dcsimg

Root Access Risk Control for the Enterprise

Commodity controls such as sudo are often used to limit root-level access to specific actions on the basis of an individual user's identity -- but when it comes to enterprise requirements for security or compliance, sudo is often incomplete.

Without putting more effective controls on high-privilege access such as Unix or Linux root account, enterprises not only expose the most business-critical IT assets to the most fundamental level of risk, they also expose trustworthy administrators to the consequences of privilege abuse by others. Commodity tools such as sudo often have gaps in the level of control, scalability and support the enterprise realistically needs.

Comments are closed.