<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CYBER WOW]]></title><description><![CDATA[Cyber Wow provides you with the latest trending news in a concise, easy-to-read format so that you can stay up to date on the latest security and DevOps topics without wasting your time.]]></description><link>https://cyberwow.com</link><image><url>https://substackcdn.com/image/fetch/$s_!95Sn!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dfebd9d-9be9-435f-ab20-21b8cfa34ede_500x500.png</url><title>CYBER WOW</title><link>https://cyberwow.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 11:15:19 GMT</lastBuildDate><atom:link href="https://cyberwow.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ron Fybish]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberwow@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberwow@substack.com]]></itunes:email><itunes:name><![CDATA[Ron Fybish]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ron Fybish]]></itunes:author><googleplay:owner><![CDATA[cyberwow@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberwow@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ron Fybish]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[EU AI Act Compliance: What CISOs Actually Need to Do]]></title><description><![CDATA[The Act is half-enforced and fully confusing. What applies to you, what to do first, and what's safe to deprioritize.]]></description><link>https://cyberwow.com/p/eu-ai-act-compliance-what-cisos-actually</link><guid isPermaLink="false">https://cyberwow.com/p/eu-ai-act-compliance-what-cisos-actually</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Tue, 28 Apr 2026 11:03:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!nHt3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jUsF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jUsF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!jUsF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!jUsF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!jUsF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jUsF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png" width="1456" height="816" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:442200,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cyberwow.com/i/194893727?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jUsF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!jUsF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!jUsF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!jUsF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52e3e2b8-f5b4-47c8-af42-9f52e75a1dd9_2912x1632.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>The EU AI Act started enforcing on February 1, 2025. That was four months ago. Your legal team probably sent you a memo. It probably contained the words &#8220;high-risk,&#8221; &#8220;prohibited,&#8221; &#8220;GPAI,&#8221; &#8220;Article,&#8221; and &#8220;substantial non-compliance,&#8221; and may have concluded with &#8220;discuss with CISO.&#8221; Then nothing happened because the memo was written for lawyers, not for security ops.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This is the CISO-only filter. I&#8217;m not going to walk you through the regulation&#8217;s 27 chapters or the nine implementing regulations that are still rolling out. I&#8217;m going to tell you what actually lands on your desk, what your legal and compliance teams need from you, what you can safely ignore for now, and what the failure modes actually cost.</p><p>The core tension: the EU AI Act is a <em>product regulation</em>, not a data protection law. It&#8217;s about what AI systems <em>do</em>, not about data processing. That means parts of it matter to you immediately, parts matter to your engineering leadership, and some parts are in a jurisdictional limbo until the Irish DPA and NIST finalize guidance nobody&#8217;s published yet. We&#8217;re going to sort that out.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bfuv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bfuv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 424w, https://substackcdn.com/image/fetch/$s_!Bfuv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 848w, https://substackcdn.com/image/fetch/$s_!Bfuv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 1272w, https://substackcdn.com/image/fetch/$s_!Bfuv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bfuv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png" width="1456" height="1073" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1073,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 1: Risk-tiering AI systems&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 1: Risk-tiering AI systems" title="IMAGE 1: Risk-tiering AI systems" srcset="https://substackcdn.com/image/fetch/$s_!Bfuv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 424w, https://substackcdn.com/image/fetch/$s_!Bfuv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 848w, https://substackcdn.com/image/fetch/$s_!Bfuv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 1272w, https://substackcdn.com/image/fetch/$s_!Bfuv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb523348e-c4d0-4a4a-b754-fb8cf1ab847f_3744x2760.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The parts of the EU AI Act that actually land on the CISO&#8217;s desk</h2><p>The regulation has four major risk tiers: prohibited AI, high-risk AI, GPAI (general-purpose AI), and everything else. Your CISO obligations cluster around two of them.</p><p><strong>Prohibited AI:</strong> The regulation bans a narrow set of AI uses outright, mass surveillance, real-time facial recognition in public spaces (with narrow law-enforcement carveouts), emotion recognition in schools or workplaces, manipulation of human behavior to bypass informed consent. Unless you&#8217;re a government running a surveillance state or a corp deploying manipulative content filters, this doesn&#8217;t apply to you. Your legal team will flag this. You can move on.</p><p><strong>High-risk AI:</strong> This is the category that matters. High-risk systems include AI used for recruitment, loan decisions, healthcare, educational placement, biometric ID, infrastructure critical-functions, and law enforcement. If you&#8217;re a mid-market company, you likely have <em>some</em> high-risk AI in scope: maybe an automated resume screener, a fraud-detection system, anything biometric. For every high-risk system your company operates or <em>places in the market</em>, the regulation requires:</p><ol><li><p><strong>Technical documentation</strong> (Article 11), a record of the system&#8217;s architecture, data, training, testing, and performance metrics.</p></li><li><p><strong>Logging and traceability</strong> (Article 12), the ability to trace what the system did, when, and why.</p></li><li><p><strong>Human oversight</strong> (Article 14), humans in the loop for high-stakes decisions.</p></li><li><p><strong>Transparency</strong> (Article 13), disclosure to affected users that they&#8217;re interacting with AI.</p></li></ol><p><strong>GPAI:</strong> General-purpose AI is any foundation model that <em>can be adapted</em> to a range of downstream tasks. ChatGPT, Claude, Gemini, Llama, these are GPAI. By March 2025, the regulation extended obligations to GPAI providers and, more important for you, to companies that <em>integrate</em> GPAI into their own systems. If you built an agent that uses Claude to help with hiring decisions, your deployment is now a high-risk system <em>and</em> you&#8217;ve integrated GPAI. Both obligations apply.</p><h2>High-risk AI systems: the definition in plain English</h2><p>The regulation&#8217;s legal definition of &#8220;high-risk&#8221; is procedurally defined: the system must fall into one of nine categories <em>and</em> be used for one of the regulated purposes. It sounds bureaucratic because it is. Here&#8217;s what it means in practice.</p><p>A resume screener is high-risk. It&#8217;s in the &#8220;biometric identification and categorization&#8221; category (you&#8217;re assessing employment qualification) and it has a material adverse effect on a person&#8217;s livelihood (hiring decisions). The system can&#8217;t stay in the market unless you document it, log its decisions, keep humans in the loop for rejections, and tell job applicants they&#8217;re being evaluated by AI.</p><p>A ChatGPT-powered customer-support agent is <em>not</em> high-risk unless it&#8217;s making decisions with a material adverse effect. If it answers questions, it&#8217;s not high-risk. If it approves credit or denies a claim, it is.</p><p>A fraud-detection system in payment processing is high-risk. Fraud detection is in the &#8220;critical infrastructure&#8221; category, and a false positive can lock a customer&#8217;s account.</p><p>The pattern: if your AI system makes a decision about a person&#8217;s access to a service, credit, employment, or legal status, and that decision has material consequences, it&#8217;s probably high-risk. If it&#8217;s purely informational (summarizes, recommends, analyzes), it&#8217;s probably not.</p><p>For your company: go through every AI system in production and ask, &#8220;Does this make a decision that affects a person&#8217;s life or access?&#8221; If yes, assume it&#8217;s high-risk until you have a reason to conclude otherwise. Your legal and compliance teams should do the formal classification, but you need to know what&#8217;s in your estate.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iGNc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iGNc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 424w, https://substackcdn.com/image/fetch/$s_!iGNc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 848w, https://substackcdn.com/image/fetch/$s_!iGNc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 1272w, https://substackcdn.com/image/fetch/$s_!iGNc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iGNc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png" width="1456" height="1565" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1565,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 2: Technical documentation requirements&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 2: Technical documentation requirements" title="IMAGE 2: Technical documentation requirements" srcset="https://substackcdn.com/image/fetch/$s_!iGNc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 424w, https://substackcdn.com/image/fetch/$s_!iGNc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 848w, https://substackcdn.com/image/fetch/$s_!iGNc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 1272w, https://substackcdn.com/image/fetch/$s_!iGNc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e1e7f0d-5931-4d73-8045-bc60df01b67f_2464x2648.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The technical documentation obligation (Article 11) for CISOs</h2><p>This is the first thing your engineering teams will ask you about because it&#8217;s the first thing they have to deliver.</p><p>The regulation requires &#8220;technical documentation&#8221; for high-risk systems. The EU hasn&#8217;t published a template (they&#8217;re still arguing about it), so the de facto standard is the draft regulatory technical standards (RTS) and ISO/IEC 42001, which is the operational AI management standard and the only one that passed regulatory scrutiny in the EU.</p><p>What you need to document for each high-risk system:</p><ol><li><p><strong>System design and architecture</strong>, what the system does, what inputs it takes, what outputs it produces, what models or sub-systems it uses.</p></li><li><p><strong>Data used for training and testing</strong>, where the training data came from, how representative it is, any known biases or limitations.</p></li><li><p><strong>Model performance and evaluation</strong>, accuracy metrics, fairness metrics, performance across demographic groups, edge cases, failure modes.</p></li><li><p><strong>Human oversight procedures</strong>, how humans monitor the system, what conditions trigger human review, escalation paths.</p></li><li><p><strong>Security and privacy measures</strong>, how the system is protected against attacks, how user data is handled, retention policies.</p></li><li><p><strong>Monitoring and maintenance plan</strong>, how the system is updated, how degradation is detected, how you know when to retire it.</p></li></ol><p>This is not a one-time deliverable. It&#8217;s a living document you update every time the system changes. The regulation expects you to keep it current and produce it on demand to regulators.</p><p><strong>For your CISO role:</strong> You own the security and privacy sections (item 5 above). Your engineering and data teams own the rest. But you need to understand the full picture because these components interact. A training dataset that&#8217;s too narrow (item 2) creates a security problem: the system fails in unexpected ways when it encounters data outside the training distribution, and that failure can be exploited. You need to know this when you&#8217;re scoping logging requirements (next section).</p><h3>Concrete artifacts you need to produce</h3><p>Most teams ask, &#8220;OK, so what documents do we actually create?&#8221; Here are the six artifacts regulators will ask for in an audit:</p><p><strong>1. Model Card</strong>, A structured summary of the model&#8217;s intended use, training data source, performance benchmarks (accuracy, precision, recall), and known limitations. Your data science or ML ops team owns this. One page to two pages per model.</p><p><strong>2. Data Governance Documentation</strong>, Where did the training data come from? Is it licensed? How representative is it of the population this system will serve? What labeling was applied and by whom? What quality checks happened? Your data team and legal team co-own this. This document catches biases that lead to fairness failures and legal exposure.</p><p><strong>3. Risk Assessment</strong>, A structured analysis of failure modes and their consequences. What happens if the model&#8217;s confidence drops? What if it makes a biased decision against a protected class? What&#8217;s the blast radius? You lead this, working with engineering. This is what regulators <em>actually want to see</em>, evidence that you&#8217;ve thought about what can go wrong and you have a plan.