Research Library > CA Technologies > Privileged User Governance - A Key to Effective Breach Protection

Privileged User Governance - A Key to Effective Breach Protection

White Paper Published By: CA Technologies
CA Technologies
Published:  Sep 25, 2017
Type:  White Paper
Length:  6 pages

Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.



Tagsintegration, developers, open enterprise, api, business, ca technologies