Many suggest that the biggest vulnerabilities in a network environment are its users. If only there were some way to control those unruly users… Oh, but there is! By implementing a combination of different techniques, you can limit the damage that can be done by users (or attackers in users’ guise). I refer to those techniques as the “Four ‘As’ of Account Management”, as a mnemonic device to help me remember those aspects of user account wrangling.
This article is intended as a brief introduction to the various techniques, and how they interact to improve security in your network environment. In future articles, I will go in more depth about those techniques to give you a better idea of their specific applications and importance.
The Four “A”s of Account Management
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.