Privileged credentials left in spreadsheets, sticky notes, or shared password managers are a breach waiting to happen. Credential vaulting is the practice of storing privileged account passwords, API keys, certificates, and other secrets in a purpose-built, encrypted vault that controls who can access them, when, and for how long. Modern vaults go beyond simple storage: they rotate passwords automatically, record sessions, enforce checkout workflows, and provide the audit trail that compliance frameworks demand.
This lesson compares the leading credential vaulting solutions — from enterprise-grade platforms like CyberArk and BeyondTrust to cloud-native options like Azure PIM and open-source alternatives — so you can choose the right tool for your organisation’s size, budget, and maturity level.
Why Vaulting Matters
Without a vault, privileged credentials tend to end up in dangerous places:
- Shared spreadsheets — A single compromised file exposes every admin password in the organisation.
- Browser password managers — Not designed for shared or privileged credentials and lack enterprise audit controls.
- Hard-coded in scripts — Service account passwords embedded in automation scripts are a favourite target for attackers and nearly impossible to rotate without breaking things.
- Sticky notes and notebooks — Physical security failures remain surprisingly common, even in otherwise mature organisations.
- Shared knowledge — “Everyone on the team knows the Domain Admin password” is a phrase that should trigger alarm bells. Shared knowledge means shared risk and zero accountability.
A vault solves these problems by providing a single, secured, audited location for all privileged credentials with controlled access and automatic rotation.
Diagram
Credential Storage Risk Comparison
Matrix comparing storage methods (spreadsheets, browser managers, scripts, vaults) across risk dimensions: encryption, access control, rotation, auditing
Comparing Credential Vaulting Solutions
The market offers a range of options depending on your organisation’s size, budget, and complexity:
Enterprise Solutions
- CyberArk Privilege Cloud / Privileged Access Security — The market leader with the most comprehensive feature set. Offers credential vaulting, automatic password rotation, session recording, JIT checkout workflows, and threat analytics. Best suited for mid-to-large organisations with complex on-premises and cloud environments. Expect significant investment in licensing and implementation resources. CyberArk also provides a free tier called CyberArk Identity Security Platform Shared Services for smaller deployments.
- BeyondTrust Password Safe — A strong enterprise alternative with credential vaulting, session monitoring, and automated rotation. BeyondTrust excels at integrating privileged access management with endpoint privilege management, making it a good choice if you also need to manage local admin rights on workstations.
- Delinea Secret Server — Formerly Thycotic, now merged with Centrify. Offers a user-friendly vault with role-based access, automatic rotation, and session recording. Known for faster deployment times compared to CyberArk. Pricing is generally more accessible for mid-market organisations.
Cloud-Native Solutions
- Azure AD Privileged Identity Management (PIM) — Not a traditional credential vault, but provides JIT role activation for Azure AD and Azure resource roles. Ideal for organisations heavily invested in the Microsoft ecosystem. Available with Azure AD P2 or Microsoft Entra ID Governance licences. Does not vault local admin or service account credentials — you need a separate solution for those.
- AWS Secrets Manager — Vaults and rotates secrets for AWS services (database credentials, API keys). Tightly integrated with AWS IAM. Best for organisations whose infrastructure is primarily on AWS.
- Google Cloud Secret Manager — Similar to AWS Secrets Manager but for the Google Cloud ecosystem. Stores API keys, passwords, and certificates with IAM-based access control.
Open-Source and Lower-Cost Solutions
- HashiCorp Vault (Community Edition) — A powerful, flexible secrets management tool that supports dynamic credential generation, encryption as a service, and multi-cloud environments. The open-source Community Edition is free but requires technical expertise to deploy and maintain. The Enterprise edition adds features like namespaces, replication, and vendor support.
- Microsoft LAPS (Local Administrator Password Solution) — A free tool from Microsoft that automatically rotates local administrator passwords on domain-joined workstations and stores them in Active Directory. LAPS is not a full PAM vault, but it solves the critical problem of shared local admin passwords at zero licensing cost. Windows LAPS (the updated version) stores passwords in Azure AD as well.
