Skip to content

Latest commit

 

History

History
660 lines (497 loc) · 23.7 KB

File metadata and controls

660 lines (497 loc) · 23.7 KB

PAM Architecture: Multi-Vendor Implementation Guide

Author: Dominic M. Hoang Last Updated: January 19, 2026 Version: 1.0


Executive Summary

This document provides a comprehensive architectural overview of multi-vendor Privileged Access Management (PAM) implementations, comparing HashiCorp Vault, Delinea Secret Server, and CyberArk. Organizations often require a hybrid approach using multiple PAM solutions to meet diverse security, compliance, and operational requirements.

Key Strategic Considerations

  • HashiCorp Vault excels in infrastructure-as-code environments, dynamic secrets generation, and zero-trust architectures. Ideal for cloud-native and DevOps organizations.
  • Delinea Secret Server provides enterprise credential management with advanced discovery, session recording, and compliance features. Best for traditional IT infrastructure and PCI-DSS/SOX compliance.
  • CyberArk (included for comparison) offers the most comprehensive PAM platform with advanced threat analytics and embedded session recording. Premium option for critical infrastructure.

Multi-Vendor Strategy Benefits

  • Risk Mitigation - No single vendor dependency; security through diversity
  • Workload Optimization - Use the best tool for each use case
  • Gradual Migration - Implement hybrid architecture during platform transitions
  • Compliance Flexibility - Match solutions to specific regulatory requirements
  • Operational Resilience - Failover capabilities across multiple platforms

Architecture Diagrams

1. HashiCorp Vault Architecture

graph TB
    subgraph vault_cluster["HashiCorp Vault Cluster"]
        leader[Primary Vault Node]
        follower1[Follower Node 1]
        follower2[Follower Node 2]

        leader -->|Replication| follower1
        leader -->|Replication| follower2
    end

    subgraph auth_methods["Authentication Methods"]
        ldap["LDAP/AD"]
        oidc["OIDC/JWT"]
        approle["AppRole"]
        k8s["Kubernetes"]
        tls["TLS Certificate"]
    end

    subgraph secret_engines["Secret Engines"]
        kv["KV Storage"]
        db["Database Secrets"]
        pki["PKI/CA"]
        transit["Transit Encryption"]
        aws["AWS IAM Roles"]
        ssh["SSH OTP/Certificates"]
    end

    subgraph data_layer["Data Layer"]
        consul["Consul Storage"]
        s3["S3 Storage"]
        dynamodb["DynamoDB"]
    end

    subgraph clients["Client Applications"]
        api["API Requests"]
        cli["CLI Requests"]
        sdk["SDK Integration"]
    end

    auth_methods -->|Authenticate| leader
    leader -->|Issue Tokens| vault_cluster
    leader -->|Route to| secret_engines
    secret_engines -->|Persist| data_layer
    clients -->|Request Secrets| leader
    vault_cluster -->|Return Secrets| clients
Loading

Vault Architecture Key Components:

  • Primary Node - Leader handling write operations, maintains authoritative state
  • Follower Nodes - Read-only replicas providing high availability and load distribution
  • Storage Backend - Persistent data store (Consul, AWS S3, DynamoDB, etc.)
  • Secret Engines - Modular components for different secret types and integrations
  • Auth Methods - Multiple authentication mechanisms (LDAP, OIDC, AppRole, K8s, TLS)
  • Audit Log - Immutable record of all secret access and API operations

2. Delinea Secret Server Architecture

graph TB
    subgraph delinea_cluster["Delinea Secret Server Cluster"]
        web1[Web Server 1]
        web2[Web Server 2]
        engine1["Distributed Engine 1"]
        engine2["Distributed Engine 2"]

        web1 <-->|Sync| web2
        engine1 -->|Report| web1
        engine2 -->|Report| web1
    end

    subgraph discovery["Discovery & Monitoring"]
        discovery_service["Discovery Service"]
        account_monitor["Account Activity Monitor"]
        session_record["Session Recording Manager"]
    end

    subgraph credential_mgmt["Credential Management"]
        secret_store["Secret Database"]
        vault_access["Vault Access Control"]
        rotation["Secret Rotation"]
    end

    subgraph deployment["Deployment Infrastructure"]
        vm1["Windows/Linux VM"]
        vm2["Windows/Linux VM"]
        remote_site["Remote Site Engine"]
    end

    subgraph integrations["Third-Party Integrations"]
        ldap_sync["LDAP/AD Sync"]
        pam_api["REST API"]
        siem["SIEM Integration"]
    end

    web1 -->|Manage| credential_mgmt
    web2 -->|Manage| credential_mgmt
    engine1 -->|Discover| vm1
    engine2 -->|Discover| vm2
    remote_site -->|Manage| vm2
    discovery_service -->|Monitor| credential_mgmt
    session_record -->|Audit| deployment
    integrations -->|Sync/Export| web1
    credential_mgmt -->|Provide Credentials| integrations
Loading

