Businesses need to provide flexible access to services that scale efficiently while always protecting customer data. Technologies like microservices and…
Tag: authentication
Why Machine Identity is as Important as User Identity to Infrastructure Security
Cloud-native applications use resources available to them online, on a public cloud platform, or hosted on-premises. IT teams apply policies…
Using Java Spring Boot to Administrate Secrets Management Access Policies
Secrets Management Policy Management through Java Spring Boot and Conjur The primary task of a secrets management administrator is to…
How a Stateless Cloud Native Application can Access Vaulted Secrets with IAM Authentication
Building a secure AWS environment requires applying security principles and guidelines around the way credentials and sensitive information are shared…
Secret Zero: Eliminating the Ultimate Secret
Centralized secrets management addresses important DevOps security attack vectors such as secret sprawl and security islands, but it could help introduce…
Understanding Secrets Management, OAuth, and Single Sign-On (SSO)
Once upon a time, access management was a simple thing. It focused mostly on making sure that the right users…
Service-to-Service Authentication in Cloud Applications & Microservices
It’s not an exaggeration to say that enterprise ready machine identity frameworks are in greater need than before. This is…
AWS IAM Authenticator Tutorial For Conjur Open Source
Applications often need to hold secrets. Connection strings, passwords, certificates, and other credentials are among the information applications may need…
Building a Comprehensive Monitoring Strategy That Includes Secrets Management
Over the past decade, software development and information technology operations have become more integrated, spawning a new approach, commonly called…
Don’t Get Pwned by Secret Zero
The Secret Zero Problem I have talked to a number of security conscious professionals across a wide range of…