Browse our IT and security resources to find information on topics around managed security, security news, and more.
Access Granted or Denied: Framework for Effective User Rights Management
Misused privileges can pose a major risk to database security, which is why organizations must properly identify and manage users, roles and privileges. The best way to establish meaningful controls that track users - or to capture an audit trail for a breach investigation - is to know who has access to what and why/how they have been granted that access. Watch part two of our three-part webinar series on database security to learn more about the important concepts involved with user rights management for your databases, including:
- Audit all user accounts and identify those that may be excessively privileged.
- Review how privileges are created.
- Establish risk mitigation and compensating controls.