Privileged Access Management For Dummies®, Delinea Special Edition


Managing and Protecting Your Privileged Accounts



Download 2.05 Mb.
View original pdf
Page12/22
Date23.02.2023
Size2.05 Mb.
#60734
1   ...   8   9   10   11   12   13   14   15   ...   22
delinea-ebook-privileged-access-management-for-dummies
Managing and Protecting Your Privileged Accounts
13
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Managing and Protecting
Your Privileged Accounts
T
his chapter helps you answer critical questions that help develop a comprehensive Privileged Access Management PAM) solution tailored to your business needs. Be sure to include important integration considerations so you can develop a holistic security approach to secure and protect privileged accounts.
Critical Questions to Answer
When Getting Started
Like any IT security measure designed to help protect critical information assets, managing and protecting privileged accounts requires both a plan and an ongoing program. You must identify which privileged accounts should be a priority in your organization, as well as ensuring that those who are using these privileged accounts are clear on their acceptable use and responsibilities. Before you can successfully implement a PAM security solution, the planning phase must answer several key questions:

»
How do you define a privileged account for your
organization? Every organization is different, so you need Chapter
3
IN THIS CHAPTER

» Answering critical questions when
getting started

» Developing a comprehensive PAM
security strategy

» Integrating PAM with your other security
and operational functions


14

Privileged Access Management For Dummies,
Delinea Special Edition
These materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
to map out what important business functions rely on data, systems, and access. A useful approach can be to reuse the disaster recovery plan that typically classifies important systems, which need to be recovered first, and then you can identify the privilege accounts for those systems. Classifying privileged accounts at this stage is good practice because this helps identify and prioritize privileged accounts for the business and will make later decisions easier when it comes to applying security controls.
Because privileged accounts play such an important role in running IT, make sure to align your privileged accounts to business risk and operations. Understanding who has privileged account access, and when those accounts are used, helps define your security posture.
When you know when high-risk accounts are in use, IT security managers can tell when and where sensitive information could be exposed. Visibility into how privileged accounts are used helps organizations quickly identify security risks and exposures and make better decisions.

Download 2.05 Mb.

Share with your friends:
1   ...   8   9   10   11   12   13   14   15   ...   22




The database is protected by copyright ©ininet.org 2024
send message

    Main page