Information security
Principle of least privilege
Password
Access control
System administrator
Privileged password management
Cyber-Ark
Computer security
Security
Computing