8 Identity & Access Metrics To Manage Breach Risks

Measurables for improving security posture around access controls.

Another piece of low-hanging fruit, this is a good way to tell if organizations are again leaving the proverbial door wide open.

"This will inform you of all the various attack vectors that an intruder can try to leverage to gain unauthorized access," says Dustin Melancon, senior network engineer for Venyu. "After you are aware of all possible attack vectors, you can begin closing all unnecessary TCP/UDP ports and in effect minimizing your exposed attack surface."

About the Author

Ericka Chickowski, Contributing Writer

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights