6 super-defenses against super-user attacks

ID management
defenses against super attackes 1

Privileged Identity Management is based on a common link in the chain of almost every advanced threat: obtaining the credentials of an administrator, super-user or even a program with local admin rights. PIM tools lock down those special user credentials. Some PIM systems concentrate on auditing or anomaly detection so that even trusted insiders who have gone turncoat can be caught. Others look at the password aspect of identity management, cycling impossibly long randomized passwords. Some concentrate on Linux environments, while others are Windows-based. Almost all PIM tools embrace the concept of least-privilege, giving users only the level of access and privilege that they need to run a specific command. Read the full review.

To read this article in full or to leave a comment, please click here

Read more: 6 super-defenses against super-user attacks

Story added 9. November 2015, content source with full text you can find at link above.