It is likely not a coincidence that Verizon #DBIR chose CIS Controls for mapping safeguards associated with breach patterns. enterprise.verizon.com/resources/repo…@CISecurity demonstrates how the controls map to the all important ATT&CK that is as relevant/actionable to security risk management as anything out there. cisecurity.org/controls/cis-c…
(Image recreated)
Apr 26, 2020 • 7 tweets • 2 min read
#TPRM#IAM#authentication#2FA
Thoughts on a possible quick-win when it comes to reducing potential unauthorized access by third-party personnel that have approved access to your systems (be they on-prem or cloud)
Fact - Most organizations have a valid need to provide access for third-party personnel to their systems for one or the other reason