Most organisations believe their privileged access is under control. Auditors often disagree. This guide sets out the eleven capabilities that define audit-ready PAM, the gaps regulators are now testing for, and how to benchmark your own programme against them.
What Audit-Ready PAM Looks Like
The Target State: What Organisations Should Actually Be Aiming For
What you’ll find in the guide
A diagnostic, a benchmark, and what regulators are now testing for - in three substantive sections, written to be used as a working reference for your next PAM review.
Where most PAM programmes fall short
An eight-point self-assessment of the findings auditors flag most frequently. Strong foundation, targeted exposure, or significant exposure - the guide tells you which band you’re in and what it means.
The eleven capabilities benchmark
Each capability area has a clear operational benchmark reflecting what auditors actually expect to see - not aspirational targets. Use it as a framework to score your current programme.
Why this is urgent: NIS2 & DORA in 2026
Two European regulations are elevating these capabilities from best practice to regulatory expectation. The guide unpacks the specific articles your privileged access programme is now being tested against.
NIS2
Article 21 risk-management measures - access control, MFA, credential management, incident detection. Fines up to €10m or 2% of global turnover.
DORA
Enforceable since January 2025. Periodic access reviews and robust identity controls for ICT systems, with financial penalties at organisational level.
Inside the guide: how DORA supersedes NIS2 on overlapping requirements, and which capabilities answer to which articles.
If you identified three or more gaps, your privileged access programme is unlikely to meet audit expectations today. That is not a criticism, it is the reality for most organisations we assess. But it does mean the distance between where you are and where you need to be is measurable, and closeable.
Built for the people who get the audit findings
Written for security and compliance leadership at mid-to-large enterprises across Europe. Practical, operational, and grounded in hands-on implementation experience.
CISOs & IT Security Directors
Building or replacing a PAM programme, defending the strategy at board level, and benchmarking against what regulators now expect.
IT Operations Leads
Owning PAM implementation work, integrating with SIEM and identity systems, and translating policy into day-to-day controls.
Compliance Officers
Preparing for NIS2 and DORA examinations, mapping privileged access controls to regulatory articles, and producing audit-grade evidence.
Organisations across Europe trust Intragen to protect their most critical privileged access infrastructure.
Of our delivery team holds current CyberArk certifications - we’re a specialist identity security company, part of the Nomios Group.
Get The Rest Of The Guide
The full eleven-capability benchmark and three-phase roadmap, in one PDF.