DiscoverBeyondCyberRestrict administrative privileges
Restrict administrative privileges

Restrict administrative privileges

Update: 2023-05-09
Share

Description


Restrict administrative privileges


Context

Policies, processes and procedures for managing privileged access to systems should be documented and enforced within organisational workflows. In doing so, privileged access to systems and applications should be requested via a form, service desk ticket or email from users, and require approval from a supervisor or application owner, to maintain a record of all such requests. System owners should also maintain a list of all applications on their system that require privileged access.


Support the show

Beyond Cyber 101 mentorship into cybersecurity and beyond.

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Restrict administrative privileges

Restrict administrative privileges

bruno