Zero standing privileges: What you need to know

Remove Standing Privileges Through a Just-in-Time PAM Approach

Cover

Privileged access carries a significant risk, and even with privileged access management (PAM) tools in place, the risk of users with standing privileges remains high.

Security professionals engaged in identity management may want to implement a zero standing privileges strategy.

Additionally, implementing a just-in-time model guarantees that users will only be granted access at the right time rather than on a standing basis. Read this Gartner article to learn more about why this is critical.

Vendor:
Remediant
Posted:
Aug 17, 2020
Published:
Sep 6, 2019
Format:
HTML
Type:
Resource
Already a Bitpipe member? Login here

Download this Resource!