Best Practice Report

How A Least-Privilege Model Can Reduce Dynamic Access Risks

Apply Zero Trust To Address Overprivileged Employee/Entity Access

May 27th, 2020
With contributors:
Merritt Maxim , Elsa Pikulik , Benjamin Corey , Peggy Dostie

Summary

Privileged users often maintain an overabundance of standing access to critical systems and sensitive data. Such access, if excessive or unnecessary, can expose organizations to data leaks either from unguarded attacks or lateral movement by malicious actors. Security and risk (S&R) professionals can use this report to identify the best approaches for granting entitlements and authorizing privileged access to digital resources and thereby minimize the risks of excessive entitlements and potential data breaches.

Want to read the full report?

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.