No More Backdoors: Know Who Has Access to What, Right Now
Jun 13
Virtual
Register Today
Teleport logoTry For Free
Background image

Access and Security Trade-Offs for DevSecOps Teams

Engineering teams building cloud software are always under pressure to deliver new features, fix bugs, and improve performance. To move quickly, engineers need access to computing resources: Kubernetes clusters, individual servers, databases, monitoring dashboards, and so on. But, to a security professional, all of these resources represent an ever-growing attack surface area. Just think how many attack vectors exist in a production database: an attacker can get SSH access to a database machine via a compromised key, a Kubernetes API, a compromised web UI, or even via the database’s own remote protocol.

Book cover for "Access and Security Trade-Offs for DevSecOps Teams"

Download the PDF to learn:

  • Security Overhead
  • Common trade-offs
  • Emerging Solutions

Clients

Trusted by leading organizations

  • Airtable logo
  • BigCommerce logo
  • DoorDash logo
  • Elastic logo
  • ExtraHop logo
  • SumoLogic logo
  • Swisscom logo
  • Threat Stack, Inc logo