As server and application infrastructures move to the cloud, one of the critical challenges for the enterprise IT organizations is to ensure they effectively and securely manage high privilege access to those systems. This requires having full visibility over who has access to what, how to enable and revoke access reliably, enabling access to users regardless of their location or device type, automate rotation of sensitive account passwords, SSH keys and SSL certificates and having mechanisms to monitor and record all user actions. This session presents typical scenarios with real world examples around this challenge and recommends a strategy to build an effective privileged access management program for enterprise IT organizations.
Key Takeaways