Security

Security in Devolutions Hub Business combines encryption, access control, and monitoring features to protect shared secrets and connections. The encryption service keeps cryptographic keys outside the main application, IP allowlists restrict which networks can reach the service, and the Security dashboard surfaces issues such as weak passwords and unhealthy vaults.

Operationally, administrators use Audit, Logs, and password-focused reports to monitor usage, while password policies and PAM rotation policies enforce strong, regularly changed credentials. This combination helps teams satisfy compliance requirements by showing that privileged secrets are strongly protected, tightly controlled, and continuously monitored.

Devolutions Forum logo Share your feedback