• Implement automatic PC session locking.
• Implement login failure lockout.
• Implement strong authentication.
• Limit and monitor user sessions for any given identity.
• Provide users with the time of their last login and teach them to review it and recognize the signs of a compromise.
• Ensure the "principle of least privilege."
• Ensure that obsolete accounts are removed or disabled.
• Control hostile code.
Monday, September 19, 2005
Eight Best Preactices For User Acess Security
Posted by Martin M at 10:12 AM
Subscribe to:
Post Comments (Atom)
0 Comments:
Post a Comment