CDM Phase II centers on monitoring user privileges, activities

Federal Times: As awareness of insider threats — both malicious and accidental — continues to rise, the identity, credential and access management (ICAM) side of cybersecurity has gained increased focus. As civilian agencies get a more comprehensive view of their security posture under the first phase of the Continuous Diagnostics and Mitigation (CDM) program, Phase II will center on who has access to those systems and monitoring where they go in the network once inside.

Read article