|Security Control - Risk-based Privileged Access Management|
|Description||Step-up authentication based on risk posture|
|Components and Required Capabilities||
Privileged Access Management
Fraud & Risk
|Best Practice Recommendation||
Where additional identities are required, for certain privileged roles (e.g. DBA), or test accounts, a Privileged Access Management solution should be implemented to ensure the integrity and security of this access.