</p><p><strong>4. Human Oversight Mechanisms</strong>, Document the rules that trigger human review. For a hiring system: if confidence is below 75%, a human reviewer sees it. If the system&#8217;s decision conflicts with resume screening scores, escalate. For a fraud detector: blocks above $10k go to review; unusual customer profiles go to review. You own the <em>design</em> of these rules; the ops team implements them and maintains logs of when they fire.</p><p><strong>5. Accuracy and Resilience Metrics</strong>, Raw numbers from testing. Accuracy overall. Accuracy per demographic group (to catch disparate impact). Performance on out-of-distribution data (how does the system behave on inputs that don&#8217;t match the training distribution?). Performance on adversarial inputs. Your ML team owns the testing; you own the decision of what metrics matter for security.</p><p><strong>6. Monitoring and Incident Response Plan</strong>, How do you detect when the system is degrading? What&#8217;s your alert threshold? If the system starts making systematically biased decisions, how fast can you take it offline? How do you notify affected users? This is pure security ops. Document it like you&#8217;d document an incident response playbook for any other system.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6Y46!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6Y46!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 424w, https://substackcdn.com/image/fetch/$s_!6Y46!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 848w, https://substackcdn.com/image/fetch/$s_!6Y46!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 1272w, https://substackcdn.com/image/fetch/$s_!6Y46!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6Y46!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png" width="1456" height="927" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:927,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 3: Logging and traceability flowchart&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 3: Logging and traceability flowchart" title="IMAGE 3: Logging and traceability flowchart" srcset="https://substackcdn.com/image/fetch/$s_!6Y46!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 424w, https://substackcdn.com/image/fetch/$s_!6Y46!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 848w, https://substackcdn.com/image/fetch/$s_!6Y46!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 1272w, https://substackcdn.com/image/fetch/$s_!6Y46!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae981b75-696f-420d-a3d3-4c9c566ad793_3356x2136.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Logging and traceability (Article 12), what &#8220;good&#8221; looks like</h2><p>High-risk systems must produce logs that allow regulators and affected users to understand what happened. For each high-risk system, you need to be able to answer:</p><ul><li><p>What decision did the system make, and when?</p></li><li><p>What data did it use as input?</p></li><li><p>What rules or models did it apply?</p></li><li><p>What was the output, and did a human review it?</p></li><li><p>Who was affected, and how were they notified?</p></li></ul><p>If a resume screener rejects a candidate, you need to log: candidate name, submission time, resume features considered, model confidence, whether it went to a human reviewer, whether the human overrode the system, what the final decision was, and that the candidate was told they were evaluated by AI.</p><p>This is where your SIEM and audit infrastructure comes in. High-risk systems need logging at a different granularity than normal application logs. Normal logs record &#8220;system event X happened.&#8221; AI system logs need to record &#8220;decision X was made about person Y based on factors Z and was reviewed by human H.&#8221;</p><p>Most companies don&#8217;t have this logging infrastructure yet. This is the highest-ROI investment for EU AI Act compliance in 2026: design and implement specialized logging for high-risk AI systems. Once you have that, everything else (transparency, audit, incident response) becomes feasible.</p><h3>Minimum viable log schema for high-risk AI systems</h3><p>You need to capture these fields for <em>every decision</em> the system makes:</p><p>FieldPurposeRetention<code>timestamp</code>When the decision was made3 years<code>decision_id</code>Unique identifier for this decision (for audits)3 years<code>subject_id</code>Who or what the decision affectedPer applicable law (GDPR for EU residents: 3 years or longer)<code>system_name</code>Which AI system made the decision3 years<code>model_version</code>Model version in use at decision time3 years<code>input_features</code>Structured data the system saw (can be hashed if it contains PII)3 years<code>model_output</code>Raw output (confidence score, ranking, etc.)3 years<code>system_decision</code>What the system decided (approve, reject, etc.)3 years<code>human_review_triggered</code>Was this decision reviewed by a human?3 years<code>human_reviewer_id</code>Who reviewed it (anonymized if needed)3 years<code>human_decision</code>What the human decided (if different from system)3 years<code>final_decision</code>What actually happened (system or human)3 years<code>notification_sent</code>Did the subject receive notice of AI use?Depends on regulation<code>exception_flag</code>Did anything unusual happen? (model confidence low, feature out of range, override, etc.)3 years</p><p><strong>Retention baseline:</strong> Three years is the EU AI Act minimum for audits. GDPR may require longer retention for certain data. Check with your legal team on the applicable standard for your jurisdiction and data type.</p><h3>Integration with your SIEM</h3><p>Most large companies have Splunk, Datadog, or Panther already. You can pipe AI system logs into these tools using standard log forwarding (syslog, HTTP event collector, etc.). The challenge is <em>structure</em>: your general-purpose SIEM isn&#8217;t optimized for decision traceability, so you&#8217;ll need to:</p><ol><li><p>Create dedicated index/pipeline for AI system logs in your SIEM</p></li><li><p>Enrich logs with business context (link decision_id to subject_id, attach human reviewer names, flag policy violations)</p></li><li><p>Set up alerting for exceptions (model confidence drops below threshold, human overrides spike, subjects file complaints)</p></li></ol><p><strong>For ML-specific observability:</strong> Tools like Arize, Fiddler, and WhyLabs are built for this. They ingest model predictions + ground truth, detect data drift, fairness degradation, and performance drops. If you&#8217;re deploying high-risk models, a tool like this is worth the cost. Your SIEM won&#8217;t catch &#8220;the model&#8217;s accuracy dropped 5% for Hispanic applicants&#8221; because your SIEM doesn&#8217;t know about demographic stratification.</p><p><strong>For agents and LLM systems:</strong> This is harder. LLM-based systems don&#8217;t always produce deterministic decision traces. Log what you <em>can</em>: the user query, the system&#8217;s response, whether a human reviewed it, and any flags. Document the limitations in your Article 11 technical documentation.</p><p><strong>The technical challenge:</strong> High-risk AI systems, especially those using generative models or agents, don&#8217;t always produce reproducible decision traces. If an LLM-based system makes a decision, you can&#8217;t always trace &#8220;which part of the training data caused this output.&#8221; You need to log the <em>input</em> the system saw and the <em>output</em> it produced, and that&#8217;s what you can audit. The EU is gradually accepting this limitation, they can&#8217;t require decision traceability for systems where it&#8217;s technically infeasible. But you need to be explicit about what you <em>can</em> and <em>can&#8217;t</em> trace, and your documentation (Article 11) is where you explain that.</p><h2>The four compliance states you can be in</h2><p>Before we talk about timelines, you need to know which state your company is in. These are not lawyer terms, they&#8217;re operational states that determine what your CISO roadmap looks like.</p><p><strong>State 1: Not in scope</strong>, You offer no AI to EU users, you don&#8217;t process EU resident data in AI-mediated decisions, and your entire AI estate is internal-only tools used by your own staff who aren&#8217;t in the EU. Compliance burden: zero. You should still have an AI security program (see Pillar 2), but the EU AI Act is not your problem. (If you think you&#8217;re here, ask your legal team; most companies aren&#8217;t.)</p><p><strong>State 2: GPAI deployer only</strong>, You use a large language model (ChatGPT, Claude, Gemini) in products or services, but you&#8217;re not training your own models and you&#8217;re not deploying high-risk systems. You have obligations around transparency (disclosing AI use to users) and possibly copyright compliance. You don&#8217;t have technical documentation or logging obligations (those fall on the GPAI provider). Your to-do list: audit which deployments use GPAI, ensure disclosures are in place, verify you have terms of service clarifying that users are interacting with AI. Timeline: your disclosures should be live now (February 2025 enforcement).</p><p><strong>State 3: Deployer of high-risk AI</strong>, You offer or operate at least one high-risk AI system (hiring tool, fraud detector, credit decisioning, medical AI, etc.) but you didn&#8217;t build the model yourself. Your obligations: technical documentation, logging, human oversight, transparency. Your vendor (if you&#8217;re using a third-party platform) may provide some of these, but you own the system&#8217;s behavior in production, so you own compliance. Your to-do list: audit which systems are in scope, design logging infrastructure, document your deployment, set up human oversight rules. Timeline: you need this shipping by August 2026 at latest, ideally well before.</p><p><strong>State 4: Provider of high-risk AI</strong>, You trained or fine-tuned the model yourself and are offering it to other companies. You have GPAI provider obligations (transparency, copyright) <em>and</em> high-risk obligations (documentation, logging, oversight). This is the heaviest burden. Your to-do list: everything above, plus: model cards, training data documentation, third-party audit readiness. Timeline: August 2026 minimum.</p><p>Most mid-market companies are in State 3. Know which state you&#8217;re in before you allocate resources.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GPH0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GPH0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 424w, https://substackcdn.com/image/fetch/$s_!GPH0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 848w, https://substackcdn.com/image/fetch/$s_!GPH0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 1272w, https://substackcdn.com/image/fetch/$s_!GPH0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GPH0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png" width="1456" height="803" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:803,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 4: Timeline and penalties&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 4: Timeline and penalties" title="IMAGE 4: Timeline and penalties" srcset="https://substackcdn.com/image/fetch/$s_!GPH0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 424w, https://substackcdn.com/image/fetch/$s_!GPH0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 848w, https://substackcdn.com/image/fetch/$s_!GPH0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 1272w, https://substackcdn.com/image/fetch/$s_!GPH0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb8dabcc-86ec-463f-9f85-15bbf6b11bc6_4092x2256.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The July 2026 deadlines that are actually landing</h2><p>Here&#8217;s what matters: concrete dates. Regulators publish penalties on the enforcement dates, not the draft dates. Here&#8217;s the timeline that&#8217;s binding law:</p><p>PhaseDateWhat&#8217;s enforceableArticlesCISO actionPenalty (non-compliance)<strong>Phase 1: Prohibitions &amp; GPAI transparency</strong>Feb 1, 2025Prohibited AI systems; GPAI provider transparency5-6Disclosure of AI use to end usersUp to EUR 35M or 7% global revenue<strong>Phase 2: GPAI obligations; early high-risk</strong>Aug 1, 2025All GPAI transparency obligations; risk assessment requirements for high-risk systems8-10Complete risk assessment for each high-risk system; begin documentation; design loggingUp to EUR 15M or 3% global revenue (GPAI); up to EUR 20M or 4% (high-risk)<strong>Phase 3: High-risk full compliance</strong>Aug 1, 2026Technical documentation, logging, human oversight, transparency for all high-risk systems11-14Live technical documentation; live logging infrastructure; human oversight rules enforcedUp to EUR 20M or 4% global revenue<strong>Phase 4: Full application</strong>Aug 1, 2027EverythingAllFull compliance audit-ready stateAll penalties enforceable</p><p>The August 2026 deadline is the one that matters for CISOs. If you have a resume screener, fraud detector, or any high-risk system in production, it needs documentation, logging, and human oversight by then. Missing this date doesn&#8217;t automatically trigger a fine, but it makes you the target for a regulatory audit.</p><p><strong>Penalty exposure in concrete terms:</strong></p><ul><li><p><strong>Prohibited systems</strong> (rare; you probably don&#8217;t have these): EUR 35 million or 7% of global turnover, whichever is higher</p></li><li><p><strong>High-risk non-compliance</strong> (missing documentation, logging, or oversight): EUR 20 million or 4% of global turnover</p></li><li><p><strong>GPAI transparency/copyright failure:</strong> EUR 15 million or 3% of global turnover</p></li><li><p><strong>Administrative violations</strong> (missing reports, obstructing inspections): EUR 10 million or 2% of global turnover</p></li></ul><p>For a $1 billion company, 4% is $40 million. That&#8217;s real money. For a $500 million company, it&#8217;s $20 million. This is not a &#8220;nice to have&#8221;, it&#8217;s a material risk.