Building a least privilege rule is difficult, especially in a complex organization. This becomes especially difficult with many different user roles and profiles and only sudo at your disposal. It’s complicated when policies provide too much permission or limit an end user’s role, which becomes a frustrating experience.
This whitepaper explores:
- How CyberArk Endpoint Privilege Manager for Linux can help you discover commands in use.
- Why the commands are used.
- Simple ways to create policies based on your users’ activities.