1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

6 super-defenses against super-user attacks

Discussion in 'Network World' started by RSS, Nov 9, 2015.

  1. RSS

    RSS New Member Member

    ID management

    Privileged Identity Management is based on a common link in the chain of almost every advanced threat: obtaining the credentials of an administrator, super-user or even a program with local admin rights. PIM tools lock down those special user credentials. Some PIM systems concentrate on auditing or anomaly detection so that even trusted insiders who have gone turncoat can be caught. Others look at the password aspect of identity management, cycling impossibly long randomized passwords. Some concentrate on Linux environments, while others are Windows-based. Almost all PIM tools embrace the concept of least-privilege, giving users only the level of access and privilege that they need to run a specific command. Read the full review.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page