</p><p><strong>What to deprioritize:</strong></p><p>The regulation also covers &#8220;low-risk AI&#8221; with transparency requirements, basically, any AI system should disclose to users that they&#8217;re interacting with AI (unless it&#8217;s obvious, like a voice assistant). This is useful guidance but is the lowest enforcement priority. If you&#8217;re down to this concern, you&#8217;re ahead of 90% of companies.</p><p>The implementing regulations on GPAI providers are still rolling out (the EU is still writing RTS on copyright compensation for model training, responsibility allocation between providers and integrators, and systemic risk). Once they land, you may have obligations around third-party AI audits or conformity assessments. For now, that&#8217;s on the future roadmap.</p><h2>ISO/IEC 42001 and EU AI Act: what maps, what doesn&#8217;t</h2><p>Your board or CIO might push back: &#8220;Can&#8217;t we just get ISO 42001 certified and call it done?&#8221; The answer is qualified yes, but certification alone is not sufficient.</p><p>ISO/IEC 42001 is an operational standard for managing AI risks. The EU AI Act is a regulatory compliance standard. They&#8217;re adjacent but not identical. Here&#8217;s what matters:</p><p><strong>What ISO 42001 covers that the EU AI Act requires:</strong></p><ul><li><p>AI governance and roles (4.1): Maps to Article 22 (provider governance)</p></li><li><p>Risk assessment and management (5.3, 5.4): Maps to Article 8 (risk assessment for high-risk systems)</p></li><li><p>Data governance (5.5): Maps to Article 11 (data documentation)</p></li><li><p>Documentation and traceability (5.8, 5.9): Maps to Articles 11-12 (technical documentation and logging)</p></li><li><p>Human involvement and oversight (5.10): Maps to Article 14</p></li><li><p>Monitoring and performance evaluation (5.11): Maps to ongoing compliance monitoring</p></li></ul><p>If you are ISO 42001 certified, you have much of the operational machinery the EU AI Act expects. Regulators view certification favorably in audits.</p><p><strong>What ISO 42001 does NOT cover that the EU AI Act requires:</strong></p><ul><li><p>GPAI-specific transparency obligations (Article 6), ISO covers general transparency, not GPAI model-card standards</p></li><li><p>Prohibited AI enforcement (Article 5), ISO is not a prohibition mechanism</p></li><li><p>Systemic risk assessment for GPAI (Article 24), Too early for most companies</p></li><li><p>Specific penalty thresholds and timelines, ISO is not a legal compliance framework</p></li></ul><p><strong>Bottom line:</strong> ISO 42001 certification is an enabler and a strong signal of maturity. It reduces the burden of proving compliance. But it is not a substitute for the specific technical documentation (Article 11) and logging (Article 12) required for each high-risk system. You still need those. Treat ISO 42001 as foundational; EU AI Act compliance as specific.</p><p>Many auditors will ask: &#8220;Are you ISO 42001 certified?&#8221; If yes, they&#8217;ll skim some sections. If no, they&#8217;ll audit more deeply. Getting certified is worth the effort if you have 2+ high-risk systems in production.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nHt3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nHt3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 424w, https://substackcdn.com/image/fetch/$s_!nHt3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 848w, https://substackcdn.com/image/fetch/$s_!nHt3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 1272w, https://substackcdn.com/image/fetch/$s_!nHt3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nHt3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png" width="1456" height="956" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:956,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 5: CISO vs, GC responsibility matrix&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 5: CISO vs, GC responsibility matrix" title="IMAGE 5: CISO vs, GC responsibility matrix" srcset="https://substackcdn.com/image/fetch/$s_!nHt3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 424w, https://substackcdn.com/image/fetch/$s_!nHt3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 848w, https://substackcdn.com/image/fetch/$s_!nHt3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 1272w, https://substackcdn.com/image/fetch/$s_!nHt3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b89ca39-0bcb-4f41-ba71-60e7b2230011_2740x1800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The CISO&#8217;s action list for the next 90 days</h2><ol><li><p><strong>Audit.</strong> In the next 30 days, enumerate every AI system in production (internal and third-party) that makes a decision affecting a person&#8217;s access, credit, employment, or legal status. Distinguish high-risk from everything else. Work with legal to formalize the classification.</p></li><li><p><strong>Logging.</strong> For every high-risk system, document what you <em>can</em> currently log about system behavior (input, output, human review, decision). Identify gaps. Design a logging infrastructure for the ones that don&#8217;t have it. This is the 60-day priority.</p></li><li><p><strong>Documentation.</strong> For each high-risk system, coordinate with engineering and data teams to assemble the technical documentation. Don&#8217;t wait for a template, use ISO 42001 as the benchmark. This is the 90-day target, though you may miss it for complex systems (it&#8217;s OK to file a roadmap with regulators if you&#8217;re close).</p></li><li><p><strong>Governance.</strong> Draft (or update) an AI governance policy that covers high-risk systems: who can deploy a high-risk system, what documentation is required, what logging is non-negotiable, when human review is triggered. File it with your legal and compliance teams.</p></li><li><p><strong>Incident response.</strong> For high-risk systems, document what happens if the system fails, makes a biased decision, or is compromised. What&#8217;s your notification procedure for affected users? How do you communicate with regulators? This belongs in your IR playbook now.</p></li></ol><p>This is the EU AI Act minimum, not the whole thing. But if you ship these five items in the next 90 days, you&#8217;re in defensible territory when inspections come.</p><h2>Frequently asked questions</h2><h3>Is our ChatGPT Enterprise deployment in scope?</h3><p>Depends on what you use it for. If you use ChatGPT Enterprise to answer customer questions, no, you&#8217;re a GPAI deployer with transparency obligations only. If you integrate it into a hiring tool that makes employment decisions, or a credit decision system, or a fraud detector, yes, the combined system becomes high-risk. Your classification depends on the <em>use case</em>, not the model. ChatGPT can be deployed in high-risk <em>or</em> low-risk ways. The distinction matters for documentation and logging burden. ChatGPT Enterprise offers some compliance conveniences (data retention, audit logs), but it doesn&#8217;t solve the high-risk problem. You still need your own technical documentation (Article 11) and your own logging (Article 12) if the downstream use case is high-risk. (Note: This is a CISO concern, not a legal question, ask your legal team to formalize the classification of each deployment.)</p><h3>What&#8217;s the minimum documentation to survive an audit in 2027?</h3><p>Assume an auditor will ask for one document per high-risk system: a consolidated technical documentation file with these sections: (1) system purpose and scope; (2) training data source and representative bias analysis; (3) model version and performance metrics (accuracy, fairness across demographic groups, edge case failures); (4) human oversight rules (what triggers review, who reviews, escalation path); (5) logging schema and infrastructure (what&#8217;s logged, retention period, how to retrieve it); (6) incident response (what happens if the system fails or makes a biased decision, notification timeline). This is 8&#8211;12 pages per high-risk system. You don&#8217;t need a separate model card, data governance doc, and risk assessment if you fold them into this one artifact. Just make sure it&#8217;s current (updated within 6 months of an audit) and that you can produce three months of logs on demand. That&#8217;s &#8220;minimum viable.&#8221;</p><h3>Does the AI Act apply to our internal-only AI tools?</h3><p>Only if they affect EU residents. If you have an internal hiring tool used only by your US team, with no EU applicants, no, it&#8217;s out of scope. If you use the same tool to screen EU job applicants, yes, it&#8217;s in scope for EU applicants only. You may need to segment your system or document what controls exist for the EU-affected portions. If you use an internal fraud detector that affects EU customers&#8217; accounts, yes, it&#8217;s in scope. Internal vs. external is not the gating question; affecting EU residents is. This is worth a conversation with your legal team because you may have inherited legacy systems that process EU data in ways that nobody documented.</p><h3>What happens if we miss the August 2026 deadline?</h3><p>Regulators won&#8217;t send the police. Missing the deadline doesn&#8217;t trigger immediate fines. What happens is: regulators audit at their discretion, usually triggered by a customer complaint, a public incident, or routine industry sweeps. If they find you operating a high-risk system without documentation or logging, they issue a notice of non-compliance and give you 90&#8211;180 days to fix it. If you fix it in that window, fines may be reduced or waived. If you don&#8217;t, they escalate to formal penalties. The real cost of missing is the audit itself (legal costs, disruption, required remediation under oversight). Meet the deadline and you stay off the regulator&#8217;s radar. That&#8217;s the operative incentive.</p><h3>Do US-based companies need to comply with the EU AI Act?</h3><p>Yes, if you offer AI systems or services to users in the EU or if your systems process EU residents&#8217; data in the course of making high-risk decisions. &#8220;To users in the EU&#8221; is broad, if your SaaS product is available to European customers and uses AI, you&#8217;re probably in scope. Geofencing (blocking EU access) is the only way to opt out, and most companies don&#8217;t choose that. Your legal team can narrow this, but assume yes unless there&#8217;s a clear reason not to.</p><h3>Can ISO 42001 certification satisfy the EU AI Act requirements?</h3><p>ISO 42001 compliance is a strong signal of operational maturity, and regulators view it positively. But certification alone doesn&#8217;t satisfy the regulation, you still need the specific technical documentation (Article 11) and logging (Article 12) for each high-risk system. ISO 42001 is an enabler, not a substitute. The regulation is moving toward &#8220;if you&#8217;re ISO 42001 certified, you get credit for compliance,&#8221; but that&#8217;s not law yet. Think of certification as a foundation; the regulation requires you to build the floor on top of it.</p><div><hr></div><h2>Related reading</h2><ul><li><p>02-pillar-agentic-ai-security, Understanding where agentic AI systems fit into your compliance picture</p></li><li><p>06-cluster-shadow-ai, Shadow AI creates undocumented high-risk systems; governance matters</p></li><li><p>10-cluster-llm-dlp, Data leakage from AI systems compounds EU AI Act risk</p></li></ul><div><hr></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Building an AI Security Program: From Policy to Implementation]]></title><description><![CDATA[A program-level blueprint - policy, discovery, controls, and board reporting. The five-stage maturity model behind programs actually working in 2026.]]></description><link>https://cyberwow.com/p/building-an-ai-security-program-from</link><guid isPermaLink="false">https://cyberwow.com/p/building-an-ai-security-program-from</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Sun, 26 Apr 2026 15:28:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!S65Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S65Z!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S65Z!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!S65Z!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!S65Z!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!S65Z!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S65Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png" width="1456" height="816" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:391288,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://cyberwow.com/i/194949406?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S65Z!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 424w, https://substackcdn.com/image/fetch/$s_!S65Z!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 848w, https://substackcdn.com/image/fetch/$s_!S65Z!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 1272w, https://substackcdn.com/image/fetch/$s_!S65Z!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b0d93f2-9e88-4458-9d4b-244cd1680930_2912x1632.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every large enterprise I talk to has an AI policy. None of them have an AI security program. The policy sits in SharePoint, gets signed off by legal and compliance, and then nothing happens. Engineering ships agents. Finance runs GenAI copilots. HR tries AI resume screening. The policy says &#8220;you must have a governance review before deploying AI,&#8221; and none of those teams did one. Three years of policy work produced zero impact.</p><p>This is the gap. A policy is a document that describes intent. A program is the operating model, the people, the processes, the controls, and the feedback loops that turn intent into reality. Building an AI security program means moving from &#8220;we have rules&#8221; to &#8220;we have visibility, consistent decision-making, and measurable risk reduction.