© Morey J. Haber 2020
M. J. HaberPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-5914-6_23

23. Sample Privileged Access Management Use Cases

Morey J. Haber1 
(1)
Heathrow, FL, USA
 
A threat actor thrives on the weakness of processes and the inability of an organization to establish best practices. Privileged access management can stymie a threat actor, even if other security best practices are not being fully followed. Consider these top three problems almost every organization faces:
  1. 1.

    Employees and Other Insiders Have Unnecessary Access: Employees, vendors, and other insiders are often given excessive access to systems and data—and that access can go unmonitored.

     
  2. 2.

    Credentials Are Shared and Unmanaged: Passwords are created and shared, ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.