A .R.T.I.E.has an evolving need, which was amplified during the incidents. Their complex and dispersed IT environments have thousands of users, applications, and resources to manage. Dell found that the existing Identity and Access Management was limited in its ability to apply expanding IAM protection to applications beyond the core financial and human resource management application.A .R.T.I.E.also did not have many options for protecting their access especially in the cloud.A .R.T.I.E.were also not comfortable exposing their applications for remote access.
Dell recommended adopting robust IAM techniques like mapping out connections between privileged users and admin accounts, and the use multifactor authentication.
The Dell Services team suggest implementing a system that requires individuals to provide a PIN and biometric information to access their device.
Which type of multifactor authentication should be suggested?
The cybersecurity team performed a quantitative risk analysis onA .R.T.I.E.'s IT systems during the risk management process.
What is the focus of a quantitative risk analysis?
During analysis, the Dell Services team found outdated applications and operating systems with missing security patches. To avert potential cyberattacks, Dell recommends application and operating system hardening measures.
Why is security hardening important for A.R.T.I.E .?