Skip to main content
DI

Privileged Attack Vectors

Morey J. Haber

Privileged Attack Vectors

Building Effective Privileged Access Management

by Morey J. Haber

4.2/5
Apress
2020
391 pages
ISBN: 978-1484259139

Summary

This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.

Why Read This Book

Privileged accounts are the most targeted assets in any organization. This book provides a thorough understanding of privileged attack vectors and actionable guidance for building an effective PAM program.

Key Takeaways

  • Understanding privileged attack vectors and lateral movement
  • Designing a comprehensive PAM architecture
  • Credential vaulting and rotation strategies
  • Just-in-time and just-enough privilege models
  • Measuring and maturing a PAM program

Who Should Read This

Security professionals responsible for privileged access management and those building PAM programs from the ground up.

Security EngineersPAM AdministratorsCISOs

Frequently Asked Questions

What is "Privileged Attack Vectors" about?

This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.

Who should read "Privileged Attack Vectors"?

Security professionals responsible for privileged access management and those building PAM programs from the ground up.

What are the key takeaways from "Privileged Attack Vectors"?

Key takeaways include: Understanding privileged attack vectors and lateral movement; Designing a comprehensive PAM architecture; Credential vaulting and rotation strategies.

Related Books

Browse all