advanced server access

Adapting to the Cloud Operating Model: Using Okta + HashiCorp to Automate Identity + Infrastructure as Code

Companies who employ DevOps programs have a goal in mind – to enable velocity at scale. Getting software out the door faster and more effectively is becoming critical to remain competitive in today’s fast-paced technology landscape. When speed is the name of the game, automation is key. Without the right guard rails, however, automation can be…

How to Centrally Manage Server User Attributes With Okta

A major driver for any organization’s identity strategy is to have a single authoritative source where security policies are consistently applied. Disparate identity stores lead to disparate controls, which makes it incredibly difficult to adhere to your compliance-mandated security policies. Okta has grown to be the market leader in this space…

How to Enforce Least Privilege Access on Linux Servers Using Sudo

Security is and should be outcome-oriented. In that spirit, access management can be boiled down to a single phrase—ensuring that only the right people have the right levels of access to the right resources under the right conditions at the right time. In a true Zero Trust world, granting access through the front door isn’t enough, you also need…

Putting the 8 Principles of Infrastructure Access into Practice

IT and security teams want to protect sensitive data and systems from online threats to preserve both the bottom line and their organization’s reputation. This means securing access to cloud and on-prem infrastructure. But legacy techniques have largely failed users and IT administrators in this regard—it’s time for a modern approach. Why have…

Archive