{"id":32049,"date":"2026-04-07T00:23:42","date_gmt":"2026-04-07T00:23:42","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/en\/?p=32049"},"modified":"2026-04-09T22:15:58","modified_gmt":"2026-04-09T22:15:58","slug":"pam-complexity-is-a-security-problem-in-itself","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself","title":{"rendered":"PAM Complexity is a Security Problem in Itself"},"content":{"rendered":"\n<p>I was at the Gartner IAM Summit in London recently, talking to Anna Delaney from ISMG about how privileged access management went from a sensible idea to an industry-wide headache. You can <a href=\"https:\/\/www.bankinfosecurity.com\/pam-complexity-leaving-organizations-exposed-a-31027\">watch the full interview here<\/a>.<\/p>\n\n\n\n<p>PAM started off pretty simple. Certain people in your organization needed elevated rights. They got passwords. Those passwords lived in a secure vault. If you needed access to something, you used the vault.<\/p>\n\n\n\n<p>Then infrastructure got complicated. Cloud computing changed how networks were built and operated, and vendors responded by adding more and more layers of features. Some installation manuals for these platforms run to a thousand pages. At that point, you&#8217;re not relying on your internal IT team anymore. You&#8217;re bringing in consultants. Which is great for the consultants.<\/p>\n\n\n\n<p>So the complexity wasn&#8217;t entirely manufactured. Networks genuinely did get harder to manage. But I&#8217;m not sure the solutions that emerged were always the right ones.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ghost Systems<\/h2>\n\n\n\n<p>One of the more telling signs that something went wrong: it&#8217;s not uncommon to come across companies that bought a PAM platform years ago and never actually deployed it. They got partway through, hit a wall with training or implementation complexity, and quietly moved on. Now they&#8217;re shopping again. It happens quite a lot.<\/p>\n\n\n\n<p>ROI is always difficult to measure in cybersecurity, which makes this worse. If you don&#8217;t get breached, or you don&#8217;t get breached badly, that&#8217;s roughly the return on investment. But it&#8217;s nearly impossible for a CISO to point at a platform and say &#8220;this is why we weren&#8217;t attacked.&#8221; It&#8217;s not like buying manufacturing equipment where output is measurable.<\/p>\n\n\n\n<p>So when a platform is oversold, underdeployed, and full of features nobody switches on, the failure tends to stay quiet. Feature bloat is a real problem in PAM, and most organizations are living with it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-1.png\" alt=\"\" class=\"wp-image-32098\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-1.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-1-300x169.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-1-768x432.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-1-800x450.png 800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Counting the Wrong Things<\/h2>\n\n\n\n<p>When the conversation turned to non-human identities, I gave the same answer I gave in my <a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/non-human-identity-real-threat-or-vendor-gold-rush\">recent piece on the subject<\/a>: don&#8217;t get too carried away by the ratios.<\/p>\n\n\n\n<p>Some estimates put machine identities at 100:1 against human users. Others push that to 2,000:1 or higher. At a certain point the numbers become almost self-defeating. If the ratio genuinely hits thousands to one, talking about &#8220;managing&#8221; those identities starts to sound like counting grains of sand.<\/p>\n\n\n\n<p>More importantly, a lot of what gets bundled into those figures isn&#8217;t new. Service accounts, APIs, connection strings: these have existed for years. The governance gap around them is real, but it&#8217;s accumulated technical debt from organizations that automated their infrastructure and forgot to automate the oversight of that automation. Not a new crisis, just an old one that&#8217;s been rebranded.<\/p>\n\n\n\n<p>Where things do get different is agentic AI.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Part Nobody Has Answered Yet<\/h2>\n\n\n\n<p>Some vendors are responding to the AI agent problem by suggesting we apply existing paradigms: give every agent an identity, add them to your monitoring framework, govern them like any other non-human identity. That works fine for agents your organization knows about and authorized. The real governance gap is shadow AI: end users spinning up their own agents through tools like Claude, or any web app that lets you build and download an agent in a few clicks.<\/p>\n\n\n\n<p>If you ask an organization to assign an identity to every agent a user might casually spin up on their own, the honest answer is: how? I don&#8217;t think it&#8217;s possible with the tools and frameworks we have today, and anyone who claims otherwise is probably selling something. We need a different approach. I don&#8217;t have a complete answer for what that looks like yet, and I think it&#8217;s worth being straight about that.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-2.png\" alt=\"\" class=\"wp-image-32099\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-2.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-2-300x169.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-2-768x432.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/inline-2-800x450.png 800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Where to Start Anyway<\/h2>\n\n\n\n<p>That said, uncertainty about the future isn&#8217;t a reason to wait. My advice is to not panic about the projections, but start building visibility now.<\/p>\n\n\n\n<p>Audit your human privileged users first. That&#8217;s non-negotiable and should already be happening. Then, if you can, inventory the official agents your organization has sanctioned: the automation tools, the in-house AI deployments, the things someone built to help employees process data or run reports. Those are findable and accountable.<\/p>\n\n\n\n<p>For shadow activity, the best starting point is endpoint management. An AI agent, at least for now, doesn&#8217;t usually operate without a human entry point. It starts with a user on a machine. If you&#8217;ve got solid endpoint policies in place, you can catch a lot of unauthorized agent activity before it scales. Some EPM solutions can already block or flag basic agent behavior through existing policy controls, without any specialized new tooling required.<\/p>\n\n\n\n<p>The underlying principle is familiar: know where privilege lives in your organization, whether it&#8217;s at an endpoint, in an authorized agent, or somewhere further inside your stack. Use the IAM frameworks that already work. And keep a close eye on what your users are doing, because the next problem is probably already quietly underway.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here&#8217;s an honest assessment of where things stand.<\/p>\n","protected":false},"author":20,"featured_media":32109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,313,409,67,68],"ppma_author":[559],"class_list":["post-32049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-gartner","tag-iam","tag-pam","tag-privileged-access-management","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here&#039;s an honest assessment of where things stand.