| ▲ | esseph 3 days ago | |||||||||||||||||||||||||
You should read over NIST 800-53 AC-2 and AC-6. They go over why privileged accounts are important, why they are used, and how they protect users and organizations. JIT access should be the goal. Scroll down to: Implementation Guidance https://csf.tools/reference/cloud-controls-matrix/v4-0/iam/i... | ||||||||||||||||||||||||||
| ▲ | charcircuit 3 days ago | parent [-] | |||||||||||||||||||||||||
>JIT access should be the goal. Individual privileges for specific things should be given access to instead of giving god access to a system. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||