Forum Discussion
woettmeier
Jan 19, 2021Copper Contributor
The value of PIM without approvals
It seems that for Privileged Identity Management (PIM) to be effective you would always need to "require approval" for each role. Is there any security benefit to PIM without using this feature? It w...
- Jan 20, 2021Two advantages IMO:
- One access is JIT. Sure an attacker can activate the role, but it's an extra step to make the life of an attacker harder
- Auditing. With PIM you have an audit trail when and why a role was activated
Thijs Lecomte
Jan 20, 2021Bronze Contributor
Two advantages IMO:
- One access is JIT. Sure an attacker can activate the role, but it's an extra step to make the life of an attacker harder
- Auditing. With PIM you have an audit trail when and why a role was activated
- One access is JIT. Sure an attacker can activate the role, but it's an extra step to make the life of an attacker harder
- Auditing. With PIM you have an audit trail when and why a role was activated