- Access must be always granted on ‘need-to-know’ and ‘need-to-do’ basis
- The principle of least privilege, especially in managing a large number of privileged accounts, must be practiced
- Password credentials should be always vaulted, frequently changed, and randomized
- Privilege elevation must be offered just-in-time
- Standing privileges to systems must be minimized
- Conditional Access and Multifactor Authentication must be implemented to enforce Zero Trust Network Access (ZTNA) framework amid rising remote access
- Real-time dashboarding of all privileged activities must be enforced
Integrated access management