Innovative Minds - On Point - One Group  

Access Control

This is the blog for MindPoint Group's Information Security & Privacy (ISP) division. We hope to use this to contribute to and debate ideas among the ISP community.
24
Mar
2014

10 Steps to Successful Privileged Access Management – Part 3

By:

In our last installment in our series on Privileged Access Management (PAM), I’ll address the key points related to governance. Tola and Brandon previously covered planning and implementation. We pick up with Step #9. Governance Audit, Audit, Audit Access controls are only as good as the oversight you have to ensure they’re working properly. Periodic

Read More

07
Mar
2014

10 Steps to Successful Privileged Access Management – Part 2

By:

In the first installment of our series on Privileged Access Management (PAM), Tola walked through the key planning issues that need to be considered. Here I will address the critical success factors that should be taken into account when PAM is actually being implemented. We pick up this section with Step #5. Implementation Account Provisioning

Read More

25
Feb
2014

10 Steps to Successful Privileged Access Management – Part 1

By:

Privileged Access Management (PAM) is a field of growing concern for IT security professionals as the threat posed by trusted insiders is on the rise. When granting privileged access we’re effectively opening the door to our most sensitive infrastructure and data, and the potential for data breaches, espionage, and accidental damage can be tremendous. Privileged access

Read More