Cybersecurity leaders across all levels of government are growing increasingly alarmed by the rise of cyber attacks fueled by Artificial Intelligence (AI). Cybercriminals are now incorporating
As a former federal CISO who has spent decades designing and securing enterprise infrastructure, I’ve grown increasingly concerned as organizations continue to rely on legacy Privileged Access Management (PAM) solutions designed for a different era.
These systems, once the gold standard in security, have become dangerous liabilities in today’s modern cloud-native world. Let me explain why your legacy PAM solution isn’t just ineffective — it’s actively putting your organization at risk.
The perimeter-based security fallacy
The fundamental problem with legacy PAM solutions lies in their architectural DNA. These systems were built for an era of clear network boundaries, where a strong perimeter was enough to keep threats at bay. In today’s environment of hybrid clouds, remote work and interconnected systems, this model isn’t just outdated — it poses a significant threat.
We continue to cling to the idea of ‘trusted’ and ‘untrusted’ networks bound by security controls. Keeper facilitates a perimeterless environment by protecting secrets and passwords throughout the lifecycle, wherever they are.
Consider a typical federal legacy PAM deployment: It requires opening numerous firewall ports (443, 80, 8080, 22, 23, 1434) just for basic functionality. Each port represents a potential entry point for attackers, creating “Swiss cheese security” — a perimeter full of necessary holes that can compromise the enterprise.
In contrast, modern solutions like Keeper operate on a zero-trust model, where every access request is authenticated and encrypted at the device level, eliminating the need for permanent firewall openings.
The implementation nightmare
What keeps me up at night isn’t just the architectural weaknesses — it’s the reality of how these systems are used. In my experience, I’ve consistently seen organizations implement only 20-30% of their legacy PAM solution’s capabilities. The reason is simple: these systems are so complex and cumbersome that full implementation becomes practically impossible.
This partial implementation creates a dangerous false sense of security. Organizations believe they’re protected because they have a PAM solution, but they’ve inadvertently created a shadow IT nightmare. When users find the official system too cumbersome, they devise workarounds — storing passwords in unauthorized locations, sharing credentials through unofficial channels and creating unmonitored admin accounts “just to get the job done.”
The cloud-native disconnect
The most critical failure of legacy PAM solutions is their inability to support modern cloud-native operations. These systems were never designed for the dynamic nature of today’s infrastructure, where containers spin up and down in seconds, and infrastructure is defined by code rather than hardware.
Unimplemented features in your legacy PAM solution increase your attack surface and make your enterprise less secure. Capability bloat is a bug, not a feature.
The impact is severe: DevOps teams, faced with PAM solutions that can’t integrate with their CI/CD pipelines or handle dynamic secret injection, often bypass security measures entirely.
Modern solutions address this through API-first designs and native integration with development workflows. For instance, Keeper’s Secrets Manager provides zero-knowledge encryption while seamlessly integrating with CI/CD pipelines. It allows for automatic secret injection and rotation without compromising security or development velocity.
The zero-trust imperative
In today’s threat landscape, the assumption of trust once inside a network perimeter is a luxury we can no longer afford. Legacy PAM solutions, however, continue to operate on this outdated principle. Once users authenticate to the PAM system, they often gain broad access with limited ongoing verification.
Modern security demands a zero-trust approach where every access request is authenticated, authorized and encrypted. This requires implementing record-level encryption, device-level security and continuous validation of security posture. For example, Keeper’s architecture ensures that each stored vault record is individually encrypted using AES-256 Galois/Counter Mode (GCM), with encryption and decryption occurring locally on the device — never in the cloud or on central servers.
The compliance quagmire
The compliance implications of legacy PAM solutions are becoming increasingly problematic. As regulatory requirements evolve to address modern threats, many legacy systems struggle to provide the necessary controls and visibility. Their logging and audit capabilities often miss critical access events, making compliance validation a manual and error-prone process.
Modern PAM solutions address this with comprehensive logging and reporting capabilities that integrate directly with SIEM systems. For instance, Keeper’s advanced reporting and alerting features provide detailed audit trails of all access attempts and changes while maintaining zero-knowledge encryption to ensure data privacy.
Zero-knowledge architecture reimagined
Modern PAM’s core is a zero-knowledge architecture that eliminates traditional vulnerabilities. Keeper’s implementation takes this to the next level with a multi-layered encryption model.
Each vault record is encrypted using a unique 256-bit AES key in Galois/Counter Mode (GCM) generated on the client device. This record-level encryption ensures that even if one record is compromised, other records remain secure. The encryption and decryption process happens entirely on the user’s device — never in the cloud or Keeper’s servers.
