O'Reilly logo

Preventing Good People from Doing Bad Things: Implementing Least Privilege by Brian Anderson, John Mutch

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

images

Business Executives, Technologists, and Auditors Need Least Privilege

“Privileged Identity Management (PIM) is part of the overall identity and access management (IAM) family of technologies, which together provide corporations mechanisms to govern the who, what, where, when and why of secure access management and provisioning.”

—Sally Hudson, International Data Corporation

At first glance, one might think that combining least privilege with business executives, IT professionals, and auditors would be impossible given the significant differences in points of view and motivations. Upon closer look, however, this idea makes perfect sense, because ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required