© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_20

20. Sample PAM Use Cases

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
A threat actor thrives on the weakness of processes and the inability for an organization to establish best practices or even follow processes. To that end, Privileged Access Management can stymie a threat actor, even if security best practices are being followed. For it to succeed, consider these top three problems almost every organization faces and the use cases to resolve them:
  1. 1.
    Employees and other insiders have unnecessary access: Employees, vendors, and other insiders are often given excessive access ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.