BLOG POST

Access Intelligence – The Infographic

 

June 27, 2014 | DevOps | Kevin O'Brien

 

Access Intelligence and Conjur

We recently had a conversation with some friends in the DevOps community about how they were implementing continuous integration ideas into their systems and teams, and how they were thinking about their authorization (authz) and authentication (authn) strategies as part of that process. These are some of the brightest engineers in the industry, and without exception, every one of them expressed how vital configuration management automation tools (e.g., Chef, Puppet, Ansible, and SaltStack) were in making these initiatives successful.

Coming out of that discussion, we compared notes. Everyone in our group had jotted down the same three basic ideas for managing security in a DevOps-friendly way, and everyone agreed that they clearly underscored why Conjur should be a fundamental part of any deployment of these tools.

Check out our infographic, Access Intelligence Best Practices, which outlines what we learned.

 

Are you automating your IT operations? Learn more about how Conjur provides the essential access intelligence needed to secure DevOps.

 

 

 

Share This