RSS feed Get our RSS feed

News by Topic

Privileged User Governance - A Key to Effective Breach Protection

CA Technologies

Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.

Tags : integration, developers, open enterprise, api, business, ca technologies
 Email this page
Published:  Sep 25, 2017
Length:  6
Type:  White Paper