Zero standing privileges: What you need to know

Remove Standing Privileges Through a Just-in-Time PAM Approach

Cover

Privileged access carries a significant risk, and even with privileged access management (PAM) tools in place, the risk of users with standing privileges remains high.

Security professionals engaged in identity management may want to implement a zero standing privileges strategy.

Additionally, implementing a just-in-time model guarantees that users will only be granted access at the right time rather than on a standing basis. Read this Gartner article to learn more about why this is critical.

Vendor:
Remediant
Posted:
17 Aug 2020
Published:
06 Sep 2019
Format:
HTML
Length:
1 Page(s)
Type:
Resource
Language:
English
Already a Bitpipe member? Login here

Download this Resource!