The Cure for IGAD
blog BATON

Technical Deep Dive: Using Baton to Audit Infrastructure Access

/images/author-john.jpg John Degner, Software Engineer

Share

/images/copy-of-baton-launch-01-1.jpg
/images/newletter-post.png

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.

Explore more articles

/images/baton.jpg

Managing Identity for SQL-Powered Apps: No APIs Necessary

/images/managing-nhi.jpg

Managing Non-Human Identity Risk in 2025

/images/how-we-built-guardrails-into-our-ai-agents-thumbnail.jpg

How ConductorOne Built Guardrails Into Our AI Agents