Servers Are the Primary Target for Insiders and Hackers Alike
“As in previous years, nearly all data were breached from servers... This continues to be a defining characteristic between data-at-risk incidents and those involving actual compromise.”
—Verizon RISK Team with US Secret Service,2010 Data Breach Investigation Report
There is a significant distinction between the data on desktops described in the last chapter and the data on the server. To use another metaphor: if misusing desktop privilege can get you into the bank, then misusing server privilege is the equivalent of carte-blanche access to the bank vault. Indeed, in a secure and ...
Get Preventing Good People from Doing Bad Things: Implementing Least Privilege now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.