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Paul Fisher\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,gartner,iam,pam,privileged access management\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"PAM Complexity is a Security Problem in Itself\" \/>\n\t\t<meta property=\"og:description\" content=\"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here&#039;s an honest assessment of where things stand.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2026-04-07T00:23:42+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-04-09T22:15:58+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"PAM Complexity is a Security Problem in Itself\" \/>\n\t\t<meta name=\"twitter:description\" content=\"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here&#039;s an honest assessment of where things stand.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#blogposting\",\"name\":\"PAM Complexity is a Security Problem in Itself\",\"headline\":\"PAM Complexity is a Security Problem in Itself\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/paul-fisher#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Paul-BLOG-FEATURE-IMAGE-2.png\",\"width\":2500,\"height\":1307},\"datePublished\":\"2026-04-07T00:23:42+00:00\",\"dateModified\":\"2026-04-09T22:15:58+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, Gartner, IAM, PAM, Privileged Access Management, Paul Fisher\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#listItem\",\"name\":\"PAM Complexity is a Security Problem in Itself\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#listItem\",\"position\":3,\"name\":\"PAM Complexity is a Security Problem in Itself\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/paul-fisher#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/paul-fisher\",\"name\":\"Paul Fisher\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself\",\"name\":\"PAM Complexity is a Security Problem in Itself\",\"description\":\"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here's an honest assessment of where things stand.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/paul-fisher#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/paul-fisher#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Paul-BLOG-FEATURE-IMAGE-2.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself\\\/#mainImage\",\"width\":2500,\"height\":1307},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/pam-complexity-is-a-security-problem-in-itself#mainImage\"},\"datePublished\":\"2026-04-07T00:23:42+00:00\",\"dateModified\":\"2026-04-09T22:15:58+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>PAM Complexity is a Security Problem in Itself<\/title>\n\n","aioseo_head_json":{"title":"PAM Complexity is a Security Problem in Itself","description":"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here's an honest assessment of where things stand.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,gartner,iam,pam,privileged access management","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#blogposting","name":"PAM Complexity is a Security Problem in Itself","headline":"PAM Complexity is a Security Problem in Itself","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/paul-fisher#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/Paul-BLOG-FEATURE-IMAGE-2.png","width":2500,"height":1307},"datePublished":"2026-04-07T00:23:42+00:00","dateModified":"2026-04-09T22:15:58+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#webpage"},"articleSection":"Blogs, Cybersecurity, Gartner, IAM, PAM, Privileged Access Management, Paul Fisher"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#listItem","name":"PAM Complexity is a Security Problem in Itself"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#listItem","position":3,"name":"PAM Complexity is a Security Problem in Itself","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/paul-fisher#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/paul-fisher","name":"Paul Fisher"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself","name":"PAM Complexity is a Security Problem in Itself","description":"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here's an honest assessment of where things stand.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/paul-fisher#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/paul-fisher#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/04\/Paul-BLOG-FEATURE-IMAGE-2.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself\/#mainImage","width":2500,"height":1307},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself#mainImage"},"datePublished":"2026-04-07T00:23:42+00:00","dateModified":"2026-04-09T22:15:58+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"PAM Complexity is a Security Problem in Itself","og:description":"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here's an honest assessment of where things stand.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2026-04-07T00:23:42+00:00","article:modified_time":"2026-04-09T22:15:58+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"PAM Complexity is a Security Problem in Itself","twitter:description":"PAM was built to secure privileged access. Somewhere along the way, it became too complex to actually use. Here's an honest assessment of where things stand.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"32049","title":"#post_title","description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-04-09 22:25:45","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2026-04-07 22:37:43","updated":"2026-04-09 22:31:15"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tPAM Complexity is a Security Problem in Itself\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"PAM Complexity is a Security Problem in Itself","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-complexity-is-a-security-problem-in-itself"}],"authors":[{"term_id":559,"user_id":20,"is_guest":0,"slug":"paul-fisher","display_name":"Paul Fisher","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/01\/Paul-w-Background.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2026\/01\/Paul-w-Background.png"},"author_category":"1","user_url":"","last_name":"Fisher","first_name":"Paul","job_title":"Head of Global Strategy","description":"Paul is a leading authority in Privileged Access Management (PAM), renowned for his benchmark-setting market research and ability to translate complex technical concepts into clear business value. A sought-after speaker at major identity and cybersecurity conferences, he also advises organizations on PAM, IAM, and cybersecurity platform implementations while serving as a mentor and thought leader in the evolving field of identity management."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/32049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=32049"}],"version-history":[{"count":4,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/32049\/revisions"}],"predecessor-version":[{"id":32102,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/32049\/revisions\/32102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/32109"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=32049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=32049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=32049"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=32049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}