Image

Applications, Databases, and Desktop Data Need Least Privilege, Too

“Only 40% of security professionals indicated that existing controls can adequately protect all of their organization's confidential data while the remainder of respondents reported numerous data security gaps.”

—Jon Oltsik, Enterprise Strategy Group

Physical, virtual, and cloud infrastructure exists for only one purpose: to store information assets and run applications that give those assets purpose. Since you've kept reading this far, you are now aware of the implications of unmonitored access to this infrastructure, but what about the core reason for buying, implementing ...

Get Preventing Good People from Doing Bad Things: Implementing Least Privilege now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.