HomeCloud ComputingA wake-up name for identification safety in devops

A wake-up name for identification safety in devops



The GitHub incident uncovered what safety groups already suspect—that devops is working headlong into an identification sprawl drawback. Identities (human and non-human) are multiplying, permissions are stacking up, and third-party apps are the brand new comfortable underbelly.

That is the place identification safety posture administration (ISPM) steps in. ISPM takes the ideas of cloud safety posture administration (CSPM)—steady monitoring, posture scoring, risk-based controls—and applies them to identification. It doesn’t cease at who can log in; it extends into who has entry, why they’ve it, what they’ll do, and how that entry is granted, together with through OAuth.

Visibility via identification safety posture administration

Trendy identification safety platforms are stepping in to shut this hole. The main options offer you deep visibility into the net of permissions spanning builders, service accounts, and third-party OAuth apps. It’s now not sufficient to know {that a} token exists. Groups want full context: who issued the token, what scopes it has, what techniques it touches, and the way these privileges evaluate throughout environments.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments