Access Control

 1.Regulating a subject's ability to interact with an object.

 2.Identity and Access management.

 3.Includes the people,processes and systems that are used to manage access to enterprise resources.

 4.Identity of an entity is verified.

 5.Correct level of access is granted based on asset,services and protected/resources being accessed.


Access control: Privileged User Management

 

 1.Focuses on processes and ongoing requirements to manage the life cycle of user accounts with the highest privileges.

 2.These accounts carry the highest risk and impact.

 3.Should include the ability to:track usage,authenticate successes and failures,authorization times/dates,log successful and failed events,enforce password management and contain sufficient levels of auditing and reporting.

Post a Comment

0 Comments