BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Privileged user access: Managing and monitoring accounts
Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Watch Now
Preventing privilege creep: How to keep access and roles aligned
Privilege creep can result in the abuse of user access and security incidents. Expert Michael Cobb explains how enterprises can keep user roles and privileges aligned. Read Now
Preventing trusted users from misusing their privileges
Users with privileged accounts have the ability to make critical changes to your enterprise system. Find out how to control trusted users and prevent malicious actions. Listen Now
Test your privileged user management knowledge
Test your proficiency in privileged user management. Take this quiz to determine your ability to keep privileged access secure across your organization. Read Now
All companies of varying sizes have privileged users with accounts that give them the ability to critically affect how the company's entire system is running. Privileged access management should be an important ongoing process in every enterprise, as it can prevent user accumulation of privileges, promote the security principle of least privilege and impede the abuse of user credentials. Learn from Michael Cobb, founder of Cobweb Applications, how to keep user roles and privileges aligned and what checks and balances prevent privilege abuse and data breaches.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned about privileged access management. Passing the quiz earns you one CPE credit from (ISC)2.