Calum MacLeod k politikám pro privilegovaná hesla:
- Create an Inventory of Privileged Passwords
- Define the Role of Identity and Access Management (IAM)
- Apply Change Policies to Privileged Passwords
- Make Sure Privileged Passwords are Stored Securely
- Create a Staged Approach to Deployment
- Remember computers are people too