¶¶Òõ¶ÌÊÓƵ

Privileged Access Management (PAM)

Privileged Access Management (PAM) protects, controls, and allows the management of privileged accounts and credentials within UNSW.

Personalise
Photo of a person working on laptop computer

Privileged Access Management (PAM) offers a secure, centralised vault to store sensitive information, such as passwords for non-human privileged access accounts, while ensuring that access to these is granted only to authorised personnel.

The PAMÌýservice is provided via the Delinea application and is the University's strategic platform to secure privileged accounts. With advanced features like access control, auditing, and automated password rotation, PAM enables the University to maintain a strong security posture, reduce the risk of data breaches, and comply with cyber security policies and requirements.

Business Owners

Business Owners of applications/systems can request that their privileged accounts be stored (and managed) in the PAM service. Please place a request to theÌýIT Service CentreÌýand a member of our team will be in touch.Ìý

Business Owners are responsible and accountable for privileged account credentials stored and managed within PAM. They may delegate the role to another to perform in PAM.Ìý

PAM rolesÌý

Four roles within PAM use and/or manage the privileged credentials. Please refer to the PAM User Guide for permissions and responsibilities.

Requesting access to the PAM service

  1. A PAM User Licence is required to access the application (PAM service).
    Requests are made viaÌýÌýfor theÌýApplication: PAM (Delinea) User Licence.Ìý
  2. Access within PAM to specific application credentials.

Please refer to theÌý for detailed instructions.

Troubleshooting

  • Refer to theÌý for detailed instructions in using PAM.
  • Refer to the PAM FAQs for answers to common questions asked.Ìý
  • Otherwise, contact theÌýIT Service CentreÌýfor technical issues or to request your applications' privileged credentials be onboarded to PAM.

Support materials

  • Ìýcontains all information about the PAM service and how the PAM roles can undertake key responsibilities.
  • Ìý(and answers) for all PAM roles.

Note:ÌýThe Cyber ‘PAM Extension’ project has been onboarding new applications to the PAM service (Delinea) as a result:

  • Training is being booked with PAM role holders to enhance their understanding of the PAM service and provide valuable insight into their PAM role. Please review the PAM User Guide before attending. Attendance is optional.
  • A demonstration of PAM is available every Wednesday at 1.30 pm, starting from 11 September. These drop-in Teams sessions run for a half-hour and are open to all PAM role-holders.ÌýÌýon the day.

Reporting cyber incidents

It is important to report any cyber security incidents as quickly as possible so that UNSW IT’s Cyber Security team can address any issues and mitigate risk exposure.

What should I report?

  • Suspecting your computer or account has been compromised.
  • Having evidence on how technology or University data may be vulnerable.
  • Noticing a colleague inappropriately sharing Highly Sensitive or Sensitive data.
  • Losing a University asset containing sensitive information.

Report a cyber security incident by calling the UNSW IT Service Centre on 02 9385 1333 or using the link below.

Cyber security is everyone’s responsibility and by learning a few rules, simple steps, and following guidelines, we can protect ourselves and our University from cyber security threats and keep data safe. Go to Cyber Security Training and AwarenessÌýfor more information.
Ìý