FedRAMP framework is a government program that provides a standardized approach for assessing, authorizing, and monitoring the security of cloud service providers (CSPs) used by federal agencies. But how can I get the certification and why should I care? Learn all about FedRAMP and its importance here.Learn more
Birthright access is a common place, but unsafe, security practice and because of this more and more companies are shifting left and migrating to Just-in-Time access. But what are the differences and how can I start to change? Learn why JIT access is a security best practice here.Learn more
Identity Governance and SSPM are two related but distinct concepts within the field of information security. Learn more about how they are similar and different here.Learn more
SOX and SOC 2 compliance initiatives are similar, yet very distinctly different aspects of access control regulations. Learn more about each specifically and the differences between the two here.Learn more
An entitlement is what a user can do within an app, whether it is a permission, a role, a setting or an admin, all depending on the app’s definition. But most simply put, it is the ability for a user to do something. The user can be entitled to view, edit or delete data.Learn more
A user access review is a periodic audit of access rights to verify that users and accounts have proper authorization to access networks and applications.Learn more
Stay in touch
The best way to keep up with identity security tips, guides, and industry best practices.