LevelBlue + SentinelOne Partner to Deliver AI-Powered Managed Security Operations and Incident Response. Learn More

22 Minute Watch Thomas Patterson,
Senior Product Manager, Database Security & Vulnerability Management

Misused privileges can pose a major risk to database security, which is why organizations must properly identify and manage users, roles and privileges.

The best way to establish meaningful controls that track users - or to capture an audit trail for a breach investigation - is to know who has access to what and why/how they have been granted that access. Watch part two of our three-part webinar series on database security to learn more about the important concepts involved with user rights management for your databases, including:

  • Audit all user accounts and identify those that may be excessively privileged.
  • Review how privileges are created.
  • Establish risk mitigation and compensating controls.

Related Resources

Current: resourceswebinarsaccess-granted-or-denied-framework-for-effective-user-rights-management
Resource: resourceswebinarshow-we-detected-a-suspected-north-korean-it-worker
Webinar

How We Detected a Suspected North Korean IT Worker

Current: resourceswebinarsaccess-granted-or-denied-framework-for-effective-user-rights-management
Resource: resourceswebinarstracing-a-multi-vector-malware-campaign-from-vbs-to-open-infrastructure
Webinar

Tracing a Multi-Vector Malware Campaign: From VBS to Open Infrastructure

Current: resourceswebinarsaccess-granted-or-denied-framework-for-effective-user-rights-management
Resource: resourceswebinarsepic-fury-decoded-irans-cyber-escalation-playbook
Webinar

Epic Fury Decoded: Iran's Cyber Escalation Playbook