{"id":22161,"date":"2024-01-04T16:00:00","date_gmt":"2024-01-04T15:00:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=22161"},"modified":"2024-01-02T17:30:37","modified_gmt":"2024-01-02T16:30:37","slug":"securing-privileged-access-approaches-to-a-multifaceted-challenge","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/","title":{"rendered":"Securing privileged access: approaches to a multifaceted challenge"},"content":{"rendered":"\n<p style=\"text-align: justify;\">Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.<\/p>\n<p style=\"text-align: justify;\">A privileged account is a user account that has more privileges than an ordinary user. For example, they can read and modify the security-relevant configuration of a system, perform functions that can affect many users, and so on. As such, these accounts are the favourite of attackers (with 75% of organizations having experienced a breach\u00a0involving privileged access)\u200b and so need the maximum amount of security by a business.<\/p>\n<p style=\"text-align: justify;\">This webinar focused on securing access to IT assets such as servers. However, it is important to understand that secure access is also required in many other elements (such as applications) and that there are many different types of privileged access, making security not a one size fits all solution.<\/p>\n<p style=\"text-align: justify;\">Traditional security approaches used by organizations, including the traditional PASM solution, are not solely enough to secure privileged access from attackers because they do not address the 5 key questions that need answering for strong security, which are:<\/p>\n<ul style=\"text-align: justify;\">\n<li>How to deploy strong authentication?<\/li>\n<li>How to secure built-in\u00a0superadmins?<\/li>\n<li>How to\u00a0control effective permissions?\u200b<\/li>\n<li>How to\u00a0manage a large\u00a0number\u00a0of\u00a0servers?\u200b<\/li>\n<li>How to closely monitor operations?\u200b<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">To address this issue, companies can <em>improve the PASM solution<\/em> to make it more effective at securing privileged access. This is done by:<\/p>\n<ol style=\"text-align: justify;\">\n<li><strong>Automating permissions as much as possible<\/strong>: Servers are numerous and change frequently which is the same for users &#8211; standardizing and automating\u00a0permissions will allow them\u00a0to keep up with the pace.\u200b<\/li>\n<li><strong>Addressing other\u00a0use cases\u00a0beyond interactive administration:<\/strong> this involves considering other needs to avoid users bypassing the PASM.\u200b Such examples include scripts using admin credentials, break-glass, and DevOps \/ machine-to-machine.<\/li>\n<li><strong>Designing your account model with\u00a0least privilege\u00a0in mind\u200b\u200b:<\/strong> For example, designing it so that there is 1 single nominative centralised\u00a0account per user\u200b to simplify management, although this does not propagate lateral propagation. Designing a local generic account would be the most favourable in this instance, although it is the hardest for an organisation to implement and raises the question of who is responsible for the local accounts which makes governance more complex.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\"><strong>Are there any risks to PASM?<\/strong><\/h2>\n<p style=\"text-align: justify;\">There runs the risk at project phase where admins reject the PASM solution because there was insufficient change management to onboard the admins on this solution from the start. To avoid this, onboarding and training admins on the PASM solution from the beginning is critical. Additionally, difficulty to deploy and cost can be a blocker of PASM solutions to organisations. Thus, the simpler the access model, the easier the solution will be to deploy and the less time it will take, meaning costs are reduced. Lastly, an on-premise PASM solution can run the risk of being very heavy and costly in terms of architecture so defining a SaaS solution would be beneficial. Although a thorough security solution, PASM solutions alone may not be the future of security solutions with the emergence of the ZSP strategy\u2026<\/p>\n<p style=\"text-align: justify;\"><strong>Zero-standing privilege (ZSP)<\/strong> is an alternative security strategy that aims to replace persistent accounts and privileges with just-in-time and just-enough cases and can be applied at both the user and server level.<\/p>\n<p style=\"text-align: justify;\"><strong><u>User level:<\/u><\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #503078;\"><strong><em>Zero standing privilege:<\/em><\/strong><\/span> Users are eligible to a pre-approved set\u00a0of privileges, but those\u00a0privileges are\u00a0not activated\u00a0by default.\u200b<\/li>\n<li><span style=\"color: #503078;\"><strong><em>Just enough admin:<\/em><\/strong><\/span> When they need to perform an\u00a0operation, they can activate the\u00a0minimal privileges\u2026\u200b<\/li>\n<li><span style=\"color: #503078;\"><strong><em>Just-in-time:<\/em><\/strong><\/span> \u2026for the required\u00a0period of time;\u00a0privileges are automatically revoked\u00a0then.\u200b<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">ZSP applied at the user level increases the awareness of users, improves the traceability of organisations\u2019 operations, and helps limit the fat-finger risk.<\/p>\n<p style=\"text-align: justify;\"><strong><u>Server level:<\/u><\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li><span style=\"color: #503078;\"><strong><em>Zero standing privilege:<\/em><\/strong><\/span> Accounts\u00a0do not persist on servers,\u00a0or they do not have any permission.<\/li>\n<li><span style=\"color: #503078;\"><strong><em>Just enough admin:<\/em><\/strong> <\/span>When a user needs to access the\u00a0server, an account is created\u00a0on-the-fly\u00a0only on the\u00a0targeted\u00a0server\u2026<\/li>\n<li><span style=\"color: #503078;\"><strong><em>Just-in-time:<\/em><\/strong><\/span> \u2026 only for the\u00a0duration of the\u00a0session.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">ZSP applied at the server level avoids the compromising of an account in the case of a breach, avoids bypassing of PAM tools, and avoids gaps between theoretical and effective solutions.