Security Control:
Risk-Based Privileged Access Management

Step-up authentication for privileged accounts based on risk posture.

Components and Required Capabilities

Privileged Access Management

  • Must have the ability to identify sensitive applications

Supporting IDSA Members (analyst reference, where available):

Fraud & Risk

  • Must have the ability to send risk status to requesting tool as a defined value (low, moderate, high, extreme)

Supporting IDSA Members (analyst reference, where available):

CASB

  • Must have the ability to return anomaly status

Supporting IDSA Members (analyst reference, where available):

Interaction Diagram

– Click for larger image –