For most organizations, privileged access management (PAM) has historically been treated as a security hygiene requirement. Secure the administrator passwords, enforce approval workflows, rotate ...