Abstract: The global experiences during the COVID-19 pandemic lockdown has suddenly created a huge demand and accelerated the investment at an unprecedented scale toward technologies that support off-premises workplace. The demand for strong remote access management has never been so great, especially for privilege users who need perform administrative operations from home or third-party.
This article will shed light on practical recommendations that will help to enhance the IT change management process in alignment with information protection to prevent unauthorized change activities on information technology infrastructure. The recommendations will help to eliminate business interruption due to unplanned or unauthorized changes activities and will minimize/eliminate the impact in case of a cyber-attack.
Keywords: COVID-19, PAM, IAM, Just-in-time, JIT, Cyber-Attack, IT Change Management, . Information Security, Risk Management.
Title: Prevent Unauthorized Access/Change Activities on Information Technology (IT) during COVID-19 pandemic lockdown
Author: Abdullah M. Al-Shaikh, Khalid A. Al-Khathlan
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals