SANS Control 4—”Controlled Use of Administrative Privileges” The Core Principle This core principle can be summed up by the famous Reagan Cold War quote: trust but verify. Transcendent CISOs trust their people with privileged access, but are simultaneously very stringent about authenticating them. This approach is akin to Postel’s Law, which was the core principle […] The post Core Principle #4: Managing Privileged Access appeared first on Ken Kantzer's Blog.