Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It’s kind of terrifying to have and give out admin powers with no oversight (except maybe forensics if we’re lucky). I’m interested in what alternatives could look like. Maybe provisioning requests take multiple signatures, like turning missile keys?


We use PIM in the Azure world. You can also use Azure PIM with AWS.

https://learn.microsoft.com/en-us/entra/id-governance/privil...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: