© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_23

23. Key Takeaways

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
Privileges as an attack vector represent the lowest-hanging fruit for threat actors in today’s next-generation digital economy. While architecting and securing an environment is still relatively complex, these Top 20 recommendations can help any security professional achieve their goals and minimize risks to the business.
  1. 1.
    Use Standard User Accounts – Enforce that all users have a standard user account. Administrators across all platforms should log in with their standard accounts as normal practice. They should ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.