Summary
This chapter covered user access controls and management and reviewed some measures you can take to protect your organization from attackers using either physical or technical controls to breach the firm. A major role of the CSO and CISSP is to secure identity access with centralized utilities such as single sign-on so that users can do their jobs. Users enhance security by using strong passwords.
Next, you learned the differences between logical and physical controls and the security frameworks that organizations need to use, whether it be NIST, ISO, or another, to ensure they understand the risks of granting user access. Several devices can be used to identify a user for access to an organization’s systems. When setting up new users, make sure they are provisioned properly and given only superuser or administrator access if required. Otherwise, they should only be given the privileges to do their job. This is called least privilege. Also, make sure that when an...