Welcome to Day Two Cloud. We take on the problem of over-provisioning access to resources today. Not that you’ve ever, ever given someone more access to a thing then they should actually have because you were in a hurry, and they were in a hurry, and so you dropped them in that admin group because you just wanted to move on with your life. You’ve never done that. Of course you haven’t.
Except that you have. And I have. And Ned definitely has. Sponsor strongDM joins the conversation to share how to properly manage roles and access in our IT systems, focusing heavily on the process of discovery. Who has access to what, and why do they have that access?
Joining us from strongDM is Britt Crawford, Director of Product.
- No substitute for doing the research. Zero trust requires knowledge work.
- Apply that knowledge to reality via a software system.
- System must be easy to use for the people who are gaining access through it–else they will go around it.
Access Management 101: Understanding Roles And Access – strongDM Blog
Getting Started: Role & Access Discovery – strongDM Blog
Role & Access Discovery Workbook – strongDM
@strongdm – strongDM on Twitter