Â鶹Éçmadou

Privileged Access Management (PAM)

Privileged Access Management (PAM) protects, controls, and allows the management of privileged accounts and credentials within Â鶹Éçmadou.

Personalise
Photo of a person working on laptop computer

Cyber Security provides a Privileged Access Management (PAM) service, which securely centralises the storage of sensitive information, such as passwords for non-human privileged access accounts. This service ensures that only authorised personnel can access this critical data.

The PAM Service

The PAMÌýservice (a Delinea application) is the University's strategic platform to secure privileged accounts. With advanced features like access control, auditing, and automated password rotation, PAM enables the University to maintain a strong security posture, reduce the risk of data breaches, and comply with cyber security policies and requirements.

PAM Governance

Four roles exist within the PAM service to manage and/or use the privileged credentials.Ìý Refer to the PAM User Guide support material for role permissions and responsibilities.

PAM requests

  • Business Owners of applications/system can request that their privileged accounts be stored (and managed) in the PAM service. Business Owners are responsible and accountable for privileged account credentials stored and managed within PAM. They may delegate the role to another to perform in PAM.

    Please place a request to the IT Service Centre and a member of the Cyber Security team will be in touch to progress your request.Ìý

  • Once your privileged accounts have been stored in PAM, you can request a PAM User Licence.

    Requests are made via theÌýÌýportal for the available package: Application: PAM (Delinea) User Licence. Refer to the PAM User Guide support material for detailed instructions.

  • Once you have been allocated a PAM User Licence, your access to credentials would have been determined by the designated Account Owner in PAM. Please reach out to the Account Owner to discuss any further PAM access requirements.

    If you are unsure who the Account Owner is, please discuss your requirement with your Â鶹Éçmadou line manager in the first instance.Ìý

Accessing PAM

The PAM service is accessed via the portal. Search for 'PAM'.

Access is limited to those who have been provisioned a PAM User Licence and access within PAM.

Support materials

  • The contains all information about the PAM service, functions and roles. It also provides a step-by-step guide to using PAM.
  • Refer to the to hear answers to common questions facing PAM role holders and users.Ìý

For technical issues refer to the IT Service Centre.

Reporting cyber incidents

It is important to report any cyber security incidents as quickly as possible so that the Â鶹Éçmadou IT Cyber Security team can address any issues and mitigate risk exposure.

Incidents that staff and students should report

  • Suspecting your computer or account has been compromised.
  • Having evidence on how technology or University data may be vulnerable.
  • Noticing a colleague inappropriately sharing Highly Sensitive or Sensitive data.
  • Losing a University asset containing sensitive information.
Contact theÌýIT Service CentreÌýfor urgent matters or use the button above to report an incident.

Cyber security is everyone’s responsibility and by learning aÌýfew rules, simple steps, and following guidelines, we can protect our University from cyber security threats and keep data safe.

"Enhancing cyber security, including protecting information and privacy, is of paramount importance to our core functions of education and research. We all play a part in being cyber smart."Ìý

Professor Attila Brungs, Vice-Chancellor and President, Â鶹Éçmadou Sydney