The correct answer is A. Regularly perform account re-validation and approval.
Explanation of Privileged Identity Lifecycle Management
Privileged Identity Management (PIM) is a security practice and technology for managing, controlling, and monitoring elevated access to critical systems and data.
Here's a breakdown of why option A is the most essential element:
A. Regularly perform account re-validation and approval: This is a cornerstone of effective PIM. Account re-validation ensures that privileged access remains necessary and appropriate for an individual's current role. Without regular reviews, access can accumulate over time, leading to "privilege creep," where users have more access rights than they need, significantly increasing the organization's attack surface. This practice directly addresses the principle of least privilege.
B. Account provisioning based on multi-factor authentication: While essential for securing privileged accounts, multi-factor authentication (MFA) is a control applied during the access phase, not an element of the overall lifecycle management process. The lifecycle management is about the entire journey of the account, from creation to de-provisioning, while MFA is a specific security measure to authenticate a user at a given time.
3 C. Frequently review performed activities and request justification: This describes an audit or monitoring function, which is a critical part of the PIM process but is not an "essential element of the lifecycle management" itself. It is a post-access activity that helps with accountability and detection of misuse, but it doesn't address the fundamental need for managing the account's existence and rights over its lifespan.
D. Account information to be provided by supervisor or line manager: This is a part of the initial provisioning process. While crucial for ensuring accuracy and legitimacy when creating an account, it represents only one small part of the complete lifecycle. The lifecycle is much broader and includes managing the account long after it has been initially set up.
4
In essence, A covers the ongoing, cyclical nature of managing privileged access and is the most encompassing and essential practice listed for a complete lifecycle management approach.
No comments:
Post a Comment