Virag Mody – Best Practices for Secure Infrastructure Access

October 28, 2020


Focus on resources and employees, not on networks and environments. The usage of firewalls, VPNs, intrusion detection, and other networking components have been the backbone of managing access to important resources like applications, servers, and databases. But trends towards decentralization and abstraction has made infrastructure increasingly fluid and enforcement slippery. This talk reframes how to manage secure access in a dev-friendly way using four principles:
[1] Base decisions on identity
[2] Make it easy to use
[3] Don’t trust networks, and
[4] Centralize logging with a practical application for SSH at the end.

Share some ❤
Guest(s): Virag Mody
starts in 10 seconds