From the course: Cert Prep: ISC2 Certified in Cybersecurity (CC)

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

Account monitoring

Account monitoring

- Security administrators must pay careful attention to the permissions and use of end user accounts to protect against security incidents. Let's take a look at some account monitoring practices that organizations should put in place. The first is inaccurate permissions assigned to accounts that either prevent a user from doing their work or violate the principle of least privilege. These permissions are often the result of privilege creep, a condition that occurs when users switch jobs and gain new permissions but never have their old permissions revoked. To protect against inaccurate permissions, administrators should perform regular user account audits in cooperation with managers from around the organization. During each of these reviews, the administrators should pull a listing of all the permissions assigned to each account and then review that listing with managers to ensure that it's appropriate for each user's role…

Contents