles genuinely require elevation. Without that definition, governance becomes subjective and coverage becomes inconsistent.

 

Prioritise by risk, not by scope

2) Focus first on what matters most

Not all privileged access carries equal impact. Start with domain-level and Tier 0 access, cloud tenant administrators, high-impact shared accounts, and remote administrative pathways. Meaningful risk reduction early, without overwhelming the organisation.

 

Establish ownership before controls

3) Technology cannot compensate for unclear accountability

A PAM programme needs named ownership of privileged roles, defined approval workflows, and scheduled review cycles. When ownership is defined, decisions become consistent. When it isn't, privilege drifts, regardless of the tooling.

 

Treat it as an operating model

4) The most important shift and the most often missed

PAM is not a one-time clean-up exercise. Someone needs to be responsible for keeping it healthy every day, as your environment evolves, your team changes, and new systems are introduced. How you sustain that responsibility determines whether the programme holds its value.

In-house vs managed

An honest look at your delivery options

Once the strategic decisions are made, the practical question becomes: who runs this? Both models are legitimate - the right choice depends on your capacity, risk appetite, and how quickly you need to reach a sustainable operating state.

What day-to-day PAM actually involves

Before choosing a model, it's worth being precise about what sustaining PAM requires. This work is continuous, not occasional, and it's what most organisations underestimate when they plan in-house delivery.

 

Task What it involves
Account onboarding Continuously bringing newly discovered accounts under control, not just those in scope at go-live.
Credential rotation Rotating privileged credentials according to policy, consistently across all environments.
Integration maintenance Keeping PAM connected to infrastructure and applications as the environment changes.
Access requests Approving or rejecting privileged access requests against defined policy and workflow.
Session review Reviewing recorded sessions and audit logs to maintain visibility and governance.
Incident response Responding to alerts and security incidents involving privileged accounts.
Reporting Producing reports that demonstrate control effectiveness to security, audit, and compliance stakeholders.
Break-glass validation Validating and testing emergency access procedures to ensure they work when needed.

 

In most organisations, this workload competes with other urgent priorities and it doesn't stop when other things get busy.

Number 1

PAM in-house

Gives you direct control. Your team makes the operational decisions, builds the internal knowledge, and owns the outcomes.

The challenge is sustaining it. PAM operations (onboarding accounts, rotating credentials, reviewing sessions, producing audit reports) are continuous.

In most organisations that workload competes with other priorities, and knowledge concentrates in a small number of individuals. When they move on, momentum stalls.

Number 2

PAM as a Managed Service

Transfers the operational burden while leaving governance, policy decisions, and accountability with your organisation. You set the direction; a dedicated team handles the daily execution.

The practical difference is consistency. A named PAM Lead and Specialist are responsible for your programme every day, as their primary focus, not one item in a long list. Maturity increases faster because effort is sustained rather than sporadic.

Makes most sense when internal resource is limited, audit pressure is increasing, or a previous in-house attempt has lost momentum.

Signals that your current delivery model needs reviewing

 

Signal What it typically indicates
Account backlog A growing list of accounts waiting to be onboarded - coverage is falling behind the pace of change in your environment.
Audit pressure Evidence is difficult to produce quickly - it's being assembled under pressure rather than continuously available.
Individual reliance Operational knowledge is concentrated in one or two people. When they're unavailable, progress stalls.
Inconsistent reporting Governance cycles vary by team or environment. There's no single, reliable view of privileged access posture.
Paper controls Policies exist but aren't uniformly enforced, controls are documented but not operationally embedded.
Low adoption Technical teams are working around PAM processes. Workarounds are emerging and coverage is inconsistent.
What you're working towards

What a well-run PAM programme actually looks like

A well-run programme isn't one where PAM has been deployed and left to run. It's one where privileged access is continuously understood, controlled, and evidenced, as a normal part of operations, not assembled under pressure when an audit approaches.

100x100 - Purple Tic

Every privileged account is known and under control

Not just accounts in scope at deployment, but those added since, service accounts discovered post-implementation, and identities introduced through cloud adoption or infrastructure change.
100x100 - Purple Tic

Controls are applied consistently

The same standards apply across environments, teams, and identity types. Exceptions are tracked, justified, and time-limited, not quietly accumulated until an auditor finds them.
100x100 - Purple Tic

Access is reviewed and evidence is always ready

Approvals are documented, review cycles run on schedule, and joiners, movers, and leavers are handled cleanly. The evidence isn't assembled when the auditor calls, it exists already, as the programme runs day-to-day.
The starting point

Not sure where your programme stands?

Most organisations don't need to start from scratch. They need a clear picture of where they currently stand: what's working, where the gaps are, and what to address first.

 

The PAM Quick Check provides exactly that. Two hours with our specialists. A written report you keep regardless of what you decide next.

Business experts

Find out where you stand before the auditor asks

Two hours. A defined methodology. A five-page written report covering your current maturity, key observations, and the top risks we identified.