Experts Exchange connects you with the people and services you need so you can get back to work.
Earn your B.S. in Network Operations and Security and become a network and IT security expert. This WGU degree program curriculum was designed with tech-savvy, self-motivated students in mind – allowing you to use your technical expertise, to address real-world business problems.
Utilise a role based approach when allocating privileges @ Remember to allocate access according to roles or function rather than to users. This is easier to manage in the long run, if you are implementing Role Based Access Control (RBAC) remember that role creep is possible so roles and access need to be reviewed on a periodic basis. I typically recommend once every quarter or at a minimum once every six months. Maintain, review and revise privileges on a regular basis to keep them up to date and effective
Revise access to legacy applications @ Isolate the application and only allow the necessary access to the application, to the users and systems that require access. Administrative access should be limited down to exactly the function that is required. So that domain admin accounts that have been used for years should now be locked away and the password changed so that no-one can abuse that level of privilege.
Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.
Have a better answer? Share it in a comment.
Please enter a first name
Please enter a last name
Must be at least 4 characters long.
Join and Comment
Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.