Abstract
A threat actor thrives on the weakness of processes and the inability of an organization to establish best practices or even follow processes. To that end, privileged access management can stymie a threat actor, even if other security best practices are not being fully followed. Consider these top three problems almost every organization faces:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Morey J. Haber
About this chapter
Cite this chapter
Haber, M.J. (2020). Sample Privileged Access Management Use Cases. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5914-6_23
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5914-6_23
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5913-9
Online ISBN: 978-1-4842-5914-6
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books