skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration


As systems increasingly communicate directly with each other in the cloud, and DevOps comes into its own in the world of containers, the ability to manage privileges takes on a whole new significance.


  • In both corporate data centers and the cloud, east–west traffic (i.e., server-to-server communications) begins to outweigh the north–south variety of server-to-client or server-to-external systems flows. Automated processes are now consuming the accounts that people used to use.

Features and Benefits

  • Describes where privileges are used in cloud environments.
  • Explains why managing privileged access in the container world is even more critical than with VMs.

Key questions answered

  • How is PAM used in VM environments?
  • How will PAM's use differ in containerized environments?

Table of contents

Ovum view

  • Summary
  • PAM started out managing the access rights of humans
  • Now nonhuman privileges emerge
  • PAM can limit privileges for containers and manage secrets
  • Privileged containers are a security risk
  • CyberArk's three-pronged approach to container security
  • Shift left favors the adoption of PAM for containers


  • Further reading
  • Author

Recommended Articles


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316

Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now