
To learn more strategies for protecting your environment, watch my recent webinar "12 Strategies for Getting Your Password Game in Check". view nowAnother critical issue is that organizations commonly rely on many different applications to fulfill a variety of business needs. This is especially true of smaller companies where access management is often distributed across many business units or system owners. This model does not allow for a functional password management program, meaning it's virtually impossible to manage user access, privilege levels, and revocation in an easy manner. The process of securing your privilege accounts relies on a variety of factors, but two of the foremost is ensuring passwords are kept secure and enforcing a least privilege model—meaning employees have only the privileges necessary to perform their roles. Employee job functions and related access should be routinely reviewed to ensure that passwords managed sufficiently and that the privileged access reflects the most current job function. This accomplished easier when there is centralized management of those passwords. I would like to offer you some strategies that can help you sharpen your password game and keep your organization's critical systems safe.
12 Strategies to Protect Your Passwords from Unauthorized Users
- Adopt and implement security policies
- Limit admin access to systems
- Protect privileged account passwords
- Inventory your privileged passwords
- Ensure an individual, and not a generic user, is accountable for the privileged account
- Securely store your privileged passwords
- Adopt a staged approach to deployment
- Change embedded passwords
- Educate key stakeholders
- Provide greater visibility
- Automate management and security of privileged account passwords
- Apply and enforce change management policies to privileged passwords