Many companies are challenged with provisioning access to their information systems and data. Usually, the “hiring” manager is tasked with determining what access a new employee or consultant should have. Logical access is really not their focus; their focus is on operating and growing the business. Since the manager is not sure exactly what is needed, they request to model access after another employee. Does this sound familiar?

A key security principle is “Least Privilege,” which is instrumental in reducing risks associated with unauthorized access and use and minimizing accidental sharing or malicious intent. Least Privilege is the practice of restricting access rights for user accounts to only those resources and data that is absolutely required to perform legitimate activities.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access