the problem is exisiting Flashcards
1
Q
the problem is that existing
A
The problem is that existing solutions force difficult tradeoffs between these pillars of access.
Perimeter security solutions like VPNs focus on connectivity, but leave fine-grained RBAC and audit out of the equation.
Shared credentials using a secret Vault still requires you to figure out remote connectivity, and auditing for engineers and machine users. Not to mention, shared credentials are a security liability.
And, finally there’s legacy PAM. While PAM solutions are usually stronger than the former on security, they tend to be bulky, slow down your engineers and don’t help for machine-to-machine access.