The Privileged Path Framework

Real-world Zero Trust for privileged access

This is not just about Privileged Access Workstations. This is about privileged access as a whole — controlled, isolated, and continuously validated. PAWs are a critical isolation control within a broader framework that most organisations are missing.

Why This Matters

Most organisations think they've secured admin access. They haven't.

Controls without isolation

Many organisations rely on PIM, MFA, and Conditional Access without a cohesive strategy. These are essential controls — but they don't prevent an admin from accessing Tier 0 systems from a compromised device.

Paper compliance, real risk

Admin access is often controlled on paper but not isolated in practice. Policies exist, but admins still work from shared devices, unmanaged endpoints, and flat networks.

Operational shortcuts

Privileged access failures often come from real-world shortcuts — break glass accounts that are never tested, admin exclusions in Conditional Access, and missing operational processes.

The missing layer

Controls are not enough. Isolation matters. Without dedicated admin environments, network segmentation, and boundary enforcement, even strong identity controls leave gaps.

The Privileged Path Framework

Five pillars for securing privileged access — from foundations to continuous validation.

1

Foundation

Identity, governance, and baseline hygiene

2

Control

Just-in-time access, approval workflows, and policy

3

Isolation

PAWs, tiering, network segmentation, and boundary enforcement

4

Operations

Secure admin processes, break glass, and operational discipline

5

Validation

Continuous monitoring, audit, and evidence-based assurance

Learn About the Framework

The Privileged Path

The framework also feeds into a comprehensive book on securing privileged access in Microsoft environments.

Written by Andy Kemp, The Privileged Path provides the full depth of the framework — with step-by-step implementation guidance, configuration examples, decision frameworks, and regulatory mapping.

Free chapter previews are available now as guides on this site.

Work With Andy Kemp Consulting

Need help assessing, designing, or implementing a privileged access strategy? Andy Kemp Consulting provides hands-on advisory and implementation support for organisations serious about securing their most critical access.