Privileged access management, governance, and audit are the primary use cases for CyberArk Secure Cloud Access. For audit and governance purposes, you want visibility into who accesses what, at what time, and what they do. When deploying CyberArk Secure Cloud Access, you gain this visibility. If you need to audit something that has already happened, CyberArk Secure Cloud Access can help you understand who performed an action. For example, if a database administrator logged into a device or operating system via SSH, CyberArk Secure Cloud Access monitors the person so you know exactly what they did. If there is downtime caused by human error, perhaps a configurational error by a networking administrator, the PAM solution can help you understand that Isaac performed this action at this specific time and that action caused the downtime.
CyberArk Secure Cloud Access also prevents risks because you must go through the platform to access the environment, which limits your risk surface area and reduces risk overall. There are many reasons that organizations deploy CyberArk Secure Cloud Access. Some deploy it because it is part of their policy or standard, others deploy it for risk reduction, and others deploy it because they want to audit what their people are doing and manage their metrics.