<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Achieve Zero Trust in AWS 🔒 Join our hands-on workshop on February 27!

Search
Close icon
Search bar icon
blog /
Embracing the New Mindset of Cloud-Native Security

Embracing the New Mindset of Cloud-Native Security

What is a “mindset of cloud-native security”? 🤔 That’s a great question. That’s why Justin McCarthy, CTO and co-founder of strongDM, recently sat down with Mike Vizard at Container Journal and a panel of technology experts to discuss just that—and how to implement it without creating friction.
Scaling Your SSH Strategy

Scaling Your SSH Strategy

In our last post, we discussed some of the challenges that are inherent to management of SSH keys across your infrastructure as you scale the number of team members and servers. In this post, we will dig into some of your options and the trade-offs that they provide.
How We Automate User Provisioning & Keep Track of Credentials

How We Automate User Provisioning & Keep Track of Credentials

There are a number of ways to automate user provisioning but the real challenge lies in keeping track of those credentials.
SSH Key Management Explained: Best Practices & More

SSH Key Management Explained: Best Practices & More

Infrastructure and DevOps administrators face significant barriers in managing Secure Shell (SSH) keys. In this article, we’ll explore the complexities of SSH key management. We’ll also show how to effectively authenticate users without having to manage SSH keys for individual users.
4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

4+ Kubernetes Authentication Methods (Proxy, OIDC & More)

Kubernetes authentication presents a unique challenge. While Kubernetes defines the concepts of both user accounts and service accounts natively, it doesn’t provide us with a single, built-in method for authenticating those accounts. Instead, we must choose from a variety of techniques involving third-party tools or resources to perform Kubernetes cluster authentication.
Forward Proxy vs. Reverse Proxy: The Difference Explained

Forward Proxy vs. Reverse Proxy: The Difference Explained

In this post, we’ll dissect the two concepts and explain how administrators can use a reverse proxy for easy access management control.
Integrate Active Directory With Any Database or Single Sign-On

Integrate Active Directory With Any Database or Single Sign-On

Consider this when you choose to integrate Active Directory (AD) with your databases and applications using their native APIs, connectors, or toolkits.
How to Create a MySQL User (Step-by-Step Tutorial)

How to Create a MySQL User (Step-by-Step Tutorial)

Find an easier way to manage access privileges and user credentials in MySQL databases. Reduce manual, repetitive efforts for provisioning and managing MySQL access and security with strongDM.
Change/Reset Default MySQL Root Password (Linux & Windows)

Change/Reset Default MySQL Root Password (Linux & Windows)

On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
How to Configure Bastion Host for SSH Logging | Part 3 - Tutorial

How to Configure Bastion Host for SSH Logging | Part 3 - Tutorial

Configure the hosts for logging verbose data, and then send the logs to a cloud provider for long-term storage and access.
SSH Audit Made Simple

SSH Audit Made Simple

SSH audit logs allow you to determine, either retroactively or in real-time, when an unauthorized or destructive action was taken, and by whom.
Everything You Need to Know About SOC 2 Audits

Everything You Need to Know About SOC 2 Audits

Whether you’re looking to achieve SOC 2 compliance, or just want to learn more about it, your Googling is bound to lead you to a wealth of articles chock full of buzzwords and acronym soup. ‍In this post, we will provide a guide with definitions, links and resources to gain a solid understanding of everything you need to know about SOC 2 audits.
A Definitive Guide to SOC 2 Policies

A Definitive Guide to SOC 2 Policies

In this post, we will help you get started with a hierarchy to follow, as well as a summary of each individual SOC 2 policy.
A Practical Approach to Just-in-Time (JIT) Access for Developers

A Practical Approach to Just-in-Time (JIT) Access for Developers

Should application developers have access to production database systems? This is a question as old as Vampires and Werewolves.
new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