Monthly rotating user credentials.
Multi-factor authentication for every access.
Logging with audit trails of employee accesses (CloudTrail).
Generally, minimal rights for employees on infrastructure components.
Read-only access whenever possible.
Automatic deployment with Infrastructure as Code, hence minimal manual access with personal devices to the infrastructure of the production system required.
How do technical administrators at legal-i access the infrastructure and systems? What methods are used for this purpose?
Datenschutz
S
Written by Support amaise
Updated over 10 months ago