Platform Security

Delinea Publishes Guide for Server Security

Delinea Publishes Guide for Server Security
Delinea, a leading supplier of PAM solutions for seamless security, released "Conversational Server Access Security" to assist enterprises safeguard hybrid infrastructure against assaults. The free eBook from Conversational Geek illustrates how to use Zero Trust to adhere with Least Privilege and decrease risk.

Cybercriminals target Windows, UNIX, and Linux servers on-premise and in the cloud to exploit vulnerabilities. By attacking servers, fraudsters may access financials, IP, and more, opening the door to system-wide data theft, ransomware, and worse.

Delinea's guide on server access security explains how stacking security measures directly on servers can check that privileged credentials have the proper rights at every access point. Implementing a Zero Trust cybersecurity approach based on the Principle of Least Privilege reinforces this by giving access to server resources only to confirmed identities with the necessary entitlements, when they need them, and for only the time required to perform the job. Then remove those rights so they cannot be exploited.

"The concepts of Zero Trust and least privilege are not new, but many IT and security professionals are unclear about how to apply them in rapidly-changing, more complex hybrid environments. This new resource can help anyone get a better understanding of how to secure access to  on-premises and cloud servers and take actionable steps to avoid becoming the next victim of cybercrime targeting modern infrastructure."

Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea

The eBook's best practices assist cybersecurity professionals in implementing a server access security plan to:

  • Find and remove standing privileges that allow users to connect to servers from anywhere and at any time.
  • At each access control point, verify identities and permissions.
  • Make certain that only authorized users may access or modify resources on each server.
  • Allow users just-enough, just-in-time access and only provide elevated access when necessary.
  • At the server-side, log and record behavior.

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More