Your browser does not allow storing cookies. We recommend enabling them.

User Account

What Is a User Account?

A user account is an identity created for a person in a computer or computing system. User accounts can also be created for machine entities, such as [service accounts](/iam/user/service-account() for running programs, system accounts for storing system files and processes, and root and administrator accounts for system administration.

A privileged account is a user account that has more privileges than a normal user account. Examples include database accounts, service accounts, root accounts, administrator accounts, and system accounts.

Interactive Account - a Standard User Account

The normal user account for a person is also called an interactive account or a standard user account. Such users can usually be used to log in using a password and can be used for running programs on the computer.

Non-User Account

The term non-user account is sometimes used for referring to all user accounts that are not standard user accounts.

Privileged Account Management

Privileged accounts, and particularly root and administrator accounts, grant high level privileges on computers. They can be used to surreptiously steal information, modify important data, change system configuration, and hide one's actions. They may also be used for installing and removing software and upgrading the operating system. Monitoring privileged accounts is thus very important for preventing cybercrime by employees and for detecting malware.

Privileged access management is a technology for controlling and monitoring access to privileged accounts.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now