
Just-in-Time Access: Management of Access in Cloud and Hybrid Environments
This session explains how just-in-time access can be used to optimize access management across the organization.
Topic
Cloud SecurityData protection / GDPREndpoint ProtectionIdentity and access managementSecure HomeofficeWebsecurity / VPNTrend topic
When & Where
Details
Format:
Management lecture
Session description
Traditional access controls have proven to be inadequate in terms of corporate security when it comes to granting time-limited and time-critical access. With just-in-time (JIT) access, administrators can grant users access for a specific period of time, which is automatically withdrawn after the time has expired.
JIT offers a dynamic way to manage access to cloud and on-premise resources. Users must be able to independently request access to resources as required. Once the conditions of the security policy are met, the user receives automatic authorization with a controlled level of access. The user is then granted time-limited access, which is automatically revoked after the time has expired. This allows zero-trust criteria to be implemented and massively reduces the attack ...
JIT offers a dynamic way to manage access to cloud and on-premise resources. Users must be able to independently request access to resources as required. Once the conditions of the security policy are met, the user receives automatic authorization with a controlled level of access. The user is then granted time-limited access, which is automatically revoked after the time has expired. This allows zero-trust criteria to be implemented and massively reduces the attack ...
Moderator
