Access Granted or Denied: Framework for Effective User Rights Management
22 Minute Watch
Thomas Patterson,
Senior Product Manager, Database Security & Vulnerability Management
Misused privileges can pose a major risk to database security, which is why organizations must properly identify and manage users, roles and privileges.
The best way to establish meaningful controls that track users - or to capture an audit trail for a breach investigation - is to know who has access to what and why/how they have been granted that access. Watch part two of our three-part webinar series on database security to learn more about the important concepts involved with user rights management for your databases, including:
- Audit all user accounts and identify those that may be excessively privileged.
- Review how privileges are created.
- Establish risk mitigation and compensating controls.
Gated & Ungated
Access Granted or Denied: Framework for Effective User Rights Management