Saturday, August 16, 2025

Regularly perform account re-validation and approval.

 The correct answer is A. Regularly perform account re-validation and approval.


Explanation of Privileged Identity Lifecycle Management

Privileged Identity Management (PIM) is a security practice and technology for managing, controlling, and monitoring elevated access to critical systems and data.1 The lifecycle of a privileged identity is a continuous process that includes provisioning, management, and de-provisioning.2 The CISSP curriculum emphasizes the importance of managing the entire lifecycle to minimize risk.

Here's a breakdown of why option A is the most essential element:

  • A. Regularly perform account re-validation and approval: This is a cornerstone of effective PIM. Account re-validation ensures that privileged access remains necessary and appropriate for an individual's current role. Without regular reviews, access can accumulate over time, leading to "privilege creep," where users have more access rights than they need, significantly increasing the organization's attack surface. This practice directly addresses the principle of least privilege.

  • B. Account provisioning based on multi-factor authentication: While essential for securing privileged accounts, multi-factor authentication (MFA) is a control applied during the access phase, not an element of the overall lifecycle management process. The lifecycle management is about the entire journey of the account, from creation to de-provisioning, while MFA is a specific security measure to authenticate a user at a given time.3

  • C. Frequently review performed activities and request justification: This describes an audit or monitoring function, which is a critical part of the PIM process but is not an "essential element of the lifecycle management" itself. It is a post-access activity that helps with accountability and detection of misuse, but it doesn't address the fundamental need for managing the account's existence and rights over its lifespan.

  • D. Account information to be provided by supervisor or line manager: This is a part of the initial provisioning process. While crucial for ensuring accuracy and legitimacy when creating an account, it represents only one small part of the complete lifecycle. The lifecycle is much broader and includes managing the account long after it has been initially set up.4

In essence, A covers the ongoing, cyclical nature of managing privileged access and is the most encompassing and essential practice listed for a complete lifecycle management approach.

No comments:

Post a Comment

RMM named Defined

  Risk Maturity Model (RMM) Levels The Risk Maturity Model is a framework for assessing an organization's capability and maturity in man...