Professional Documents
Culture Documents
Benefit of Privileged Threat
Benefit of Privileged Threat
The more privileges and access a user, account, or process amasses, the
greater the potential for abuse, exploit, or error. Implementing privilege
management not only minimizes the potential for a security breach occurring,
it also helps limit the scope of a breach should one occur. Implementing PAM
best practices (removing admin rights, enforcing least privilege, eliminating
default/embedded credentials, etc.) are also an important piece of enterprise
IT systems hardening.