CyberArk releases maturity model to securing privileged accounts
CyberArk has released a maturity model to securing privileged accounts, titled "The Three Phases of Securing Privileged Accounts: A Best Practices Guide". This guide will enable organizations to wrap their arms around how to prevent exploitation of this critical security layer by providing a simple, yet effective, framework for applying the best security strategy for any environment.
Privileged accounts are exploited every day, highlighted by the data leaks by NSA systems administrator Edward Snowden and the recent U.S. tax return crime wave, yet smaller-scale attacks occur daily. The cost of doing nothing to protect these accounts is routinely displayed in the stream of reports detailing compromise after compromise affecting businesses across the globe. Correspondingly, security frameworks such as the Council on Cyber Security Top 20 Critical Security Controls and NIST have always maintained the importance of protecting, managing and monitoring privileged accounts, however, there remains much confusion over how to manage this critical security layer.
“The role of privileged access in headline-grabbing security breaches is undeniable and has pushed the management of these accounts to the top of every CISO’s priority list. Yet, few understand how to address the problem beyond compliance mandates. This guide will serve as a starting point for the many organizations left wondering, ‘What are privileged accounts?’ ‘Where do they exist on my organization?’ ‘How do I protect them?’ ‘How do I manage these accounts moving forward?’” said John Worrall, Chief Marketing Officer, CyberArk.
In this new paper, CyberArk simplifies the process of identifying, securing and managing these powerful accounts for organizations, detailing key phases of privileged account security.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.