informa
Slideshow

8 Identity & Access Metrics To Manage Breach Risks

Measurables for improving security posture around access controls.
Open TCP/UDP ports per host
Total number of invalid login attempts and account lockouts
Identity context
Volume of abandoned and orphan accounts
Amount of time necessary to revoke access for former employees
Frequency of password changes
Actual devices connected to the network vs. assumed device count
Privileged account metrics
1/8

As 2015 stacks up to be yet another banner year for breaches and attacks against enterprises, one of the most common factors to devastating compromises is the attacker's ability to move laterally through network resources and find ways to escalate privileges or abuse existing access.

Whether it is an insider who takes advantage of an overprivileged account, or a hacker who uses an open port to moves through the network until he or she finds a superuser account using default passwords, many of today's security problems eventually come down to poor access and authentication processes and configurations. Dark Reading recently caught up with a number of security experts about the best metrics for keeping access control in check. Here's what they say.

 
Next slide
Recommended Reading: