The 10 most important to-do's
To finish the book, we wanted to highlight what we believe to be 10 of the most important areas covered within this book. These items are not listed in any priority order, but we feel they should be the focus of attention for your security program.
Implementing identity protection and privileged access
In a world that has shifted outside the walls of the office to an anywhere-at-any-time access model, identities have become a high target of attention and prone to weaknesses. They are a fundamental focus for attackers to gain access to your environment. Because of this, it is critical that your identities have multiple layers of protection and that preventative measures are in place.
Proper identity protection will require implementing account and access management tools and enforcing the principle of least privilege. A user must only be provided access to the specific data, applications, and systems that are necessary for their job role...