From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Account monitoring
From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Account monitoring
- [Instructor] Security administrators must pay careful attention to the permissions and use of end user accounts to protect against security incidents. Let's take a look at some account monitoring issues that organizations might encounter. The first of these is inaccurate permissions assigned to accounts that either prevent a user from doing their work or violate the principle of least privilege. These permissions are often the result of privilege creep, a condition that occurs when users switch jobs and gain new permissions, but never have their old permissions revoked. To protect against inaccurate permissions, administrators should perform regular user account audits in cooperation with managers from around the organization. During each of these manual reviews, administrators should pull a listing of all of the permissions assigned to each account and then review that listing with managers to ensure that the…
Contents
-
-
-
-
-
-
-
-
-
-
-
Identification, authentication, and authorization3m 34s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Authentication factors4m 29s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Multi-factor authentication2m 35s
-
(Locked)
Something you have4m 24s
-
(Locked)
Understanding account and privilege management3m 8s
-
(Locked)
Account types3m 52s
-
(Locked)
Account policies3m 31s
-
(Locked)
Account monitoring3m 17s
-
(Locked)
Privileged access management2m 31s
-
(Locked)
Provisioning and deprovisioning3m 47s
-
-
-
-
-