Delinea Secret Server Architecture Key Components:

  • Web Servers - Dual-node cluster for redundancy and load balancing
  • Distributed Engines - Remote agents for discovery, secret rotation, and credential delivery
  • Discovery Service - Automatic detection and cataloging of privileged accounts
  • Session Recording - Real-time recording of remote sessions with playback capabilities
  • Secret Database - Encrypted credential storage with fine-grained access control
  • Audit Trail - Comprehensive logging of all credential access and modifications
  • Account Activity Monitor - Detection of unauthorized account usage and anomalies

3. Hybrid Multi-Vendor Architecture

graph TB
    subgraph tier_0["Tier 0: Identity Provider"]
        oidc_provider["OIDC/SAML Provider"]
        mfa["Multi-Factor Authentication"]
    end

    subgraph tier_1["Tier 1: Primary PAM Layer"]
        vault["HashiCorp Vault Cluster"]
        delinea["Delinea Secret Server"]
        cyberark["CyberArk (PVWA)"]
    end

    subgraph tier_2["Tier 2: Distributed Access"]
        vault_agents["Vault Agents"]
        delinea_engines["Delinea Engines"]
        cyberark_psmgw["PSM Gateway"]
    end

    subgraph tier_3["Tier 3: Target Systems"]
        k8s_cluster["Kubernetes Cluster"]
        vm_fleet["VM Fleet"]
        db_servers["Database Servers"]
        app_servers["Application Servers"]
    end

    subgraph cross_cutting["Cross-Cutting Concerns"]
        audit["Unified Audit Log"]
        monitoring["Centralized Monitoring"]
        secret_sync["Secret Synchronization Engine"]
    end

    oidc_provider -->|Authenticate| tier_1
    mfa -->|Verify| tier_1

    vault -->|Deploy| vault_agents
    delinea -->|Deploy| delinea_engines
    cyberark -->|Deploy| cyberark_psmgw

    vault_agents -->|Inject Secrets| k8s_cluster
    vault_agents -->|Deliver Credentials| app_servers

    delinea_engines -->|Discover/Rotate| vm_fleet
    delinea_engines -->|Rotate Passwords| db_servers

    cyberark_psmgw -->|Proxy Access| vm_fleet
    cyberark_psmgw -->|Record Sessions| vm_fleet

    tier_1 -->|Send Events| audit
    tier_2 -->|Send Events| audit

    vault -->|Sync| secret_sync
    delinea -->|Sync| secret_sync
    cyberark -->|Sync| secret_sync

    secret_sync -->|Update| vault
    secret_sync -->|Update| delinea
    secret_sync -->|Update| cyberark

    tier_1 -->|Monitor Health| monitoring
    tier_2 -->|Monitor Performance| monitoring
Loading

Hybrid Architecture Strategic Advantages:

  • OIDC/SAML Single Sign-On - Unified identity across all PAM solutions
  • Workload-Specific Routing - Vault for cloud-native, Delinea for traditional infrastructure, CyberArk for critical systems
  • Secret Synchronization - Real-time bidirectional sync between platforms during migration
  • Unified Audit Log - Centralized logging for compliance and forensics
  • High Availability - Multiple independent platforms providing redundancy

4. Cross-Platform Data Flow & Migration

graph LR
    subgraph source["Source Platform"]
        vault_export["Vault Secrets Export"]
    end

    subgraph transformation["Transformation Layer"]
        validator["Schema Validator"]
        mapper["Credential Mapper"]
        enricher["Metadata Enricher"]
        encryptor["Encryption Transformer"]
    end

    subgraph migration["Migration Engine"]
        batch_import["Batch Import Service"]
        change_control["Change Control Queue"]
        verify["Verification Engine"]
    end

    subgraph targets["Target Platforms"]
        delinea_import["Delinea Import"]
        cyberark_import["CyberArk Import"]
    end

    subgraph verification_post["Post-Migration Verification"]
        access_test["Access Test"]
        rotation_test["Rotation Test"]
        compliance_audit["Compliance Audit"]
    end

    vault_export -->|Extract| transformation
    transformation -->|Validate| migration
    transformation -->|Enrich Metadata| migration
    transformation -->|Re-encrypt| migration

    migration -->|Queue Changes| change_control
    change_control -->|Approve| batch_import
    batch_import -->|Import| targets

    targets -->|Verify Import| verification_post
    verification_post -->|Pass/Fail Report| migration

    style source fill:#e1f5ff
    style transformation fill:#fff3e0
    style migration fill:#f3e5f5
    style targets fill:#e8f5e9
    style verification_post fill:#fce4ec
Loading

