Module 3
Embrace the discovery phase: analyse access control lists, role-based reviews, privileged user lists, and IAM tools. Identify and categorize privileged accounts by risk using SIEM tools, syslog's, user reviews, interviews, and surveys.
Introduction to Part 1
Mastering Privileged Access Management Discovery & Assessment Phase
PAM (Privileged Access Management) Discovery and Assessment phase.
How Role-based analysis reviews can help with the PAM discovery phase of your project?
How Reviewing existing privileged user lists can help with the PAM discovery phase of your project?
How Active Directory reviews can help with the PAM discovery phase of your project?
Identity and Access Management (IAM).
Best Practices for Overcoming PAM Discovery & Assessment Challenges.
Quiz
Additional Resources
Introduction.
Mastering Privileged Access Management The Discovery Phase
How SIEM and Syslog Tools Enhance Security
How categorising privileged accounts by risk can help your PAM project?
What Insights from SIEM & syslog tools can help your PAM project?
Utilising Interviews & Surveys of Privileged Users for Effective PAM Program Design
Account Information Needed when designing a PAM program.
Importance of Acquiring Account Information case study.
Asset Information Needed when designing a PAM program.
Application Information Needed when designing a PAM program.
Additional Resources.