Today, both humans (DevOps, developers, admins) and applications (CI/CD platforms, K8s pods, Web Services, scripts, home-grown apps, etc.) use credentials to access production resources such as Databases, Linux Servers, Windows machines, and more.
If an attacker gains access to one of those credentials and uses it to penetrate a production environment (lateral movement), that could be catastrophic to an enterprise.
In this talk, you will learn how organizations can design and implement fully protected and secure human-to-machine as well as machine-to-machine access to a production environment, using Just-In-Time Access with Zero Standing Privileges.
Learn more: [ Ссылка ]
Ещё видео!