&#8221; This post is a blueprint for that move. I&#8217;ll walk you through the maturity curve, the organizational choices you have to make (and most teams get wrong), how to start inventory and discovery from scratch, the translation problem that kills most programs, the tooling landscape in 2026, and how to report AI risk to your board in terms they care about.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Why most AI policies are shelfware</h2><p>An AI policy typically has three sections. First: what data can go into AI systems. Second: how to disclose AI use in customer deliverables. Third: which tools require IT approval. These are sensible rules. Almost none of them are enforced.</p><p>The reason is not that teams are rebels. It&#8217;s that policies lack operational infrastructure. A policy is a rule. A program is the mechanism that makes a rule actually apply to real decisions in real time. No program, and the policy becomes fiction almost immediately.</p><p>Here&#8217;s what actually happens: a policy says &#8220;ChatGPT use requires prior approval.&#8221; Six months later you do an audit and find 47 teams using ChatGPT. When you ask why, the answer is: &#8220;We never knew we had to ask. There was no process to ask. We didn&#8217;t realize it needed approval.&#8221; The policy was there. The operational surface was not.</p><p>Building a program fixes this. It means embedding the policy into a workflow, a tool, a role, a standing meeting. It means having a person whose job is to answer &#8220;does this AI deployment need review, and if so, what does review look like?&#8221; It means discovery running every 90 days so you know what&#8217;s actually happening. It means controls that prevent circumvention (or at minimum, make circumvention detectable). And it means reporting, to leadership, that shows not just what the program is supposed to do but what it&#8217;s actually doing.</p><p>Most teams skip this because it looks like overhead. It is. It&#8217;s also the difference between a policy that matters and a policy that was money to the consultant who wrote it.</p><h2>The five stages of AI security program maturity</h2><p>Maturity levels help you assess where you are and what move comes next. I&#8217;ve sorted programs into five stages based on what I&#8217;ve seen across 15+ enterprise deployments.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jl-X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jl-X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 424w, https://substackcdn.com/image/fetch/$s_!jl-X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 848w, https://substackcdn.com/image/fetch/$s_!jl-X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 1272w, https://substackcdn.com/image/fetch/$s_!jl-X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jl-X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png" width="1456" height="1003" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1003,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 1: Five-stage AI security maturity model&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 1: Five-stage AI security maturity model" title="IMAGE 1: Five-stage AI security maturity model" srcset="https://substackcdn.com/image/fetch/$s_!jl-X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 424w, https://substackcdn.com/image/fetch/$s_!jl-X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 848w, https://substackcdn.com/image/fetch/$s_!jl-X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 1272w, https://substackcdn.com/image/fetch/$s_!jl-X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90e7b3be-f4e2-4cf2-ab2b-c7b69c933b66_4220x2908.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Stage 1: Ad hoc.</strong> You have no formal AI security process. Teams deploy AI systems when they decide to. There&#8217;s no inventory, no approval gate, no controls. The only thing preventing disaster is luck and the fact that your teams haven&#8217;t tried anything risky yet. Many organizations are here and don&#8217;t know it.</p><p><strong>Stage 2: Documented.</strong> You have written policy. You&#8217;ve assigned responsibility to someone, usually a CISO deputy or a GRC analyst. There&#8217;s a process document somewhere that describes how teams should request AI deployments. Compliance sign-off is a gate. The problem: the process has no enforcement mechanism. If a team goes around it, you find out in an audit, if at all. You&#8217;re in this stage if your policy is current but your inventory is incomplete.</p><p><strong>Stage 3: Managed.</strong> You have a formal intake process with enforcement. New AI deployments go through a review gate before they go into production. You have a partial inventory of systems. You have a person or small team that owns the program day-to-day. You know about most of what&#8217;s happening, though not all. You&#8217;re capable of saying &#8220;no&#8221; to an unsafe deployment. The gap: your controls are still mostly manual and preventative. You don&#8217;t yet have automated discovery or continuous monitoring.</p><p><strong>Stage 4: Measured.</strong> You have automated discovery running continuously. You have logging and monitoring of AI systems in production. You can see, with data, whether the program is reducing risk or just adding process. You have incident response playbooks for AI-related issues. Your team owns the full lifecycle: intake, deployment, monitoring, retirement. You report metrics to the board. This is the stage where an AI security program starts actually working.</p><p><strong>Stage 5: Optimized.</strong> You have closed the feedback loop. Incident data feeds back into the policy. Deployment patterns feed back into the controls. You&#8217;re shipping controls faster than teams find workarounds. Your program has reached the point where it&#8217;s expensive to circumvent than to comply. This is rare and is the goal.</p><p>Most mature programs in 2026 are between Stage 3 and Stage 4. A few Fortune 500s have reached Stage 4. Nobody&#8217;s at 5 yet.</p><h2>Who owns AI security: CISO, CIO, or Chief AI Officer?</h2><p>This question comes up in every org-chart redesign. The answer has cost me client relationships because I&#8217;m about to tell you the thing nobody wants to hear: you need all three, and they need to coordinate, and most orgs make this harder than it has to be.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6TLI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6TLI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 424w, https://substackcdn.com/image/fetch/$s_!6TLI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 848w, https://substackcdn.com/image/fetch/$s_!6TLI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 1272w, https://substackcdn.com/image/fetch/$s_!6TLI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6TLI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png" width="1456" height="1475" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1475,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 2: AI security ownership org chart&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 2: AI security ownership org chart" title="IMAGE 2: AI security ownership org chart" srcset="https://substackcdn.com/image/fetch/$s_!6TLI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 424w, https://substackcdn.com/image/fetch/$s_!6TLI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 848w, https://substackcdn.com/image/fetch/$s_!6TLI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 1272w, https://substackcdn.com/image/fetch/$s_!6TLI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0c6e8bd-cd38-4937-9572-c6ed259cdd3c_2392x2424.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s the responsibility map:</p><p><strong>The CISO owns the risk.</strong> If an AI system breaches, or leaks data, or gets compromised, the CISO is accountable. The CISO needs final sign-off on high-risk AI deployments. The CISO owns the threat model, the control framework, and the incident response plan. This can&#8217;t be delegated.</p><p><strong>The CIO or Chief Technology Officer owns the operational surface.</strong> The CIO knows the tools, the infrastructure, the data flows. The CIO knows which systems can connect to which data sources, what network access looks like, what the backup and disaster-recovery story is. The CISO&#8217;s controls don&#8217;t work if the CIO isn&#8217;t involved in translating them to technical reality. For agentic systems, this is especially true - see our <a href="./agentic-ai-security-ciso-guide">agentic AI security guide</a> for how the CIO role expands.</p><p><strong>The Chief AI Officer (if you have one) owns the velocity.</strong> The Chief AI Officer&#8217;s job is to unblock teams that want to deploy AI, to maintain standards, to drive adoption. If the CISO and CAO aren&#8217;t aligned, one of two things happens: either AI deployments slow to a crawl (CISO wins, company loses), or risk gets dismissed (CAO wins, company loses later). The CAO needs to be in the room, negotiating tradeoffs, not circling back after decisions are made.</p><p>The common mistake is to give ownership to one person and call it solved. That never works. What works is explicit coordination, clear ownership boundaries, and a decision-making framework that includes all three perspectives.</p><p>If you don&#8217;t have a Chief AI Officer yet, the CISO and CIO need to own this jointly. One of them leads (usually the CISO for risk-critical decisions, the CIO for operational ones), but decisions get made together.</p><h2>Building the AI inventory: the step everyone skips</h2><p>You cannot secure what you have not enumerated. Yet most organizations starting an AI security program skip inventory and jump straight to policy. This is the wrong priority order.</p><p>Here&#8217;s why inventory comes first: a policy that covers the AI systems you don&#8217;t know about is worth zero. An inventory tells you the true scope of the problem. It tells you what&#8217;s high-risk, what&#8217;s benign, what you didn&#8217;t know about. Inventory feeds everything else: the control baseline, the prioritization, the board narrative.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ViF5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ViF5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 424w, https://substackcdn.com/image/fetch/$s_!ViF5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 848w, https://substackcdn.com/image/fetch/$s_!ViF5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 1272w, https://substackcdn.com/image/fetch/$s_!ViF5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ViF5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png" width="1456" height="813" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:813,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 3: AI inventory dimensions and discovery layers&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 3: AI inventory dimensions and discovery layers" title="IMAGE 3: AI inventory dimensions and discovery layers" srcset="https://substackcdn.com/image/fetch/$s_!ViF5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 424w, https://substackcdn.com/image/fetch/$s_!ViF5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 848w, https://substackcdn.com/image/fetch/$s_!ViF5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 1272w, https://substackcdn.com/image/fetch/$s_!ViF5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02f0b3ab-f653-4590-a656-2463fc264b0a_3124x1744.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>An AI inventory has three dimensions:</p><p><strong>First, the systems dimension.</strong> Every AI system the organization uses or builds. This includes: GenAI tools your teams use (ChatGPT, Claude, Gemini), custom LLM applications your engineering team built, AI features embedded in purchased software (Salesforce Agentforce, GitHub Copilot, Microsoft Copilot), agentic systems and automation.</p><p><strong>Second, the data dimension.</strong> For each system, what data can flow in and out? Is it production customer data, anonymized data, training data, logs? Is it flowing to third parties or staying internal? What&#8217;s the classification? Most inventory-taking misses this because it requires cross-team coordination with data governance, and that&#8217;s annoying.</p><p><strong>Third, the ownership dimension.</strong> Who owns the system? Who makes deployment decisions? Who&#8217;s responsible if something goes wrong? Without this, you can&#8217;t make prioritization decisions later.</p><p>Most teams approach inventory reactively: they ask teams to report their AI use. Compliance sends an email. Teams fill out a form. You get 30% response rate and 200% false positives. This is the approach that fails.</p><p>A better approach is active discovery, layered:</p><p>Start with <strong>network discovery.</strong> Monitor your network for outbound connections to known AI vendors (OpenAI, Anthropic, Google, Mistral, etc.). Log them for 30 days and correlate by source. This is cheap and gives you a baseline of <a href="./shadow-ai-detection-governance">shadow AI</a> that your teams are using.</p><p>Add <strong>security-tool signals.</strong> Your DLP, your SaaS management tool, your proxy, your EDR, all have AI use signals. Collect these into a single inventory and deduplicate.</p><p>Then send <strong>a survey, but target it.</strong> Ask only the teams that showed up in network or security signals whether they&#8217;re using AI, what for, and what data touches it. Response rate will be 80%+.</p><p>Finally, <strong>conduct spot interviews</strong> with engineering, finance, and legal to catch what network discovery missed. Ask: &#8220;What AI systems have you shipped in the last 90 days that you use internally or ship to customers?&#8221; You&#8217;ll find 20% of the systems this way.</p><p>The result of 90 days of this work is a credible inventory. Not perfect, but credible. And credible is enough to start.</p><h2>Policy to standards to controls: the translation problem</h2><p>Many organizations write a policy and then immediately jump to tooling. They buy an AI red-teaming tool, or an AI DLP, or a discovery platform, and expect it to solve the problem. The policy doesn&#8217;t connect to the tool. Teams don&#8217;t know what to do with the tool. Risk doesn&#8217;t go down.</p><p>The missing layer is standards. Standards translate policy into specific, testable criteria. Controls are then the implementation of those standards.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yhmf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yhmf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 424w, https://substackcdn.com/image/fetch/$s_!yhmf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 848w, https://substackcdn.com/image/fetch/$s_!yhmf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 1272w, https://substackcdn.com/image/fetch/$s_!yhmf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yhmf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png" width="1456" height="666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:666,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 4: Policy-to-standards-to-controls translation flow&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 4: Policy-to-standards-to-controls translation flow" title="IMAGE 4: Policy-to-standards-to-controls translation flow" srcset="https://substackcdn.com/image/fetch/$s_!yhmf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 424w, https://substackcdn.com/image/fetch/$s_!yhmf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 848w, https://substackcdn.com/image/fetch/$s_!yhmf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 1272w, https://substackcdn.com/image/fetch/$s_!yhmf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F465aaf73-2dd3-40c9-8968-517c12885c8e_3260x1492.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s what this looks like in practice:</p><p><strong>Policy says:</strong> &#8220;AI deployments involving sensitive customer data require risk assessment before deployment.&#8221;</p><p>This is too vague to act on. Who does the assessment? What &#8220;sensitive&#8221; means? How long does assessment take? Can teams ship if the assessment is in progress? What makes an assessment &#8220;adequate?&#8221;</p><p><strong>Standards say:</strong> &#8220;Any AI system that processes, trains on, or outputs financial data, health data, or personal identifying information must undergo a data classification review. The review must confirm: (1) the data classification is accurate, (2) the AI provider&#8217;s data handling terms are compatible with that classification, (3) there&#8217;s a data processing addendum in place if required by law. This review completes before the system goes to production. Approval is CISO sign-off for financial and health data, CIO sign-off for PII.&#8221;</p><p>This is specific enough to act on. Now the control question becomes operational.</p><p><strong>Controls might include:</strong> An intake form that auto-flags systems handling sensitive data. A template data processing addendum. A spreadsheet that tracks DPAs by vendor. Quarterly audits that verify all high-risk systems have completed reviews.</p><p>The problem is almost nobody has this three-layer structure. They have policy. They have tools. They don&#8217;t have standards. The result is Kabuki: tools run, reports get generated, nobody knows if risk is actually lower.</p><p>To build this out, start with your top three policies (the ones that apply to highest-risk deployments). For each one, write standards that ask: what specific decisions need to be made? Who makes them? What information do they need? How do they record the decision? Then and only then design the control.</p><h2>The AI security stack in 2026: tools and categories</h2><p>The AI security vendor landscape is young and chaotic. Some categories are essential. Some are marketing.</p><p>The essential categories:</p><p><strong>AI discovery and inventory.</strong> You need visibility into shadow AI. Tools like Harmonic, Lasso, and Netskope have built AI-specific discovery into their SaaS management or DLP platforms. These matter most when you&#8217;re starting inventory. The honest assessment: commodity SaaS management (Zylo, Flexera) plus a SaaS network proxy (Netskope, Gremlin) gets you 70% of the way there. AI-specific tools add the last 30%. Start with commodity tools, add specialty tools only if the 30% gap is mission-critical.</p><p><strong>AI red teaming and evaluation.</strong> If you&#8217;re running custom LLM applications or agentic systems, quarterly red teaming is essential. Tools matter here, and the market is nascent. Options include: building it in-house with open-source frameworks (Garak, PyRIT), hiring consultants (Anthropic, OpenAI, and dozens of smaller firms), or using platform features (OpenAI&#8217;s early red-teaming preview, Anthropic&#8217;s classifier). No vendor has cracked this yet. Expect to combine approaches.</p><p><strong>LLM-specific DLP.</strong> Traditional DLP was built for email. It&#8217;s not built for LLM prompts, LLM outputs, or agent-orchestrated data movement. <a href="./llm-dlp-data-leakage-prevention">LLM DLP</a> is a new category. Vendors include Lasso, Harmonic, Netskope, and DoControl. The honest take: these tools reduce shadow AI and obvious mistakes. They don&#8217;t solve intentional data exfiltration, because a motivated team can move data outside the tool&#8217;s view. Think of them as raising the cost of misuse, not preventing determined exfiltration.</p><p><strong>AI agent identity and governance.</strong> If you&#8217;re deploying agents, you need identity. Options range from extending service-account IAM (cheap, limited) to building specialized <a href="./ai-agent-identity-iam">non-human identity</a> (NHI) infrastructure (expensive, future-proof). Vendors include Aembit, Clutch, Orchid, and Astrix. This is premature for many organizations in early 2026, but worth tracking.</p><p><strong>AI security posture management.</strong> Vendors like Wiz, Snyk, and Dependabot have started covering &#8220;AI security,&#8221; but mostly they&#8217;re selling existing tools that incidentally touch LLMs. True CSPM for AI systems doesn&#8217;t exist yet. When it does, it&#8217;ll be a CISO-friendly dashboard showing: what AI systems you have, what risk profile each one has, what controls are in place, which ones are drifting out of policy, which ones need attention this week. This is probably 12 months away for any vendor.</p><p>The low-priority category:</p><p><strong>&#8220;AI-powered&#8221; threat detection on AI systems.</strong> Using machine learning to detect anomalous agent behavior sounds good in a pitch. In practice, the false-positive rate is too high and the ROI doesn&#8217;t justify it. Rules-based detection on well-instrumented logging (timestamp, user, action, result, latency) is more reliable and cheaper. Don&#8217;t fall for this category yet.</p><p>Most organizations should start with: discovery tool (could be commodity), logging infrastructure (Splunk, Datadog, or similar), and a red-teaming plan (internal or consultant-led). Add specialized tools as specific problems emerge.</p><h2>How to report AI risk to the board</h2><p>The board doesn&#8217;t want to know about your AI policy. They don&#8217;t care about your maturity level. They care about three things: probability of incident, business impact if it happens, and whether you&#8217;re on top of it.</p><p>AI risk reporting should follow this structure:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_I4X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_I4X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 424w, https://substackcdn.com/image/fetch/$s_!_I4X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 848w, https://substackcdn.com/image/fetch/$s_!_I4X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 1272w, https://substackcdn.com/image/fetch/$s_!_I4X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_I4X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png" width="1456" height="1412" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1412,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 5: Board-ready AI risk dashboard&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 5: Board-ready AI risk dashboard" title="IMAGE 5: Board-ready AI risk dashboard" srcset="https://substackcdn.com/image/fetch/$s_!_I4X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 424w, https://substackcdn.com/image/fetch/$s_!_I4X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 848w, https://substackcdn.com/image/fetch/$s_!_I4X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 1272w, https://substackcdn.com/image/fetch/$s_!_I4X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F49827ce8-c95f-48e3-b0e4-b96f022bda50_2900x2812.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Headline (one slide).</strong> &#8220;We have X AI systems in production. Y of them are high-risk due to data access or autonomous action. We have controls in place for all Y. No breaches or incidents in the past 90 days. We&#8217;re monitoring for Z.&#8221; Make this one visual, heavily data-driven, honest about what you don&#8217;t yet know.</p><p><strong>Risk breakdown (one slide).</strong> A 2x2 matrix. Axis 1: likelihood of breach (low to high, based on threat surface + controls). Axis 2: business impact if breached (cost, customer impact, regulatory). Plot each high-risk system as a point. This is the frame the board already thinks in.</p><p><strong>Control validation (one slide).</strong> What evidence do you have that your controls are working? If you run red teaming quarterly, show: &#8220;We ran red teams on our three highest-risk systems. We found N issues. We fixed M of them before they became real incidents.&#8221; Real data, not claims.</p><p><strong>Roadmap (one slide).</strong> What&#8217;s your program doing this quarter? Focus on the things that reduce the risk in the headline visual. &#8220;We&#8217;re extending our inventory to include embedded AI in purchased tools&#8221; or &#8220;We&#8217;re deploying AI agent identity controls for our autonomous workflow systems.&#8221; Nothing aspirational. Nothing that&#8217;s been on the roadmap for six months.</p><p>The mistake most organizations make is sending the board a narrative document. CISOs love detailed explanations. Boards skip to the bottom to find the one sentence that tells them whether to worry. Give the board data. Give them the two-sentence version first. Put detail in backup slides for the three board members who care.</p><h2>The AI security stack in 2026: specific vendors</h2><p>The vendor landscape in 2026 includes:</p><p><strong>AI discovery:</strong> Harmonic, Lasso Security (Slack + code), Netskope (web + SaaS), Airtight.</p><p><strong>AI governance frameworks:</strong> Orchid, Prophet Security (for compliance workflows).</p><p><strong>Agentic identity:</strong> Aembit, Astrix, Orchid.</p><p><strong>Red teaming:</strong> Anthropic, OpenAI (limited), DIY with Garak/PyRIT, consultants.</p><p><strong>LLM DLP:</strong> Lasso, Harmonic, Netskope, DoControl.</p><p>The list will shift. New vendors are shipping weekly. The framework matters more than the vendor: focus on the category, evaluate tools against your specific requirement, and avoid buying multiple tools that do the same thing.</p><h2>Frequently asked questions</h2><h3>Is AI security a CISO or Chief AI Officer responsibility?</h3><p>Both. The CISO owns risk. The Chief AI Officer owns velocity. You need both perspectives at the table, and you need a decision framework that honors both. If you only have one, you&#8217;ll optimize in a way that breaks the other one. For EU-regulated organizations, this coordination becomes even more critical - see <a href="./eu-ai-act-compliance-ciso">EU AI Act compliance</a> for the specific obligations that shape this relationship.</p><h3>What does a mature AI security program look like in practice?</h3><p>Stage 4 maturity: you have inventory (automated, updated quarterly). You have clear policies with operational standards. You have controls that prevent most mistakes and detect violations. You have incident response playbooks. You run red teams quarterly on high-risk systems. You report to the board quarterly with data on risk and control effectiveness. You have a person or small team that owns the program full-time. Incident response for AI events is fast and informed.</p><h3>What&#8217;s the first thing to build when starting an AI security program?</h3><p>Inventory. You cannot prioritize, policy, or control what you haven&#8217;t enumerated. Spend 30 days on discovery, build a credible list of AI systems, and then layer standards and controls on top. Policy is almost always premature until you understand what you&#8217;re protecting.</p><h3>How do I report AI risk to the board without getting into the weeds?</h3><p>Use a single visual: a 2x2 matrix with threat likelihood (x-axis) and business impact (y-axis). Plot each high-risk AI system as a point. One sentence per quadrant explaining what you&#8217;re doing about it. Backup slides with detail for the board members who ask.</p><h3>What&#8217;s a realistic 12-month roadmap for a new AI security program?</h3><p>Months 1-2: Inventory and discovery (active + reactive). Months 3-4: Write standards and map controls. Months 5-6: Deploy automated discovery tool, logging infrastructure. Months 7-8: Run first red teams, establish incident response. Months 9-10: Board reporting, policy socialization, gap-closure planning. Months 11-12: Iterate on controls, train teams, measure effectiveness. By month 12 you should be at Stage 3 maturity: managed, with strong visibility and clear governance. Stage 4 (measured, with automation and data-driven improvement) is a 12-month push from there.</p><div><hr></div><p><em>If this was useful, subscribe to Cyberwow for the CISO-only filter on AI security - no vendor pitches, no news cycle, just decision-oriented analysis.</em></p><div><hr></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The CISO’s Guide to Agentic AI Security]]></title><description><![CDATA[.]]