Intelligent Tech Channels Issue 91 | Page 45

Threat actors begin with low-level employees, hijacking their credentials and moving laterally across an environment. cloud environments. Today’ s major cloud infrastructure platforms can grant a combined total of 40,000 permissions to identities, half of which are considered high risk. Endpoint privilege management is a direct response to this complexity, providing users with just enough access, at just the right time, for just long enough, to remain productive.
Endpoint privilege management reduces the attack surface for endpoints and applications. The least-privilege approach alone has been shown historically to have mitigated 75 % of Microsoft’ s critical vulnerabilities. PEDM also improves operational efficiency, which is good news for IT and security teams who will not be assigned a further mountain of work in the interest of enhanced security.
Rather, they will become beneficiaries of the stricter policies through centralised, policy-based management of privileged access. Endpoint privilege management also relieves organisations of a significant portion of their compliance burden because of its ability to provide detailed audit logs while enforcing the principle of least privilege. Additionally, stricter privilege
INTELLIGENT TECH CHANNELS 45