As enterprises automate IT infrastructure and institute DevOps methodologies to accelerate innovation, processes and technologies must be put in place to secure both machine and human identities. Learn how to apply traditional privileged access management (PAM) concepts to nonhuman network entities (processes, services, containers, hosts) to automate IT without compromising security or velocity.
1: Understand how to modernize traditional PAM concepts in DevOps environments.
2: Learn to control privileges/authenticate nonhuman users across DevOps pipeline.
3: Learn about the concept of machine identities.
Application Security & DevOps
cloud security identity management & governance security architecture security operations DevSecOps
Share With Your Community