- Passbolt — An open-source team password manager with role-based access and audit logging. Suitable for small teams that need a step up from shared spreadsheets but aren’t ready for enterprise PAM.
- Bitwarden (Teams/Enterprise) — While primarily a password manager, the Teams and Enterprise tiers offer shared vaults, role-based access, event logging, and directory integration at a fraction of the cost of dedicated PAM tools.
Diagram
Vaulting Solution Selection Matrix
Decision matrix mapping organisation size and budget against recommended vaulting solutions, from LAPS and Passbolt for small teams to CyberArk for enterprise
Configuring Basic Vaulting for Admin Accounts
Regardless of which tool you choose, the basic vaulting setup follows these steps:
- Inventory your privileged credentials — List every admin account, service account, and shared credential. Include the system it accesses, the current owner, and how the password is currently stored and shared.
- Deploy the vault — Install and configure your chosen solution. For cloud-native tools (Azure PIM, AWS Secrets Manager), this may be as simple as enabling a service. For on-premises tools (CyberArk, Delinea), plan for server infrastructure and connector installation.
- Onboard credentials — Import or manually add each privileged credential to the vault. Assign ownership and define who can check out each credential.
- Enable automatic rotation — Configure the vault to rotate passwords on a schedule (e.g., every 30, 60, or 90 days) and immediately after each checkout. This ensures that even if a credential is intercepted, it has a limited useful lifespan.
- Enforce checkout workflows — Require administrators to check out credentials through the vault rather than knowing passwords directly. For high-risk accounts, enable dual-approval checkout.
- Enable session recording — If your vault supports it, enable session recording for privileged sessions. This provides a complete video-like record of what was done during each admin session.
Diagram
Credential Vaulting Workflow
End-to-end flow showing credential onboarding, checkout request, approval, time-limited usage, automatic check-in, and password rotation
Why This Matters
Credential vaulting is the backbone of any serious PAM programme. Without it, you have no reliable way to control who accesses privileged accounts, no way to ensure passwords are rotated regularly, and no audit trail showing who used which credential and when. For SMEs, the good news is that you don’t need to start with a six-figure CyberArk deployment. Microsoft LAPS is free and solves the local admin password problem immediately. Azure PIM is included in licences many organisations already have. Open-source tools like HashiCorp Vault and Passbolt provide capable vaulting at minimal cost. The important thing is to start — any vault is infinitely better than a shared spreadsheet.
What to Do Now
- Audit how privileged credentials are currently stored and shared in your organisation — identify every spreadsheet, shared document, and “everyone knows the password” situation.
- Deploy Microsoft LAPS (or Windows LAPS) across all domain-joined workstations to eliminate shared local admin passwords — this is free and can be done in a week.
- Evaluate whether your existing Microsoft licences include Azure AD PIM and enable it for cloud admin roles.
- For on-premises service accounts and shared admin credentials, evaluate at least two vaulting solutions based on your budget and team size.
- Onboard your top ten highest-risk privileged credentials to the vault within 60 days.
- Enable automatic password rotation for all vaulted credentials.
Evidence to Collect
- Vault deployment documentation showing configuration and hardening of the vault platform itself.
- Inventory of credentials onboarded to the vault, with ownership and checkout policies.
- Automatic rotation configuration screenshots showing rotation schedules for vaulted credentials.
- Checkout logs showing who accessed which credential, when, and with what justification.
- LAPS deployment evidence showing coverage across domain-joined workstations.
- Session recording samples (redacted as needed) demonstrating privileged session capture capability.
Common Mistakes
- Vaulting only some credentials — If you vault your Domain Admin password but leave service account passwords in a spreadsheet, attackers will target the unvaulted credentials. Aim for complete coverage over time.
- Not rotating passwords after checkout — A credential that is checked out, used, and returned without rotation is still compromised if the session was intercepted. Enable automatic rotation after every checkout.
- Making the vault too hard to use — If the checkout process is so cumbersome that administrators create workarounds (writing down passwords, bypassing the vault), you’ve made things worse, not better. Balance security with usability.
- Forgetting about the vault’s own security — The vault itself becomes a high-value target. Ensure the vault platform is hardened, patched, backed up, and monitored with the same rigour as your domain controllers.
- Ignoring service accounts — Organisations often vault human admin accounts but forget about the dozens of service accounts with privileged access. Service accounts frequently have the oldest, most powerful, and least-rotated passwords in the environment.
Knowledge Check
Question 1 of 4
What is the primary purpose of a credential vault in a PAM programme?
- To make it easier for administrators to share passwords via email
- To store, control access to, rotate, and audit privileged credentials in a secure, centralised location
- To replace multi-factor authentication for admin accounts
- To permanently lock admin accounts so they cannot be used
Reveal Answer
B. A credential vault provides centralised, encrypted storage with controlled access, automatic password rotation, and complete audit logging for all privileged credential usage. It replaces insecure storage methods like spreadsheets and shared knowledge.
Question 2 of 4
What does Microsoft LAPS solve?
- It replaces Azure AD for cloud identity management
- It automatically rotates and uniquely sets local administrator passwords on domain-joined workstations
- It provides session recording for all remote desktop connections
- It encrypts hard drives on all Windows workstations
Reveal Answer
B. LAPS automatically generates unique, random local administrator passwords for each domain-joined workstation and stores them securely in Active Directory (or Azure AD with Windows LAPS). This eliminates the risk of shared local admin passwords across all machines.
Question 3 of 4
Why should credentials be automatically rotated after each checkout from the vault?
- To meet a Microsoft licensing requirement
- To ensure the credential is no longer valid if it was intercepted during the checkout session
- To prevent the vault from running out of storage space
- To force administrators to memorise new passwords regularly
Reveal Answer
B. Post-checkout rotation ensures that even if a credential was captured during the admin session (through keylogging, shoulder surfing, or network interception), the password is changed immediately after use, rendering the captured credential useless.
Question 4 of 4
Which vaulting solution would you recommend for a 50-person company with limited budget and primarily Microsoft cloud infrastructure?
- CyberArk Privilege Cloud — it is the market leader and every organisation should use it
- Microsoft LAPS for local admin passwords plus Azure AD PIM for cloud admin roles — both are included or free with existing Microsoft licences
- Build a custom vault application in-house to save money
- No vaulting is needed for an organisation of this size
Reveal Answer
B. For a small, Microsoft-centric organisation, LAPS (free) solves local admin passwords and Azure AD PIM (included with Azure AD P2) provides JIT access for cloud roles. Together they provide meaningful vaulting and access control at minimal additional cost.
Summary Notes — Vaulting Credentials
Key Takeaways
- Privileged credentials stored in spreadsheets, scripts, or shared knowledge represent critical vulnerabilities that attackers actively exploit.
- Credential vaults provide centralised, encrypted storage with access control, automatic rotation, and complete audit trails.
- Enterprise options (CyberArk, BeyondTrust, Delinea) offer comprehensive features; cloud-native options (Azure PIM, AWS Secrets Manager) integrate tightly with their ecosystems; open-source tools (HashiCorp Vault, Passbolt) provide capable vaulting at lower cost.
- Microsoft LAPS is free and solves the shared local admin password problem immediately — every organisation should deploy it.
- The vault itself becomes a high-value target and must be hardened, monitored, and backed up with the same rigour as domain controllers.
Action Items
- Audit all current privileged credential storage methods and eliminate spreadsheets and shared documents.
- Deploy Microsoft LAPS across all domain-joined workstations within 30 days.
- Enable Azure AD PIM for cloud admin roles if your licencing supports it.
- Evaluate and select a vaulting solution for on-premises service and admin accounts based on your budget and complexity.
- Onboard the top ten highest-risk credentials to the vault within 60 days with automatic rotation enabled.
Compliance Relevance
Credential vaulting directly supports ISO 27001 A.9.2.4 (Management of Secret Authentication Information), NIST CSF PR.AC-1 (Identities and Credentials — managing and protecting authentication credentials), Cyber Essentials requirements for secure password management, PCI DSS Requirement 8.2 (Proper Credential Management — unique IDs, password complexity, rotation), and SOX Section 404 requirements for securing access to financial systems. Auditors will specifically ask how privileged passwords are stored, rotated, and audited.