Privileged Access Control Support for NISPOM Compliance
This white paper explains how to address the threat of insider attacks through delegating user privileges, documenting segregation of duties, implementing least privilege access controls and audit logs, and establishing centralized operations across heterogeneous Unix/Linux environments.
Includes:
- Sample scripts
- Compliance logs
- Appendices mapping product functionalities to the NISPOM auditor's checklist