PromptBase
Upgrade
Close icon
General
Home
Marketplace
Create
Hire
Login
Chat
Sell
Explore

Prompt Details

Model
(claude-4-6-sonnet)
Token size
408
Example input
[e.g. Domain Admin, Service Account, Database Admin, Cloud Root Account, CI/CD Pipeline Account]: Domain Admin [e.g. on-premise Active Directory, AWS, Azure, hybrid, Kubernetes]: On-premise Active Directory [CRITICAL]: Critical
Example output
CASE 01 Domain Admin — On-Premise AD CRITICAL account: Domain Admin environment: On-premise Active Directory Risk Profile Domain Admin accounts represent the highest-value target in any on-premise environment. Full control over all domain objects, GPOs, and trust relationships makes compromise equivalent to total organizational takeover. Pass-the-Hash DCSync Attack Golden Ticket Lateral Movement Top Vulnerabilities Permanent membership in Domain Admins group — no JIT access enforced LIKELIHOOD: HIGH IMPACT: CRITICAL [CRITICAL] No session recording — privileged actions unauditable post-incident LIKELIHOOD: HIGH IMPACT: CRITICAL [CRITICAL] Credentials reused across multiple admin accounts — credential stuffing risk LIKELIHOOD: MEDIUM IMPACT: CRITICAL [CRITICAL] No tiered admin model — DA used for routine administrative tasks LIKELIHOOD: HIGH IMPACT: HIGH Interactive logon to non-privileged workstations — credential exposure risk LIKELIHOOD: MEDIUM IMPACT: HIGH Compliance Gaps NIST 800-53 AC-6, AC-17 likely non-compliant ▲ JIT not implemented CIS Controls Control 5 — Admin privileges gap ▲ No tiered model ISO 27001 A.9.4 — Session audit missing ▲ No session logs Hardening Controls 01 Implement JIT access via CyberArk — DA rights expire after 1 hour 02 Enable PSM session recording for all privileged sessions 03 Enforce MFA on all DA accounts — FIDO2 hardware key required 04 Deploy tiered admin model — Tier 0/1/2 separation 05 Rotate DA credentials every 24h via automated vault rotation Detection & Response 🔴 DCSync replication requests from non-DC sources THRESHOLD: Any occurrence → immediate alert 🟠 DA logon outside PAM vault or approved PAW THRESHOLD: 1 occurrence → P1 incident 🟡 After-hours GPO modifications by DA account THRESHOLD: Any → SOC review within 15 min
🌀 Claude

Pam Privileged Account Risk Analyzer

Add to Cart
Instant accessInstant access
Usage rightsCommercial use
Money-back guaranteeMoney‑back
By purchasing this prompt, you agree to our terms of service
CLAUDE-4-6-SONNET
Tested icon
Guide icon
4 examples icon
Free credits icon
Generate a complete privileged account risk assessment for any account type and environment. Covers risk profiling, vulnerability analysis, compliance gaps, hardening controls, and SIEM detection use cases — ready to present to your CISO or audit team.
...more
Added 3 days ago
Report
Browse Marketplace