10
Privileged Access Management For Dummies,Delinea Special EditionThese materials are © 2022 John Wiley & Sons, Inc. Any dissemination,
distribution, or unauthorized use is strictly prohibited.
Because a compromised privileged account appears to be a legitimate user, it’s very difficult to find the root cause or perform digital forensics when the breach is eventually detected.
While most organizations have an incident response plan in place to handle system breaches, they haven’t evaluated the risk of a privileged account being compromised. Chapter 3 explains the steps you can take to prevent privileged accounts from being compromised and exploited.
Share with your friends: