Securing access to sensitive resources and data has long been an essential element of cybersecurity programs. But in the event of attackers compromising a credential, standing access can pose significant security risk. Paired with appropriate controls on standing access, just-in-time (JIT) access can reduce the attack surface and contribute to a defense-in-depth approach for cybersecurity, especially in the public cloud.
This eBook covers:
The issues with solely standing access
Key benefits to adding JIT access to your existing Identity Security program
How to achieve JIT access