There is always a risk for inactive accounts to be compromised by unauthorized users who could then gain full control of the device; thereby enabling them to trigger a Does attacks, intercept sensitive information, or disrupt network availability.
Attackers that are able to exploit an inactive account can potentially obtain and maintain undetected access to an application. The IDPS must track periods of user inactivity and disable application accounts after an organizationally defined period of inactivity. Such a process greatly reduces the risk that accounts will be misused, hijacked, or data compromised.
To address the multitude of policy based access requirements, many network administrators choose to integrate the IDPS with enterprise level authentication/access mechanisms that meet or exceed access control policy requirements. Such integration allows the network administrator to off-load those access control functions and focus on core application features and functionality.
|