14
Privileged Access Management For Dummies,Delinea Special EditionThese materials are © 2022 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
to map out what important business functions rely on data,
systems, and access. A useful approach can be to reuse the disaster recovery plan that typically classifies important systems, which need to be recovered first, and then you can identify the privilege accounts for those systems. Classifying privileged accounts at this stage is good practice because this helps identify and prioritize privileged accounts for the business and will make later decisions easier when it comes to applying security controls.
Because privileged accounts play such an important role in running IT, make sure to align your privileged accounts to business risk and operations. Understanding who
has privileged account access, and when those accounts are used, helps define your security posture.
When you know when high-risk accounts are in use, IT security managers can tell when and where sensitive information could be exposed. Visibility into how privileged accounts are used helps organizations quickly identify security risks and exposures and make better decisions.
Share with your friends: