© Morey J. Haber 2020
M. J. HaberPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-5914-6_25

25. Privileged Account Management Implementation

Morey J. Haber1 
(1)
Heathrow, FL, USA
 
Organizations increasingly recognize that properly securing and controlling privileged credentials ranks as one of the best defenses against attacks from external hackers as well as from malicious insiders. For optimal results, a privileged access management solution should protect identities, accounts, passwords, and keys at all stages of the privileged attack vector kill chain (Chapter 1) by implementing comprehensive layers of control and audit. The overall objectives for your implementation should include the following:
  • Reduce the attack surface by limiting ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.