Access Intelligence – The Infographic


June 27, 2014 | DevOps | Kevin O'Brien


Access Intelligence and Conjur

We recently had a conversation with some friends in the DevOps community about how they were implementing continuous integration ideas into their systems and teams, and how they were thinking about their authorization (authz) and authentication (authn) strategies as part of that process. These are some of the brightest engineers in the industry, and without exception, every one of them expressed how vital configuration management automation tools (e.g., Chef, Puppet, Ansible, and SaltStack) were in making these initiatives successful.

Coming out of that discussion, we compared notes. Everyone in our group had jotted down the same three basic ideas for managing security in a DevOps-friendly way, and everyone agreed that they clearly underscored why Conjur should be a fundamental part of any deployment of these tools.

Check out our infographic, Access Intelligence Best Practices, which outlines what we learned.


Are you automating your IT operations? Learn more about how Conjur provides the essential access intelligence needed to secure DevOps.






Keep up-to-date on security best practices, events and webinars.

Share This