Misused privileges can pose a major risk to database security, which is why organizations must properly identify and manage users, roles and privileges.
The best way to establish meaningful controls that track users - or to capture an audit trail for a breach investigation - is to know who has access to what and why/how they have been granted that access. Watch part two of our three-part webinar series on database security to learn more about the important concepts involved with user rights management for your databases, including:
Audit all user accounts and identify those that may be excessively privileged.
Review how privileges are created.
Establish risk mitigation and compensating controls.
Gated & Ungated
Access Granted or Denied: Framework for Effective User Rights Management | LevelBlue