></description><link>https://cyberwow.com/p/the-cisos-guide-to-agentic-ai-security</link><guid isPermaLink="false">https://cyberwow.com/p/the-cisos-guide-to-agentic-ai-security</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Wed, 22 Apr 2026 15:23:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!g6Mq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g6Mq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g6Mq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 424w, https://substackcdn.com/image/fetch/$s_!g6Mq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 848w, https://substackcdn.com/image/fetch/$s_!g6Mq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 1272w, https://substackcdn.com/image/fetch/$s_!g6Mq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g6Mq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png" width="1456" height="670" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:670,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 1: AI security eras stacked&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 1: AI security eras stacked" title="IMAGE 1: AI security eras stacked" srcset="https://substackcdn.com/image/fetch/$s_!g6Mq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 424w, https://substackcdn.com/image/fetch/$s_!g6Mq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 848w, https://substackcdn.com/image/fetch/$s_!g6Mq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 1272w, https://substackcdn.com/image/fetch/$s_!g6Mq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7abfac4b-33d6-43b9-8bc1-4be23aa8de30_3244x1492.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every CISO I talk to in 2026 has the same blind spot. They&#8217;ve spent two years building AI security strategy around &#8220;LLMs in the enterprise&#8221;, DLP for prompts, acceptable use policies, a bake-off between ChatGPT Enterprise and Copilot. Then a product team quietly shipped an agentic tool. Now there&#8217;s an autonomous thing in their infrastructure that takes actions, calls APIs, reads files, writes to systems, and occasionally calls a second LLM to help it decide what to do next. None of the LLM controls apply. And nobody&#8217;s sure whose problem it is.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This is the agentic AI security gap. It&#8217;s not a new category of threat, it&#8217;s a new category of <em>system</em>, and the controls we built for chatbots don&#8217;t survive contact with it. This guide is a framework for CISOs trying to close that gap without stalling the business. We&#8217;ll cover what actually changes when you move from generative to agentic AI, the four new attack surfaces your threat model has to absorb, which controls meaningfully reduce risk versus which ones waste budget, and a concrete 90-day plan for getting your organization to defensible ground.</p><h2>Why agentic AI breaks the traditional security stack</h2><p>A generative AI system takes input and returns output. A user asks ChatGPT a question, it answers. You can treat the whole thing like a pipe: inspect what goes in (DLP on prompts), inspect what comes out (content filters on responses), and govern the people using it (acceptable use policy, training).</p><p>Agentic AI is not a pipe. It&#8217;s a loop. An agent receives a goal, decides what steps to take, calls tools to take those steps, observes the results, updates its plan, and keeps going until it decides it&#8217;s done. At each step it might invoke another model, another agent, an API, a browser, a database, or a filesystem. The &#8220;prompt&#8221; is now a program. The &#8220;response&#8221; is a trail of actions with real-world side effects.</p><p>Three things break the moment you introduce this loop:</p><p><strong>Your perimeter assumption breaks.</strong> Traditional AI security assumes LLM calls happen at well-defined chokepoints, a ChatGPT Enterprise tenant, a Copilot license, an API gateway in front of your own LLM. Agentic systems make LLM calls from everywhere: inside tool handlers, inside sub-agents, inside recursive planning steps. A single user query can fan out into dozens of LLM calls across multiple providers in multiple jurisdictions. Chokepoint-based controls don&#8217;t cover this.</p><p><strong>Your identity assumption breaks.</strong> Your IAM was built for humans, and then patched to accommodate service accounts. Agents are neither. An agent acting on behalf of a user isn&#8217;t the user, it has different risk, different rate limits, different failure modes. An agent acting autonomously in a background job isn&#8217;t a service account, its behavior is non-deterministic and depends on model outputs. We cover this in depth in our <a href="./ai-agent-identity-iam">AI agent identity guide</a>, but the short version: your existing IAM can&#8217;t answer &#8220;who took this action&#8221; for agent-mediated events.</p><p><strong>Your auditability assumption breaks.</strong> A SIEM can ingest logs from your SaaS stack and correlate who did what, when. An agent took an action &#8220;because the model decided to&#8221;, which means the causal chain for any given event includes the model&#8217;s training data, the prompt, the tools available, the order results came back in, and the non-determinism of the model&#8217;s output. Root-cause analysis for agent incidents is not the same discipline as IR for normal systems. The tooling is nascent, the skills are rare, and most SOC playbooks have no entry for &#8220;the agent did something unexpected.&#8221;</p><p>None of these are solved by a vendor buying you a new dashboard. They require rethinking the control surface.</p><h2>The four new attack surfaces</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HYYe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HYYe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 424w, https://substackcdn.com/image/fetch/$s_!HYYe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 848w, https://substackcdn.com/image/fetch/$s_!HYYe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 1272w, https://substackcdn.com/image/fetch/$s_!HYYe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HYYe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png" width="1456" height="1645" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1645,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 2: Four attack surfaces diagram&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 2: Four attack surfaces diagram" title="IMAGE 2: Four attack surfaces diagram" srcset="https://substackcdn.com/image/fetch/$s_!HYYe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 424w, https://substackcdn.com/image/fetch/$s_!HYYe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 848w, https://substackcdn.com/image/fetch/$s_!HYYe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 1272w, https://substackcdn.com/image/fetch/$s_!HYYe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F151a4f65-ef2b-4c0a-a02b-f1c98d590df8_3504x3960.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every agent has four attack surfaces that don&#8217;t exist, or exist very differently, in non-agentic AI systems. Your threat model needs to treat them explicitly.</p><p><strong>1. The prompt surface.</strong> This includes every input to every LLM call the agent makes, user queries, tool outputs, document contents, retrieved context, and internal reasoning steps. The threat category here is <a href="./prompt-injection-field-manual">prompt injection</a>, including the indirect variants where attacker-controlled content flows into the prompt via a tool output or a document the agent reads. If the agent reads an email, the email is a prompt. If it reads a Slack message, that&#8217;s a prompt. If it browses the web, every page is a prompt. This surface is larger than most teams realize.</p><p><strong>2. The tool surface.</strong> Every tool or API the agent can call is an attack surface. If the agent has shell access, shell is the surface. If it has read/write access to Salesforce, Salesforce is the surface. The threat isn&#8217;t just &#8220;the tool gets abused&#8221;, it&#8217;s &#8220;the tool gets called in combinations the designer didn&#8217;t anticipate, with arguments the model generated, based on context the attacker influenced.&#8221; <a href="./mcp-security-attack-surface">MCP security</a> is a subset of this surface, but every tool protocol (function-calling APIs, custom integrations, plugin ecosystems) has equivalent risk.</p><p><strong>3. The memory surface.</strong> Agentic systems store state, conversation history, long-term memory, vector databases of past interactions, cached retrieval results. This memory becomes a persistence mechanism for attacks. If an attacker poisons an agent&#8217;s memory in one session, the poison persists into future sessions. This is the agentic equivalent of stored XSS: a one-shot attack that keeps paying out.</p><p><strong>4. The plan surface.</strong> Agents that plan multi-step actions have a reasoning trace, an explicit or implicit sequence of steps it intends to take. Adversarial inputs can corrupt the plan at any point: get the agent to skip a verification step, escalate privileges under the justification of &#8220;the task requires it,&#8221; or take an irreversible action before a human can intervene. Defenses against plan-level attacks are still being invented.</p><p>Every agentic system deployment should have a threat model that walks all four surfaces. Not as a compliance exercise, as a pre-mortem. If you can&#8217;t describe how each surface is being defended, you haven&#8217;t threat-modeled the system; you&#8217;ve rubber-stamped it.</p><h2>A CISO&#8217;s threat model for agentic systems</h2><p>The MITRE ATLAS project and OWASP&#8217;s LLM Top 10 both provide useful tactical taxonomies, but neither gives a CISO a threat model organized around decisions. Here&#8217;s the model I use.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JpDA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JpDA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 424w, https://substackcdn.com/image/fetch/$s_!JpDA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 848w, https://substackcdn.com/image/fetch/$s_!JpDA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 1272w, https://substackcdn.com/image/fetch/$s_!JpDA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JpDA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png" width="1456" height="1806" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1806,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 3: Five threat model decisions&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 3: Five threat model decisions" title="IMAGE 3: Five threat model decisions" srcset="https://substackcdn.com/image/fetch/$s_!JpDA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 424w, https://substackcdn.com/image/fetch/$s_!JpDA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 848w, https://substackcdn.com/image/fetch/$s_!JpDA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 1272w, https://substackcdn.com/image/fetch/$s_!JpDA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F08f4e490-0799-41a5-8628-91c5619aac75_1928x2392.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Decision 1: What is this agent allowed to do?</strong> Not a policy question, an architectural question. For every agent in your estate, document the blast radius of a complete compromise. If this agent were fully controlled by an attacker for 30 minutes, what&#8217;s the worst outcome? This is your starting risk, before any controls. If the answer to &#8220;worst outcome&#8221; is &#8220;trivial&#8221;, the agent summarizes text and does nothing else, your controls can be minimal. If the answer is &#8220;exfiltrates the customer database,&#8221; the control requirement is different by orders of magnitude.</p><p><strong>Decision 2: Who or what can influence this agent&#8217;s context?</strong> For every agent, enumerate every source of untrusted input that can end up in its prompt. Email content? Customer support tickets? Web pages the agent browses? Documents from partners? Salesforce records edited by sales reps? All of these are injection vectors if the agent&#8217;s prompt ingests them. The more untrusted sources feed the prompt, the higher the prompt surface risk.</p><p><strong>Decision 3: Which of this agent&#8217;s tools have irreversible effects?</strong> Reversibility is the single strongest lever in agent security. An agent that can read anything but only write via human-approved actions has dramatically less risk than one that writes autonomously. For each agent, list every tool and classify: reversible, reversible-with-effort, irreversible. Every irreversible tool is a place you need stronger controls, typically a human-in-the-loop approval or a hard allow-list.</p><p><strong>Decision 4: What does this agent remember, and for how long?</strong> Memory is persistence. Document what state the agent retains across sessions and how that state can be inspected, edited, or wiped by a human. Memory without a &#8220;flush&#8221; capability is a liability.</p><p><strong>Decision 5: Who owns incident response for this agent?</strong> If this agent behaves unexpectedly tomorrow, who gets paged? Who has the authority to shut it off? This sounds trivial and is almost never answered correctly in practice. The SOC doesn&#8217;t want to own it because they don&#8217;t understand it. The AI team doesn&#8217;t want to own it because they don&#8217;t do IR. The result, predictably, is that nothing gets owned.</p><p>Every agent deployment in your estate should have answers to all five decisions documented, reviewed, and filed somewhere the CISO&#8217;s office can retrieve. No answers, no deployment. It is cheaper to kill an agent deployment at this stage than to add controls after.</p><h2>The governance gap: why your existing AI policy doesn&#8217;t cover agents</h2><p>Most enterprise AI policies in 2026 were written with three things in mind: (1) don&#8217;t paste customer data into ChatGPT, (2) disclose AI use in deliverables, (3) route new AI tool adoption through IT. None of the three cover agents.</p><p><strong>&#8220;Don&#8217;t paste data into AI&#8221;</strong> assumes a human is the one doing the pasting. With agents, the agent reads the data and calls the LLM. There&#8217;s no human pasting. The policy needs to govern what data can be in the context an agent operates in, not what a human types into a chatbot.