Data Flow Characteristics:

  • Schema Validation - Ensure credential fields match target platform requirements
  • Metadata Enrichment - Add classification, rotation policies, and access rules
  • Encryption Transformation - Re-encrypt using target platform's encryption keys
  • Change Control - Approval workflow prevents unauthorized migrations
  • Verification - Post-migration access testing and compliance validation
  • Rollback Capability - Maintain source platform for rapid rollback if needed

Component Mapping Table

Vault vs Delinea vs CyberArk

Function HashiCorp Vault Delinea Secret Server CyberArk PVWA
Core Secret Storage KV Engine Secret Vault Digital Vault
Authentication Methods AppRole, OIDC, JWT, LDAP, K8s, TLS LDAP/AD, Windows Auth, SAML LDAP/AD, SAML, MFA
Dynamic Secrets Database, AWS IAM, SSH OTP Limited (Rotation only) None (Managed accounts only)
Encryption at Rest Shamir Key Splitting, Transit Engine AES-256 Encryption AES-256 Encryption
Audit Logging Comprehensive audit trail Detailed event logs Immutable audit logs
High Availability Raft consensus, Active-Active Dual web servers + Engines Load-balanced PVWA + PSM
Replication Replication engine (DR, PR) Multi-site capable Limited geographic replication
Discovery Manual configuration Automated discovery engine Application discovery
Session Recording None (AppRole focus) Native session recording Integrated PSM recording
Secret Rotation Custom plugins Built-in rotation templates Requires PSM integration
Infrastructure Requirements Kubernetes, VMs, cloud-native VMs, Windows/Linux servers Windows-heavy infrastructure
API Capability REST API with SDK REST API REST API with SDK
Compliance Focus Zero-trust, DevOps PCI-DSS, SOX, HIPAA FIPS, PCI-DSS, SOX
Pricing Model Open-source (OSS) or Enterprise Subscription-based Subscription + Console licensing
Deployment Time 2-4 weeks (K8s native) 4-8 weeks (infrastructure-heavy) 6-12 weeks (comprehensive integration)

Deployment Comparison

Implementation Timeline & Effort

Aspect HashiCorp Vault Delinea Secret Server CyberArk PVWA
Initial Setup 1-2 weeks 2-3 weeks 3-4 weeks
High Availability Config 1-2 weeks 2-3 weeks 2-4 weeks
Integration Development 1-3 weeks 2-4 weeks 2-6 weeks
Knowledge Transfer 1-2 weeks 2-3 weeks 3-4 weeks
Total Timeline (MVP) 4-8 weeks 8-12 weeks 12-18 weeks
Production Readiness (Full) 8-16 weeks 12-24 weeks 16-32 weeks

Infrastructure Requirements

Component Vault Delinea CyberArk
Primary Cluster Nodes 3 (minimum) 2 (web servers) 2-4 (PVWA)
Distributed Agents Variable 2+ (engines) 2+ (PSM)
Storage Backend 100 GB (minimal) 500 GB - 2 TB 1-4 TB
CPU per Primary 4-8 cores 4-8 cores 8-16 cores
RAM per Primary 8-16 GB 16-32 GB 32-64 GB
Network Bandwidth Low-medium Medium Medium-high
Database Integrated/Consul SQL Server/PostgreSQL Oracle/MSSQL

Cloud Deployment Options

Provider Vault Delinea CyberArk
AWS Native EKS, EC2 support EC2, RDS supported EC2, RDS supported
Azure AKS native, managed service option VM Scale Sets, SQL Managed VM Scale Sets, SQL Managed
GCP GKE native, Cloud Storage Compute Engine Compute Engine
Hybrid/On-Prem Excellent Good Good
Containerization Kubernetes-first VM-first VM-first
Disaster Recovery Automated (DR clusters) Manual failover Manual failover

Cost Comparison

Approximate Annual Pricing Tiers

HashiCorp Vault

  • Community Edition - Free (open-source, limited support)
  • Enterprise - $500-2,000/month (small to mid-market)
  • Enterprise HA - $2,000-5,000/month (large deployments)
  • Cost Drivers - Number of secret engines, replication clusters, support tier

