images

Business Executives, Technologists, and Auditors Need Least Privilege

“Privileged Identity Management (PIM) is part of the overall identity and access management (IAM) family of technologies, which together provide corporations mechanisms to govern the who, what, where, when and why of secure access management and provisioning.”

—Sally Hudson, International Data Corporation

At first glance, one might think that combining least privilege with business executives, IT professionals, and auditors would be impossible given the significant differences in points of view and motivations. Upon closer look, however, this idea makes perfect sense, because ...

Get Preventing Good People from Doing Bad Things: Implementing Least Privilege now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.