Andy Givens of CyberArk discusses security “at the database level and the operating system level” He says it’s critical that entities look at using privileged access controls throughout the entire “stack” of applications. He also discusses how vendors, consultants and other third parties that have privileged access to an organization’s IT systems can become culprits in breaches and other security incidents; how it is also critical to control access to systems and protect credentials within an applications’ code when software is developed or new app features are pushed out to users.”]
Source: https://www.cuinfosecurity.com/avoiding-privileged-access-pitfalls-a-10493

