From Firefighting to Frameworks: Why I Built Smart Access PAM
- Pravin Raghvani MSc
- Jul 29
- 4 min read
Updated: Jul 30
🗨️ Interview Format
This article is based on a candid conversation with ChatGPT, where I shared the real story behind the Smart Access PAM Framework—complete with hard-learned lessons, strategic pivots, and a few superhero metaphors. What follows is an adapted narrative of that journey. A personal journey of Pravin Raghvani Msc - PAM Strategy and PAM Transformation Leader from breach response to building a modern PAM strategy rooted in Zero Trust and NIST CSF 2.0.

⚠️ A Monday Morning That Changed Everything
Many years ago, I was a seasoned Project Manager working on high-profile digital transformation programmes at a large, mature organisation. I was known for turning around failing projects, so being called into an urgent Monday morning meeting wasn’t new.
But this time, it was different.
The organisation had suffered a major cyber breach. As I joined the Cyber Incident Response Team, I quickly realised how serious it was. A web admin account had been compromised.
From there, the attacker launched a sophisticated lateral movement campaign, harvesting credentials and setting up long-term exfiltration paths.
It was an Advanced Persistent Threat (APT)—the kind of scenario that keeps CISOs up at night. And it had gone undetected for longer than anyone was comfortable admitting.
My primary role was to resurrect a stalled Privileged Access Management (PAM) project, but I stayed close to the forensics and response process. What struck me wasn’t just the technical complexity of the attack, but how human, procedural, and organisational the weaknesses were.
And that’s when something clicked.
🧠 From Project Recovery to Strategic Realisation
I’d worked with identity systems before. I knew Active Directory well. But this was different.
I had to immerse myself in:
PAM discovery and inventory
Service account mapping
Business impact and access dependencies
Process and tooling design
Risk analysis (Cyber and Operational Risk)
Stakeholder engagement
That’s when I saw the bigger picture: PAM wasn’t just a tooling problem—it was a risk, behaviour, and business alignment problem.
I formalised my learning by starting the CISSP, and soon after, I was leading multi-year PAM transformations. Some succeeded. Others stalled. And a pattern emerged.
⚙️ Vault and Stall: The PAM Pattern No One Talks About
Fast forward to 2022-2024. I was leading a robust PAM programme:
✅ Good stakeholder support
✅ Skilled team
✅ Solid technology foundation
But still, we hit resistance.
Business teams simply couldn’t work under rigid "Vault and Manage" models. It was slowing them down, affecting application performance, and disrupting workflows. And in an era of digital pressure, resource shortages, and "do more with less", the response was predictable:
Risk Exceptions. Lots of them.
That’s when it hit me:
Risk exceptions aren’t just a compliance issue—they’re a signal. The strategy wasn’t fit for the modern business.
📚 The Zero Trust Awakening
While authoring a PAM Technical Standard (well outside my comfort zone at the time), I dove deep into authorisation models. That’s when I stumbled across the Cloud Security Alliance’s work on Zero Trust.
And then I read Project Zero Trust by George Finney.
That book changed my entire approach (actually, it is a very good read as well, someone should create a Netflix series)
I consumed everything I could on:
Zero Trust from an identity perspective
Access control models beyond the vault
Continuous authorisation
Real-time contextual risk
Cloud-native identity and session design
I revisited all those resistance conversations from earlier, and suddenly they made sense. The issue wasn’t laziness or noncompliance—it was that the model was too rigid for dynamic environments.
The realisation?
Vault and Manage is an access control, not a PAM strategy.
✋ Midlife Break. Strategic Rebuild.
In late 2024, I hit a milestone—I turned 50. I was wrapping up a major programme, and I had worked back-to-back for many years on complex programmes. I promised myself a long break.
I focused on:
Fitness (Push-Pull-Legs-Arms (Progressive Overload), Cardio Day, then Push-Pull-Legs (intensity), if you are wondering) and personal health
Tackling neglected projects at home (three bedroom refreshed, two living rooms....80% done)
Travelling (First time in Cambodia, an amazing country) and reflecting
Reading, researching, and… rebuilding PAM from scratch
Through virtual conferences—particularly from the US Government's Zero Trust mandates—I started to piece together a new structure.
I went back to first principles, grounding everything in:
NIST CSF 2.0
Real-world PAM delivery experience
Change management and organisational design
Business-aligned risk prioritisation
Modern access models
🧱 Introducing the Smart Access PAM Framework
What emerged was a modular, open framework that aligns strategy, control design, maturity, and transformation.
It isn’t a vault configuration playbook. It isn’t another identity matrix.
It’s a practical, structured approach for:
CISOs who don’t have time to rethink PAM while firefighting
Programme Managers looking to build credibility and momentum
Architects seeking to map Zero Trust principles into real-world access control
Security teams tired of fragmented or tool-led PAM implementations
Key design pillars include:
✅ Alignment to NIST CSF 2.0
✅ Modular maturity model
✅ Risk-based prioritisation
✅ Visibility-first thinking
✅ Behavioural and business change as core elements
✅ Technology-agnostic execution
💡 Why This Matters Now
Today, many organisations are realising that their PAM strategies are lagging. They’re still optimising around static vaults, approval workflows, and break-glass processes. Meanwhile:
Cloud and SaaS adoption continues
Developer velocity increases
Third-party risk is growing
Cyber threats are adapting faster than ever
In this world, smart, adaptive, and strategic PAM is no longer optional—it's foundational.
And that’s why I wrote the eBook and released the Smart Access PAM Framework. To give the industry the field manual I wish I had years ago.
🚀 What’s Next?
I’ve made the framework open and accessible. Take what works. Modify what you need.
Whether you're an enterprise CISO, a programme lead, or an independent architect, this is for you.
Because PAM doesn't need to stall.
Risk exceptions don’t need to win.
And security doesn’t need to be the enemy of agility.
Let’s build something better. Thank you for accompanying me on my journey up to now, a journey that is now evolving to tackle modern challenges.
PAM Strategy and PAM Transformation Leader