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\"><strong>Is ZSP the future of privileged access management?<\/strong><\/h2>\n<p style=\"text-align: justify;\">ZSP is designed for the future of IT where lots of users have access to lots of changing resources and it enables efficient user of Zero Trust approaches. However, ZSP does not address all use cases (such as machine-to-machine) and it is still immature in its development, meaning solutions are different and field experience is lacking.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">Subsequently, <strong><em>Wavestone\u2019s optimum strategy advice<\/em><\/strong> is to first define your global PAM strategy, followed by a solid PASM solution to effectively secure privileged access to your servers and then considering the introduction of a bit of ZSP in the estate. For example, at the user level for high privileges or for users with occasional needs and at the server level for cloud instances<\/p>\n<p>\u00a0<\/p>\n<p>Webinar accessible here: <a href=\"https:\/\/www.thesasig.com\/calendar\/event\/23-10-11-networks\/\">https:\/\/www.thesasig.com\/calendar\/event\/23-10-11-networks\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows&#8230;<\/p>\n","protected":false},"author":1342,"featured_media":22151,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3272,3977],"tags":[4174],"coauthors":[3118,4332,4333],"class_list":["post-22161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-identity-en","category-focus","tag-pam-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing privileged access: approaches to a multifaceted challenge - RiskInsight<\/title>\n<meta name=\"description\" content=\"Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing privileged access: approaches to a multifaceted challenge - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-04T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien MAHIEU, Aurelia De Maleissye, Alasdair Hatat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien MAHIEU, Aurelia De Maleissye, Alasdair Hatat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\"},\"author\":{\"name\":\"Julien MAHIEU\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/546f05c8bc8c456129c1721bbf8f95c7\"},\"headline\":\"Securing privileged access: approaches to a multifaceted challenge\",\"datePublished\":\"2024-01-04T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\"},\"wordCount\":873,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg\",\"keywords\":[\"PAM\"],\"articleSection\":[\"Digital Identity\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\",\"name\":\"Securing privileged access: approaches to a multifaceted challenge - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg\",\"datePublished\":\"2024-01-04T15:00:00+00:00\",\"description\":\"Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg\",\"width\":2560,\"height\":1506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing privileged access: approaches to a multifaceted challenge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/546f05c8bc8c456129c1721bbf8f95c7\",\"name\":\"Julien MAHIEU\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/julien-mahieu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing privileged access: approaches to a multifaceted challenge - RiskInsight","description":"Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/","og_locale":"en_US","og_type":"article","og_title":"Securing privileged access: approaches to a multifaceted challenge - RiskInsight","og_description":"Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/","og_site_name":"RiskInsight","article_published_time":"2024-01-04T15:00:00+00:00","og_image":[{"width":2560,"height":1506,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg","type":"image\/jpeg"}],"author":"Julien MAHIEU, Aurelia De Maleissye, Alasdair Hatat","twitter_misc":{"Written by":"Julien MAHIEU, Aurelia De Maleissye, Alasdair Hatat","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/"},"author":{"name":"Julien MAHIEU","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/546f05c8bc8c456129c1721bbf8f95c7"},"headline":"Securing privileged access: approaches to a multifaceted challenge","datePublished":"2024-01-04T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/"},"wordCount":873,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg","keywords":["PAM"],"articleSection":["Digital Identity","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/","name":"Securing privileged access: approaches to a multifaceted challenge - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg","datePublished":"2024-01-04T15:00:00+00:00","description":"Securing privileged access through access management is vital because it\u00a0ensures that an organisation\u2019s people are only granted access to what they need to do their jobs, and only for the period for which they need it. Access management also allows security teams to be notified of malicious activities associated with privilege abuse and to subsequently react to remediate risk.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2024\/01\/pexels-araf-khan-16310595-scaled.jpg","width":2560,"height":1506},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2024\/01\/securing-privileged-access-approaches-to-a-multifaceted-challenge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Securing privileged access: approaches to a multifaceted challenge"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/546f05c8bc8c456129c1721bbf8f95c7","name":"Julien MAHIEU","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/julien-mahieu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1342"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=22161"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22161\/revisions"}],"predecessor-version":[{"id":22166,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/22161\/revisions\/22166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/22151"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=22161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=22161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=22161"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=22161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}