</p><p><strong>&#8220;Disclose AI use&#8221;</strong> assumes a discrete moment of AI use to disclose. An agentic pipeline might invoke models 30 times across a 10-minute task. The policy needs to govern disclosure at the workflow level, not the call level.</p><p><strong>&#8220;Route new AI tools through IT&#8221;</strong> assumes AI tools are purchased. An agent can be spun up by a developer in 20 minutes with an API key and a local script. There is no procurement event to intercept. The policy needs to govern agent <em>creation</em> by builders, not just agent <em>purchase</em> by buyers.</p><p>This is what I mean by the governance gap. Your AI policy, however thoughtfully written, was written for a world where AI was a product people used. Agents are AI you build, or AI that third parties ship into your environment inside other products. The policy surface shifted underneath the ink.</p><p>Closing the gap doesn&#8217;t mean rewriting the AI policy from scratch; it means layering an <em>agent policy</em> on top. A working agent policy answers: Who can create agents? What data classifications can agents access? What tools require approval before agent integration? What&#8217;s the agent-level logging requirement? How does an agent get retired? I unpack the full program build in <a href="./ai-security-program-playbook">building an AI security program</a>, but the key move is separating agent policy from AI policy. They&#8217;re related, not the same.</p><h2>Controls that reduce risk (and what wastes budget)</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5bZI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5bZI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 424w, https://substackcdn.com/image/fetch/$s_!5bZI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 848w, https://substackcdn.com/image/fetch/$s_!5bZI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 1272w, https://substackcdn.com/image/fetch/$s_!5bZI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5bZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png" width="1456" height="1435" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1435,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 4: Controls comparison matrix&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 4: Controls comparison matrix" title="IMAGE 4: Controls comparison matrix" srcset="https://substackcdn.com/image/fetch/$s_!5bZI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 424w, https://substackcdn.com/image/fetch/$s_!5bZI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 848w, https://substackcdn.com/image/fetch/$s_!5bZI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 1272w, https://substackcdn.com/image/fetch/$s_!5bZI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56706297-8b08-43af-9615-5102ecf0e5a5_3296x3248.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Budget is finite. Here are the controls that, in my experience across more than a dozen enterprise engagements, actually reduce agentic AI risk. And a shorter list of things vendors will push that don&#8217;t.</p><h3>What works</h3><p><strong>Human-in-the-loop gates on irreversible actions.</strong> If an agent can send money, delete data, or publish content externally, require a human confirmation step. This is unglamorous, limits throughput, and is the single highest-ROI control. Most agentic disasters are averted by a confirmation prompt.</p><p><strong>Tool-scoping and least-privilege.</strong> Every agent gets the minimum tool access needed for its job, and no more. This is IAM hygiene applied to tools. It sounds obvious; almost no one does it rigorously.</p><p><strong>Prompt/tool output logging and retention.</strong> Log every LLM call the agent makes, every tool call it makes, every result it got, and keep them for at least 90 days. You don&#8217;t know what you&#8217;ll need to investigate until something happens. This is the minimum for agent observability, you can&#8217;t IR what you can&#8217;t see.</p><p><strong>Input boundary enforcement.</strong> Define the classes of input that can flow into an agent&#8217;s prompt and enforce it at the ingest point. If &#8220;customer support ticket text&#8221; is allowed but &#8220;raw inbound email&#8221; is not, your ingestion code enforces that separation. This is prompt injection defense in depth.</p><p><strong>AI red teaming, quarterly, scoped to actual agents in production.</strong> Not abstract LLM red teaming, your agents, your tools, your data, your environment. See <a href="./ai-red-teaming-methodology">AI red teaming methodology</a> for how to scope this.</p><h3>What wastes money</h3><p><strong>LLM content filters as a primary control.</strong> Filters catch obvious bad outputs. Motivated attackers route around them. They are defense in depth, not a primary control. If a vendor&#8217;s pitch centers on filters, push back.</p><p><strong>Prompt-sanitization tools that claim to prevent injection.</strong> No such tool reliably prevents prompt injection. They&#8217;re marketing. Real defense is architectural: limiting what an agent can do with a compromised prompt, not trying to make the prompt un-compromisable.</p><p><strong>&#8220;Shadow AI discovery&#8221; tools for agent discovery.</strong> Current discovery tools find SaaS AI usage (ChatGPT, Claude, Gemini) by traffic inspection. They do not find agents your developers built. Don&#8217;t expect a discovery tool to solve your agent inventory problem, see <a href="./shadow-ai-detection-governance">shadow AI</a> for what these tools actually do.</p><p><strong>AI-powered threat detection on top of agent logs.</strong> This is the most 2026 thing imaginable: using AI to watch your AI. There&#8217;s a real product category here eventually, but as of today the signal-to-noise ratio isn&#8217;t worth the money. Rules-based detection on well-structured agent logs is more useful and cheaper.</p><h2>How to evaluate agentic AI vendors in 2026</h2><p>When a vendor brings you an agentic product, these are the five questions that separate the ready from the not-ready.</p><ol><li><p><strong>&#8220;Walk me through the full sequence of LLM and tool calls for a typical user request. Who sees what data?&#8221;</strong> A vendor who can&#8217;t answer this has not mapped their own system.</p></li><li><p><strong>&#8220;What happens if the user&#8217;s query contains a prompt injection that tries to redirect the agent?&#8221;</strong> You&#8217;re looking for an architectural answer (the agent&#8217;s tools are scoped, irreversible actions require confirmation), not a filter answer.</p></li><li><p><strong>&#8220;Show me the last agent-level incident in your platform and the post-mortem.&#8221;</strong> Every real agentic product has had one. Vendors who claim they haven&#8217;t are lying or haven&#8217;t been in production long enough. The quality of the post-mortem tells you the quality of the security program.</p></li><li><p><strong>&#8220;What audit logs do we get, at what retention, and can we export them to our SIEM?&#8221;</strong> If the answer is &#8220;you can see some logs in the dashboard,&#8221; the product isn&#8217;t enterprise-ready.</p></li><li><p><strong>&#8220;What&#8217;s your plan if a customer reports data leakage via your agent?&#8221;</strong> The vendor should have an answer that references specific tooling (a way to audit the specific agent session, replay it, identify affected data). No plan means no product.</p></li></ol><h2>A 90-day plan for CISOs starting today</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-4u5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-4u5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 424w, https://substackcdn.com/image/fetch/$s_!-4u5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 848w, https://substackcdn.com/image/fetch/$s_!-4u5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 1272w, https://substackcdn.com/image/fetch/$s_!-4u5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-4u5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png" width="1456" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;IMAGE 5: 90-day implementation roadmap&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="IMAGE 5: 90-day implementation roadmap" title="IMAGE 5: 90-day implementation roadmap" srcset="https://substackcdn.com/image/fetch/$s_!-4u5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 424w, https://substackcdn.com/image/fetch/$s_!-4u5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 848w, https://substackcdn.com/image/fetch/$s_!-4u5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 1272w, https://substackcdn.com/image/fetch/$s_!-4u5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2dd34e05-31ae-44f5-9e23-a8e6393df1df_3960x2636.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Days 1&#8211;30: Inventory.</strong> You cannot secure what you haven&#8217;t enumerated. Build a list of every agentic system in your estate, both ones you&#8217;ve built internally and ones embedded in products your teams use (GitHub Copilot Workspace, Slack AI, Salesforce&#8217;s Agentforce, any Microsoft Copilot agent, any internal automation using Claude, GPT, or Gemini with tool-calling). Distinguish agent deployments from generative-AI deployments. Expect the list to be longer than you think.</p><p><strong>Days 31&#8211;60: Tier and prioritize.</strong> For each agent on the inventory, answer the five threat-model decisions: what it does, what influences its context, what tools have irreversible effects, what it remembers, and who owns incident response. Tier agents into risk levels (low, medium, high) based on blast radius. Focus the remaining time on the high-tier agents.</p><p><strong>Days 61&#8211;90: Controls and policy.</strong> For every high-tier agent, apply the &#8220;what works&#8221; controls above: human-in-the-loop for irreversible actions, tool-scoping, logging, input boundary enforcement. In parallel, draft the agent policy and socialize it with engineering leadership. By day 90 you should be able to say, with evidence, which agents in your environment are above your risk threshold and what you&#8217;re doing about them.</p><p>This is not complete. It&#8217;s defensible ground. The agentic AI space will keep moving, for CISOs, &#8220;defensible ground, updated quarterly&#8221; is the winning posture.</p><h2>Frequently asked questions</h2><h3>What&#8217;s the difference between AI security and agentic AI security?</h3><p>AI security covers the broader set of risks around machine learning systems, model theft, adversarial examples, training data poisoning, bias, privacy leakage from model outputs, and the set of issues that show up when deploying a generative model in an enterprise (prompt injection, jailbreaking, DLP). Agentic AI security is a subset: the risks that arise specifically because the AI system takes actions via tools in a loop, rather than just returning text. The loop is the difference. Controls that work for generative AI often don&#8217;t transfer, because the architecture is different.</p><h3>How is agentic AI governance different from generative AI governance?</h3><p>Generative AI governance is largely about human-AI interaction: what people are allowed to paste into a chatbot, how outputs are disclosed, which vendors are approved. Agentic governance is about agent behavior and lifecycle: who can build agents, what tools they can access, how they&#8217;re logged, how they&#8217;re retired. Most enterprises still operate only under generative governance and have not yet written agent-specific policies.</p><h3>Which frameworks apply to agentic AI?</h3><p>Three frameworks are load-bearing. NIST AI RMF provides the risk-management structure. ISO/IEC 42001 is the first operational AI management system standard and the cleanest audit target. The EU AI Act is the only hard-law regime applicable globally in practice; for CISO-relevant obligations, see our <a href="./eu-ai-act-compliance-ciso">EU AI Act compliance guide</a>. MITRE ATLAS and OWASP LLM Top 10 are tactical, useful for threat modeling and red teaming, not for program-level governance.</p><h3>What&#8217;s the single biggest agentic AI risk for enterprises today?</h3><p>Unscoped tool access combined with autonomous execution of irreversible actions. An agent that can do too much, with too little oversight, is the category that produces breach headlines. Most other risks, prompt injection, data leakage, hallucination, become actionable incidents only when an insufficiently-scoped agent turns them into real-world effects.</p><h3>How much should a mid-size company budget for agentic AI security?</h3><p>Treat it the way you&#8217;d treat a new control domain, not a product category. Rough rule of thumb: 10&#8211;15% of the AI tooling budget should go to AI-specific security (red teaming, logging infrastructure, a dedicated policy lead, evaluation tooling). For a company spending $2M/year on AI tooling, that&#8217;s $200&#8211;300K. Most of that money should go to people and processes, not products. The most common mistake is to spend heavily on an AI security tool that overlaps with your SIEM rather than investing in the policy, inventory, and threat-modeling work that has to happen first.</p><div><hr></div><p><em>If this was useful, subscribe to Cyberwow for the CISO-only filter on AI security, no vendor pitches, no news cycle, just decision-oriented analysis.</em></p><div><hr></div><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ensure Secure User Access with Deprovisioning]]></title><description><![CDATA[Learn how to effectively manage user access by understanding the best practices for deprovisioning. These tips will help you protect your business from data breaches and cyber attacks.]]