Typical SMB Cost: $6,000-24,000/year Typical Enterprise Cost: $30,000-120,000+/year

Delinea Secret Server

  • Standard - $4,000-6,000/year (25-100 passwords)
  • Professional - $8,000-15,000/year (100-500 passwords)
  • Enterprise - $15,000-40,000+/year (500+ passwords, advanced features)
  • Cost Drivers - Number of secrets, discovery engines, session recording, integrations

Typical SMB Cost: $12,000-30,000/year Typical Enterprise Cost: $50,000-200,000+/year

CyberArk PVWA + PSM

  • Foundation - $30,000-50,000/year (basic)
  • Professional - $50,000-100,000/year (advanced)
  • Enterprise - $100,000-300,000+/year (comprehensive)
  • Cost Drivers - Number of managed accounts, PSM sessions, analytics, professional services

Typical SMB Cost: $40,000-100,000/year Typical Enterprise Cost: $200,000-500,000+/year

Hybrid Multi-Vendor Cost Analysis

Example Organization (500 employees, 1000+ managed secrets):

Scenario Annual Cost Justification
Vault Only $24,000-50,000 Cost-effective for cloud-native infrastructure
Delinea Only $30,000-80,000 Best value for traditional IT
CyberArk Only $100,000-300,000 Premium comprehensive solution
Vault + Delinea $60,000-120,000 Optimal hybrid - cloud + traditional
Vault + Delinea + CyberArk $150,000-400,000 Defense-in-depth for critical infrastructure

Return on Investment (ROI) Considerations

  • Security Incidents Prevented - Average incident cost reduction: 40-60%
  • Compliance Audit Efficiency - Time reduction: 50-70%
  • Operational Efficiency - Secret rotation automation: 30-40 hours/month saved
  • Breach Recovery Time - Reduction: 60-80% faster investigation

When to Use Each Platform

Use HashiCorp Vault When:

  • Organization operates cloud-native infrastructure (Kubernetes, microservices, serverless)
  • Infrastructure-as-code (IaC) is core to operations (Terraform, CloudFormation)
  • Zero-trust security architecture is a priority
  • Dynamic secret generation is required (database, AWS IAM, SSH certificates)
  • DevOps and developer self-service is essential
  • Cost optimization is critical (can use open-source)
  • Multi-cloud strategy is in place (AWS, Azure, GCP consistency)
  • Rapid secrets rotation is needed (hourly, per-deployment)

Perfect Fit Use Cases:

  • Container orchestration secret management
  • Microservices credential injection
  • CI/CD pipeline secret management
  • Terraform state encryption
  • Dynamic database credentials
  • API key rotation and management

Use Delinea Secret Server When:

  • Traditional IT infrastructure is predominant (Windows servers, legacy systems)
  • Automated password discovery is essential (500+ accounts to manage)
  • Session recording and compliance auditing is required (PCI-DSS, SOX, HIPAA)
  • Account lifecycle management is complex (on-boarding, off-boarding automation)
  • Third-party integrations are extensive (domain controller, IT service desk)
  • Operational teams prefer GUI-based management
  • Cost-effectiveness for traditional environments matters
  • Secret rotation requires built-in templates (SQL Server, Active Directory)

Perfect Fit Use Cases:

  • Domain controller credential management
  • Database administrator account management
  • SQL Server/Oracle password rotation
  • Active Directory service account management
  • Unix/Linux system account rotation
  • Compliance-focused credential auditing
  • IT operations center (NOC) access management

Use CyberArk PVWA When:

  • Critical infrastructure requires maximum security (banking, healthcare, utilities)
  • Advanced threat detection and response is necessary
  • Embedded session recording with forensics is required
  • Privileged user behavior analytics needed
  • Industry mandates specific PAM vendor (NERC CIP, FINRA, PCI-DSS strict)
  • Comprehensive endpoint protection is essential
  • Organization has mature IAM and security infrastructure
  • Budget allocation supports premium solution

Perfect Fit Use Cases:

  • Critical infrastructure (SCADA, ICS) access
  • Financial institution privileged access
  • Healthcare system administrative access
  • Government agency compliance-critical access
  • Sensitive research environment access control
  • Highly regulated utility management systems
  • Defense contractor infrastructure security

Hybrid Strategy Recommendations

Scenario 1: Cloud-Native with Legacy Integration

Setup: Vault + Delinea

  • Vault manages microservices, Kubernetes, cloud infrastructure secrets
  • Delinea manages traditional IT, database, Active Directory credentials
  • Integration - API synchronization for overlapping accounts
  • Cost - 40-60% savings vs. CyberArk, covers both environments

