© Morey J. Haber and Brad Hibbert 2018Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_21
21. Deployment Considerations
Morey J. Haber1 and Brad Hibbert2
Heathrow, Florida, USA
Carp, Ontario, Canada
Anytime you embark on an enterprise project, the costs, return on investment, risks, benefits, threats, and workflow (to name a few) should be considered. When deploying a PAM solution, the realization that it may impact the entire organization needs to be considered. This means that not only administrators will be effected but also end users that may lose administrative rights from contractors, executives, through temporary employees (although I hope your business never gives a temporary employee ...