You receive a request for access to a backend system. You already know the questions you’re going to ask: “Who is this person? What’s their role? Do they actually need access to this system?” Developing a clear understanding of who has access to which systems is critical to your organization’s security and is foundational to having total control over your infrastructure.
Join Justin McCarthy, CTO, strongDM, for a hands-on session explaining how to run role and access discovery across your organization. Justin will provide a framework that you can use to: