Skip to main content

Save or Share this Report

For Security & Risk Professionals

How A Least Privilege Model Can Reduce Dynamic Access Risks

Applying Zero Trust To Address Overprivileged Employee/Entity Access

May 27, 2020


Why Read This Report

Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either from unguarded attacks or lateral movement by malicious actors. Security and risk professionals can use this report to identify the best approaches for granting entitlements and authorizing privileged access to digital resources and thereby minimize the risks of excessive entitlements and potential data breaches.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).


Table of Contents

  • Too Much User Access Leads To Higher Risk Of A Data Breach
  • Five Accelerators Drive The Need For Just-In-Time Access
  • Use These Technologies For A ZTX Approach To Dynamic Access
  • Recommendations

  • Apply A Least Privilege Model To Reduce Access Risk
  • Supplemental Material
  • Related Research Documents

Recommended Research