The Principle of Least Privilege and Authentication, Authorisation and Accountability – A Primer

AAA

Authentication, Authorisation and Accountability (AAA) and The Principle of Least Privilege (PoLP) come together in this primer to give you a basic understanding of the importance of knowing who is accessing your information and how much they can access. Another important idea covered here is what happens when something goes …

What the “Principle of Least Privilege” does for you? (pt. 1)

Principle of Least Privilege

This article follows on from last week’s Why the “Principle of Least Privilege” works and something for free…. If you want the something for free, then you had better read that article first! Let’s start with a simple definition. The Principle of Least Privilege (PoLP) is a fundamental concept in …

“View Document”

Credentials and AAA

Sometimes a cyber-attack is something as easy as adding a button saying “view document” when whale phishing senior people in an organisation. Ongoing Microsoft Azure account hijacking campaign targets executives (bleepingcomputer.com) Your takeaway When was the last time you audited the credentials and associated authorisations of those credentials? If you …

Insider Threat – How would you feel if someone betrayed your trust?

insider threat

What is the Insider Threat? The insider threat is one of the most difficult cyber security issues to deal with as it involves someone you trust betraying that trust behind your back. They betray that trust and exploit the access they have to privileged information or processes. Unfortunately the insider …