(EN)About SOLUTIONS : Unified-IAM - SAC
What is System Access Control (SAC)?
System Access Control (SAC) is a core security mechanism that protects servers, operating systems, and network devices by controlling how users connect to and interact with them.
It authenticates every user, monitors all access routes (including remote and console sessions), and enforces fine-grained permission policies to prevent unauthorized actions.
Why is SAC critical for enterprise security?
In modern IT infrastructures, the number of servers and devices is rapidly increasing while environments are becoming decentralized.
SAC extends beyond traditional remote access management — enabling direct console control, command-level restrictions, file/port-based policies, and automatic discovery of all connected assets.
This helps organizations maintain full visibility and prevent lateral movement attacks.
How does PNPSECURE SAC work?
PNPSECURE SAC operates through three key layers of control:
- Access Monitoring and Logging – Records all user sessions including Telnet, SSH, FTP, and direct console access
- Granular Authorization – Applies specific permissions for files, commands, and ports to minimize risk
- Automatic Asset Discovery – Continuously detects new servers or network devices and updates the security map
This multi-layered approach ensures complete protection and traceability across the entire server environment.
What are the key functions of PNPSECURE SAC?
| Function | Description |
|---|---|
| Remote Access Control | Manages user authentication, access logging, and session auditing for all remote protocols (Telnet, FTP, SSH, SFTP). |
| Direct Console Access Control | Monitors and blocks abnormal direct or bypass access to server consoles. |
| Command, File, and Port Control | Enforces granular policies for critical files, ports, and processes. |
| Automatic Asset Discovery | Automatically identifies and updates protected server and network device inventories. |
How does SAC integrate with PNPSECURE Unified-IAM?
PNPSECURE SAC is one of four core components of the Unified-IAM framework — along with DAC (Database Access Control), WAC (Web Access Control), and IM (Identity Management).
Together, they provide a Zero Trust-aligned security architecture, unifying access control across databases, servers, networks, and user accounts with continuous authentication and centralized policy management.
Summary
PNPSECURE SAC secures every server and network pathway —
from remote sessions to direct consoles — providing full visibility, command-level control, and automated asset discovery for Zero Trust system access management.