Image

Applications, Databases, and Desktop Data Need Least Privilege, Too

“Only 40% of security professionals indicated that existing controls can adequately protect all of their organization's confidential data while the remainder of respondents reported numerous data security gaps.”

—Jon Oltsik, Enterprise Strategy Group

Physical, virtual, and cloud infrastructure exists for only one purpose: to store information assets and run applications that give those assets purpose. Since you've kept reading this far, you are now aware of the implications of unmonitored access to this infrastructure, but what about the core reason for buying, implementing ...

Get Preventing Good People from Doing Bad Things: Implementing Least Privilege now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.