rd
t
efits
its of
structure. Discovery
tform.
entials under
ment
ng process happens
creation or
fter during a routine
dividuals or teams
ntly managing their
ipe for credential
.
d rotation
address every
em, networked
e, application,
s the threat window
cks. Passwords
reused or repeated
and randomised on a scheduled basis,
upon check-in or in response to specific
threat or vulnerability.
Implement privileged
session management
These solutions ensure complete
oversight and accountability over
privileged accounts and credentials.
Privileged session management refers to
the monitoring, recording and control over
privileged sessions.
Bring non-human/
machine credentials under
centralised management
Simply put, this requires deploying a thirdparty
application password management
or secrets management solution that forces
applications and scripts to call (or request)
www.intelligentcio.com