ITDR: Example Use Cases
Identification of Vulnerable User Profile Data
Identification of
Orphan accounts
Ghost accounts
Accounts with unused permissions
Accounts with excessive permissions
Accounts not enrolled in MFA
Shared accounts
Shadow accounts and permissions
Privileged accounts
Keep reading with a 7-day free trial
Subscribe to IAM Radar - Identity & Access Management Industry Tracker to keep reading this post and get 7 days of free access to the full post archives.