<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
blog /
Cedar for Kubernetes: Authorization That Speaks Your Language

Cedar for Kubernetes: Authorization That Speaks Your Language

By simplifying the ability to enforce granular policies, Cedar has set a new benchmark for access control in Kubernetes, and we’re thrilled to be part of this journey. This evolution is a milestone for anyone dedicated to securing cloud infrastructure.
Cedar Go Implementation: Simplifying Security for Developers

Cedar Go Implementation: Simplifying Security for Developers

We are pleased to announce that Amazon has accepted StrongDM's native Go implementation of Cedar into the Cedar Policy Organization's official GitHub repository. This allows Go developers to use Cedar, a security and authorization framework built to be fast, secure, and analyzable natively in their Go programs.
What is Just-in-Time Access (JIT)? Benefits, Types & More

What is Just-in-Time Access (JIT)? Benefits, Types & More

Today, we’ll take a look at what just-in-time access (JIT) means and what types there are. You’ll also learn about what a JIT access solution can do for your organization. By the end of this article, you’ll understand how just-in-time access works, the best practices to ensure secured implementation, and how strongDM comes to the rescue.
StrongDM Works With Your Secrets Manager

StrongDM Works With Your Secrets Manager

We’re pleased to announce public beta support for the use of third-party secrets managers with StrongDM to store your credentials. And the best part? There are zero changes to your workflow.
StrongDM can’t terraform Mars, but we can Terraform your DevOps workflow

StrongDM can’t terraform Mars, but we can Terraform your DevOps workflow

Terraform, we are a go for launch on the StrongDM provider! We are happy to announce that StrongDM has officially launched as a Terraform provider. That means that in one single configuration, you can spin up a fleet of servers, import them into StrongDM, and provision your users' access in a matter of minutes.
How We Automate User Provisioning & Keep Track of Credentials

How We Automate User Provisioning & Keep Track of Credentials

There are a number of ways to automate user provisioning but the real challenge lies in keeping track of those credentials.
Change/Reset MySQL Root Password in Linux or Windows Step-By-Step

Change/Reset MySQL Root Password in Linux or Windows Step-By-Step

On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
How to Create a User and Add a Role in MongoDB (Safest Way)

How to Create a User and Add a Role in MongoDB (Safest Way)

Abstract-away usernames and passwords and allow the systems administrator to keep the master passwords safe under lock & key.
A Practical Approach to Just-in-Time (JIT) Access for Developers

A Practical Approach to Just-in-Time (JIT) Access for Developers

Should application developers have access to production database systems? This is a question as old as Vampires and Werewolves.
AWS Console Alternative, Secure AWS Management

AWS Console Alternative, Secure AWS Management

Gone are the days of sharing AWS root account credentials in a shared 1Password vault or worse, via email. With this in mind, one of the first steps to securing our AWS account is setting up AWS IAM.
3 Costly Cloud Infrastructure Misconfigurations

3 Costly Cloud Infrastructure Misconfigurations

It has never been easier for your company to build new infrastructure. In just a few clicks, you can spin up shiny new servers and databases in the cloud and start using them in seconds. However, in the rush to deploy new services so quickly, companies often let information security be an ...
Connecting Postgres to Active Directory for Authentication

Connecting Postgres to Active Directory for Authentication

While primarily geared towards developers, PostgreSQL is also designed to help system administrators safely and robustly store information in databases. In this post, we will demonstrate how to install a PostgreSQL database and then configure Active Directory users to authenticate to it.
Token Security Podcast | Senior Engineering Director at Zymergen on Code Reviews

Token Security Podcast | Senior Engineering Director at Zymergen on Code Reviews

At Token Security our goal is to teach the core curriculum for modern DevSecOps. Each week we will deep dive with an expert so you walk away with practical advice to apply to your team today. No fluff, no buzzwords. This week Jeff Burkhart, Senior Engineering Director at Zymergen talks code reviews, code review fatigue, and what to do when agile becomes tedious.
How to Create a Bastion Host | Part 1 of a Step-by-step Tutorial

How to Create a Bastion Host | Part 1 of a Step-by-step Tutorial

Step-by-step instructions on how to create a bastion host plus how to create an audit trail by logging SSH commands.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