Vendor Privileged Access Checklist

Without a comprehensive vendor access management solution, it becomes impossible to mitigate the risks of privileged users that are outside the bounds of internal policy enforcement. A vendor privileged access management (VPAM) tool should allow network admins to granularly control the remote access of third-party users in a way that increases efficiency and reduces security threats. Download our checklist to evaluate the most important aspects of a VPAM platform:

  • System/network vendor security policies
  • Password and identity management
  • Monitoring and audit controls
  • Least privileged access controls

Access the checklist

close close