Guides


  • images/zsp-2.jpg

    A Practical Approach to Achieving Zero Standing Privilege (ZSP)

    ZSP is a core tenant of a Zero Trust approach to cybersecurity, and implementing it has knock-on benefits beyond improved security. This guide looks at the current security landscape to understand why ZSP is an effective solution for protecting hybrid and cloud-first environments and provides a tactical approach to achieving ZSP.

    Learn more
  • images/Frame-344.png

    Everything You Want to Know about GCP Access Control

    Though systems and sensitivities vary, every company can benefit from incorporating least privilege access best practices into their identity security and access control processes. Read about these seven principles to get started.

    Learn more
  • images/Frame-341.png

    The Ultimate Guide to SCIM

    Learn what SCIM is, why you should use it, common workflows, real-world practical tips, and a little bit about the future of SCIM in this ultimate technical guide to all things SCIM.

    Learn more
  • images/frame-337.png

    Everything You Wanted to Know about GitHub Access Control

    GitHub, the largest and most popular software development platform, providing services from Git version control to bug tracking, CI/CD, and task management which makes it an extensive system to manage access controls. This article explores everything you need to know about GitHub access control to properly manage your accounts and repositories on all levels.

    Learn more
  • images/Frame-339.png

    SOX Access Controls, Separation of Duties, and Best Practices

    Understand SOX access controls, their separation of duties, best practices, and their overall importance to security and compliance in this comprehensive technical deep dive.

    Learn more
  • images/frame-325.png

    Snowflake Authorization and Permission Model Deep Dive

    Snowflake's robust authorization and permission model is central to how a company secures data in the platform. This comprehensive guide dives deep into the entities and methodologies that comprise Snowflake's permission model and its relative strengths and limitations.

    Learn more
  • images/frame-323.png

    4 Ways to Configure AWS Access

    Though systems and sensitivities vary, every company can benefit from incorporating least privilege access best practices into their identity security and access control processes. Read about these seven principles to get started.

    Learn more
  • images/screenshot-2023-08-17-at-3-37-45-pm.png

    Securing Identity for Any Application: Deep Dive into ConductorOne Integrations

    Digital transformation and cloud applications are rapidly reshaping the tech landscape, however many businesses still operate in hybrid application environments. This guide dives into the different kinds of environments seen across companies, reasons for adopting a hybrid architecture, and ConductorOne’s integration support for any type of architecture.

    Learn more
  • images/least-privilege-guide.png

    7 Principles for Least Privilege Access Implementation

    Though systems and sensitivities vary, every company can benefit from incorporating least privilege access best practices into their identity security and access control processes. Read about these seven principles to get started.

    Learn more
  • images/10 Best Practices Guide UAR.png

    10 Best Practices for Conducting User Access Reviews

    Compliance and security driven user access reviews are a crucial strategy to managing your organization’s security. These reviews can be extremely painful to get right due to cumbersome manual processes and lack of automation tooling.

    Learn more
  • images/Tools.jpg

    User Access Reviews Toolkit

    User access reviews are a crucial strategy to managing an organization’s cybersecurity risk and ensuring compliance. These reviews can be painful due to cumbersome manual processes and lack of automation tooling.

    Learn more

Stay in touch

The best way to keep up with identity security tips, guides, and industry best practices.