11192122 - Cybersecurity Training Book

Examples of Compensating Controls 1. Privileged Account Management (PAM) System 2. Just-in-Time Access (disabled until requested) 3. Random-generated, complex password assigned at creation 4. Limit the number of connections 5. Limit WHERE the account can authenticate from (ip address) 6. Limit the ability to get an interactive session 7. Limit command line access 8. Limit the ability to change it’s own password 9. Give the process visibility 10. Include IT 11. Secure authentication protocols

Made with FlippingBook - Online catalogs