Scenario 2: Defense-in-Depth Critical Infrastructure

Setup: Vault + Delinea + CyberArk

  • Vault manages development/non-critical infrastructure secrets
  • Delinea manages standard production credentials
  • CyberArk manages critical infrastructure (PMs, privileged system accounts)
  • Isolation - Each platform operates independently for maximum resilience

Scenario 3: Multi-Cloud with Compliance Requirements

Setup: Vault + Delinea

  • Vault primary for AWS, Azure, GCP consistency
  • Delinea for on-premises and compliance-heavy workloads
  • Migration Path - Delinea to Vault as cloud adoption increases

Scenario 4: Enterprise Transformation

Setup: Existing CyberArk + Vault Addition

  • CyberArk legacy investment protection
  • Vault new cloud-native workloads
  • Gradual Migration - Transition CyberArk-managed workloads to Vault over 18-24 months
  • Coexistence - Both platforms operate during transition period

Implementation Patterns

Pattern 1: Sealed Secret Rotation (Vault)

Application Request -> Vault Agent -> Request Token -> Vault Cluster
                                           -> Validate AppRole
                                           -> Check Policies
                                           -> Generate Secret
                                           <- Return Encrypted Secret
Vault Agent -> Decrypt with local key -> Inject into application

Benefits: Zero-trust, automatic rotation, audit trail Best For: Kubernetes, microservices, containers


Pattern 2: Privileged Session Access (Delinea)

User Request -> Session Rules -> Session Recording -> Target System
             -> Check Authorization
             -> MFA if required
             -> Deliver Credentials
             -> Monitor Session
             <- Log Session Activity
Audit Log -> Compliance Reports

Benefits: Session playback, compliance evidence, threat detection Best For: Database admins, system administrators, contractors


Pattern 3: Critical Infrastructure Isolation (CyberArk)

High-Risk User -> PVWA Authentication -> Privilege Elevation -> PSM Gateway
              -> Behavioral Analysis
              -> Real-time Monitoring
              -> Session Recording
                                    -> Target System
                                    -> Isolated Network
Forensics -> Behavior Analytics -> Alert on Anomalies

Benefits: Maximum isolation, forensics, behavioral analytics Best For: SCADA, ICS, financial systems, healthcare


Security Considerations

Encryption Standards

  • Vault - Transit Engine (AES-256-GCM), TLS 1.2+
  • Delinea - AES-256-CBC, FIPS 140-2 optional
  • CyberArk - AES-256, FIPS 140-2, HSM integration

Authentication & MFA

  • Vault - Native OIDC, JWT, AppRole, no native MFA (delegate to identity provider)
  • Delinea - LDAP, SAML, optional MFA plugins
  • CyberArk - LDAP, SAML, native MFA, adaptive MFA

Audit Requirements

  • Vault - Flexible audit backend (file, syslog, CloudWatch)
  • Delinea - Database audit trails with retention policies
  • CyberArk - Immutable audit logs, advanced forensics

Migration Strategy

Phase 1: Assessment (2-4 weeks)

  • Inventory all privileged credentials
  • Map current access patterns
  • Identify compliance requirements
  • Evaluate target platform fit

Phase 2: Pilot (4-8 weeks)

  • Deploy target platform in lab environment
  • Validate credential format compatibility
  • Test rotation and access patterns
  • Train pilot user group

Phase 3: Production Migration (8-16 weeks)

  • Establish bidirectional sync during transition
  • Migrate in waves by credential type
  • Perform access validation
  • Maintain rollback capability

Phase 4: Optimization (2-4 weeks)

  • Fine-tune policies and automation
  • Implement advanced features
  • Decommission source platform
  • Document operational procedures

Conclusion

The choice between HashiCorp Vault, Delinea Secret Server, and CyberArk depends on organizational infrastructure patterns, compliance requirements, and budget constraints. Many mature organizations benefit from a hybrid multi-vendor approach:

  • Vault for cloud-native and DevOps environments
  • Delinea for traditional IT and automated administration
  • CyberArk for critical infrastructure and maximum security posture

This architecture ensures optimal security coverage, operational efficiency, and strategic flexibility for enterprise privilege management.


References & Additional Resources

HashiCorp Vault Documentation

Delinea Secret Server Documentation

CyberArk PVWA Documentation

Compliance & Standards

Related Architecture Documents

  • See /docs directory for specific implementation guides
  • See /labs directory for hands-on lab exercises
  • See /scripts directory for automation examples

This document is part of the IAM Portfolio project and should be updated as architectural decisions evolve.