Deploying your PAM on-premise means you’re trusting all the layers of infrastructure that you already know are insecure – your network, your hypervisor, your operating systems.
This model extends further for enterprise deployments: record keys in shared folders are wrapped with a 256-bit AES shared folder key, and the record and folder keys are encrypted with another 256-bit AES key called the data key. This creates multiple layers of encryption that must be breached to access any single piece of information, preventing any lateral movement and additional compromises.
Authentication reinvented
Modern PAM requires rethinking how we handle authentication. Keeper’s approach eliminates traditional vulnerabilities through a sophisticated multi-step process:
- Device Verification: Before users can log in, they must pass a device approval and verification step. This prevents enumeration attacks and protects against brute force attempts.
- Zero-Knowledge Single Sign-On (SSO): Keeper maintains zero-knowledge security when integrated with enterprise identity providers, while still allowing seamless SSO authentication. This is achieved through a unique approach: An Elliptic Curve private key is generated and stored locally on each device. The key is stored as a non-exportable CryptoKey in modern browsers, in the Keychain on iOS/macOS devices or encrypted with the Android Keystore on Android devices.
- Multi-Factor Authentication (MFA): Keeper supports many MFA options, including FIDO2 WebAuthn hardware keys, biometrics and Time-Based One-Time Passwords (TOTPs). What’s unique is that MFA is performed after device verification but before master password entry, creating multiple layers of security that must be passed sequentially.
Cloud-native security done right
Rather than retrofitting cloud capabilities onto a legacy architecture, Keeper was built from the ground up for modern environments. The platform utilizes AWS in multiple regions (US, US GovCloud, EU, AU, CA, JP) to host and operate its infrastructure, allowing organizations to maintain data sovereignty while ensuring high availability.
All data at rest is encrypted on the user’s device using AES-256 GCM, and data in transit is protected with TLS 1.3, plus an additional layer of encryption in the payload. This double-encryption approach provides protection even if TLS is somehow compromised.
DevOps integration that truly works
Keeper Secrets Manager provides proper DevOps integration for development teams without compromising security. The implementation includes:
- Zero-Knowledge API Access: Applications retrieve secrets using a 256-bit AES encryption key generated on the client side in GCM mode. Each secret is encrypted individually, with encryption and decryption occurring locally on the device.
- Secure Key Distribution: When secrets need to be shared between users or applications, Keeper uses Elliptic Curve Cryptography to distribute keys securely, ensuring that even the key exchange process maintains zero knowledge.
- Automated Secret Rotation: A unique gateway is installed in the customer’s environment, establishing secure outbound connections to Keeper’s infrastructure. This enables automated password rotation without exposing internal systems.
Real-time breach protection
Modern PAM must actively protect against password compromise. Keeper’s BreachWatch® feature demonstrates how this should work: The system maintains a separate, self-contained architecture on AWS for processing breach detection. Passwords are processed using HMAC_SHA512 hashing with a Hardware Security Module (HSM) using non-exportable keys. When checking for compromised passwords, an HMAC_SHA512 hash is generated on the client device, and a second hash is created server-side via the HSM. This “hash-of-hashes” approach ensures that actual passwords are never exposed during the breach detection process.
Session security reimagined
For remote access scenarios, Keeper Connection Manager reimagines secure session management:
- Zero-Trust Connections: When establishing remote sessions, the vault client communicates with Keeper’s Router infrastructure using WebRTC connections protected by ECDH symmetric keys stored within the relevant Keeper record.
- Secure Tunneling: For port forwarding features, data is transmitted through WebRTC connections to the Keeper Gateway and then forwarded to target endpoints. Each session is protected by an AES-256 encryption key generated on the gateway.
- Session Recording: All session recordings are protected by a unique AES-256 encryption key generated for each session, which is further wrapped by an HKDF-derived AES-256 resource key.
The path forward
The transition to modern PAM isn’t just about adopting new technology — it’s about embracing a fundamentally different approach to security. Organizations must recognize that their legacy PAM solution, far from being a security asset, may actually be a significant liability.
The good news is that solutions like Keeper demonstrate how modern PAM can provide ironclad security with seamless usability. By combining zero-knowledge architecture, device-level encryption and native integration with modern workflows, organizations can achieve true privileged access management without compromising security or user experience.
In today’s threat landscape, the right PAM solution isn’t just about managing privileges — it’s about ensuring your security foundation enables business agility rather than hindering progress. The technology exists; the question is whether organizations will transition before their legacy solutions become their undoing.
Book a demo today to see how KeeperPAM can help secure your environment.