></description><link>https://cyberwow.com/p/ensure-secure-user-access-with-deprovisioning</link><guid isPermaLink="false">https://cyberwow.com/p/ensure-secure-user-access-with-deprovisioning</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Mon, 24 Apr 2023 01:37:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VtGs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1></h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VtGs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VtGs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!VtGs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!VtGs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!VtGs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VtGs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VtGs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!VtGs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!VtGs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!VtGs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5810f233-27f2-4956-98ad-0a064660e456_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Are you responsible for ensuring software and network services in your applications remain secure from cyber threats?</p><p>If so, you know the importance of adequately managing user access. Implementing a de-provisioning strategy is essential to maintain peak security levels on-premises and protect against data breaches. Deprovisioning is an effective way to grant, modify and revoke user access within your system in real-time and help ensure that only authorized users have access to privileged information.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In this blog post, learn how <strong><a href="https://www.okta.com/blog/2020/07/what-is-provisioning-and-deprovisioning/">deprovisioning</a></strong> can be part of a comprehensive security strategy to keep user accounts and devices safe and manage changes in user profiles and permissions quickly and efficiently.</p><h2><strong>What is deprovisioning, and why is it essential for secure user access</strong></h2><p>Deprovisioning may sound like a complicated term, but it simply refers to removing access privileges for users who no longer need them.</p><p>This is an essential step for maintaining secure user identity and access. It ensures that former employees, contractors, or other individuals with access to privileged information can no longer access it after they've left the organization&#8212;failure to have properly deprovisioned former users can leave sensitive data vulnerable to theft or misuse.</p><p>That's an example of why organizations must have a <strong><a href="https://support.google.com/chrome/a/answer/3523633?hl=en">straightforward deprovisioning</a></strong><a href="https://support.google.com/chrome/a/answer/3523633?hl=en"> </a>process in place to protect their data and prevent security breaches.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WHNG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WHNG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 424w, https://substackcdn.com/image/fetch/$s_!WHNG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 848w, https://substackcdn.com/image/fetch/$s_!WHNG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 1272w, https://substackcdn.com/image/fetch/$s_!WHNG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WHNG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp" width="1456" height="969" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:969,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Deprovisioning and why is it important? - Blog - miniOrange&quot;,&quot;title&quot;:&quot;What is Deprovisioning and why is it important? - Blog - miniOrange&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Deprovisioning and why is it important? - Blog - miniOrange" title="What is Deprovisioning and why is it important? - Blog - miniOrange" srcset="https://substackcdn.com/image/fetch/$s_!WHNG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 424w, https://substackcdn.com/image/fetch/$s_!WHNG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 848w, https://substackcdn.com/image/fetch/$s_!WHNG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 1272w, https://substackcdn.com/image/fetch/$s_!WHNG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14bc3d77-793a-48c4-8ef4-ff5344294e1e_2442x1626.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>How to implement a successful deprovisioning process in your organization</strong></h2><p>When it comes to implementing a successful deprovisioning process within your organization, developers should keep several key strategies for deprovision, in mind.</p><p>One of the most critical steps is establishing clear guidelines and protocols for removing access to sensitive information and systems. This might involve creating detailed documentation outlining the steps involved in deprovisioning an employee or contractor granted access, and any necessary approvals or authorizations that must be obtained.</p><p>Efficient, practical, scalable, and adaptable <strong><a href="https://www.ibm.com/docs/en/zos/2.4.0?topic=smss-deprovision-software-services-instance">deprovisioning processes</a></strong> are crucial puzzle pieces for optimal deprovisioning removes your organization. Ensure systems are up to date and meet evolving needs.This might mean integrating automated tools and workflows to streamline the deprovisioning work process or investing in additional training and support for your team to ensure they can execute the strategy seamlessly.</p><p>Ultimately, the key to a successful deprovisioning process is to prioritize clear communication, collaboration, and consistency across all teams and stakeholders involved in the manual process.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zm4-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zm4-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!zm4-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!zm4-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!zm4-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zm4-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SCIM &#8209; User Sync/Provisioning - Real Time Inventory Sync, Products Sync,  Orders Sync, etc. | Shopify App Store&quot;,&quot;title&quot;:&quot;SCIM &#8209; User Sync/Provisioning - Real Time Inventory Sync, Products Sync,  Orders Sync, etc. | Shopify App Store&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SCIM &#8209; User Sync/Provisioning - Real Time Inventory Sync, Products Sync,  Orders Sync, etc. | Shopify App Store" title="SCIM &#8209; User Sync/Provisioning - Real Time Inventory Sync, Products Sync,  Orders Sync, etc. | Shopify App Store" srcset="https://substackcdn.com/image/fetch/$s_!zm4-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!zm4-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!zm4-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!zm4-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F14523fd9-57cf-4366-a8b6-23a4c4133383_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>How to track and monitor user access at all times</strong></h2><p>For developers, ensuring that user access is tracked and monitored at all times is crucial to maintaining data security and compliance.</p><p>By implementing robust monitoring systems that keep track of user activity, developers can identify and prevent potential security breaches before they occur. Some effective methods to accomplish this include implementing audit logging, setting up security alerts that notify administrators of suspicious activity, and requiring multi-factor authentication for sensitive user accounts.</p><p>These measures bolster security for new user, and help meet regulatory requirements by providing a detailed record of user activity. With these tools in place, developers can confidently track and monitor user access, knowing that they have taken proactive steps to increase security and ensure the integrity and confidentiality of their systems.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gAhg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gAhg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 424w, https://substackcdn.com/image/fetch/$s_!gAhg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 848w, https://substackcdn.com/image/fetch/$s_!gAhg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 1272w, https://substackcdn.com/image/fetch/$s_!gAhg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gAhg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png" width="593" height="281" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:281,&quot;width&quot;:593,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Knowledge Base - Deprovision an app&quot;,&quot;title&quot;:&quot;Knowledge Base - Deprovision an app&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Knowledge Base - Deprovision an app" title="Knowledge Base - Deprovision an app" srcset="https://substackcdn.com/image/fetch/$s_!gAhg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 424w, https://substackcdn.com/image/fetch/$s_!gAhg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 848w, https://substackcdn.com/image/fetch/$s_!gAhg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 1272w, https://substackcdn.com/image/fetch/$s_!gAhg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf85114b-fb66-4ecb-bcd9-4aec0271e8bd_593x281.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Tips for proper deprovisioning of former employees or contractors</strong></h2><p>Proper deprovisioning of former employees or contractors is essential to ensure the security of your organization's data and systems.</p><p>It's not just enough to hand over the keys and say goodbye. Revoke their access to all company systems, applications hr data, and assets, and plan to remove their credentials immediately. In addition to that, it's also crucial to examine the access they had and the data they were using. Take the necessary steps to ensure that sensitive information is not being mishandled, and immediately bring any irregularities to the attention of relevant authorities.</p><p>It's always better to take extra measures when it comes to security, including deprovisioning former employees and contractors.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!637x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!637x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 424w, https://substackcdn.com/image/fetch/$s_!637x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 848w, https://substackcdn.com/image/fetch/$s_!637x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 1272w, https://substackcdn.com/image/fetch/$s_!637x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!637x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png" width="1456" height="874" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:874,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Cloud Project Lifecycle&quot;,&quot;title&quot;:&quot;The Cloud Project Lifecycle&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Cloud Project Lifecycle" title="The Cloud Project Lifecycle" srcset="https://substackcdn.com/image/fetch/$s_!637x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 424w, https://substackcdn.com/image/fetch/$s_!637x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 848w, https://substackcdn.com/image/fetch/$s_!637x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 1272w, https://substackcdn.com/image/fetch/$s_!637x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4835b197-8304-4c66-980d-14dd03c6ddca_4862x2917.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Common pitfalls to avoid when setting up a deprovisioning system&nbsp;</strong></h2><p>Setting up a deprovisioning system solution is essential in ensuring data security and compliance. However, there are common pitfalls to avoid to ensure its effectiveness.</p><p>One of the most critical mistakes is needing a clear and detailed plan beforehand. With a plan, tracking and managing the scope of the automated user provisioning deprovisioning process becomes more accessible. Another pitfall is failing to conduct regular audits of the automated deprovisioning removes and user provisioning system to identify areas for improvement or potential vulnerabilities.</p><p>Additionally, not having an automated system can lead to errors or delays. Finally, not involving key stakeholders, such as HR and IT, can cause miscommunication and ultimately result in an either human error, or an ineffective deprovisioning system.</p><p>Avoiding these common pitfalls can help individuals and organizations create a secure and prosperous deprovisioning system.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!azGV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!azGV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 424w, https://substackcdn.com/image/fetch/$s_!azGV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 848w, https://substackcdn.com/image/fetch/$s_!azGV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 1272w, https://substackcdn.com/image/fetch/$s_!azGV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!azGV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png" width="1000" height="913" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:913,&quot;width&quot;:1000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cloud security-Part 2: The importance of Identity Access Management&quot;,&quot;title&quot;:&quot;Cloud security-Part 2: The importance of Identity Access Management&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cloud security-Part 2: The importance of Identity Access Management" title="Cloud security-Part 2: The importance of Identity Access Management" srcset="https://substackcdn.com/image/fetch/$s_!azGV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 424w, https://substackcdn.com/image/fetch/$s_!azGV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 848w, https://substackcdn.com/image/fetch/$s_!azGV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 1272w, https://substackcdn.com/image/fetch/$s_!azGV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13f1e15e-1d05-438d-a153-896e8af40301_1000x913.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Best practices for ensuring secure user access with deprovisioning</strong></h2><p>Ensuring secure user access is a top priority for any organization, and proper deprovisioning is critical to this effort.</p><p>Companies can reduce the risk of unauthorized data access or breach by following best practices, such as revoking account, removing user access, immediately upon termination of network services or conducting regular audits of user accounts. It's also essential to have a clear and comprehensive deprovisioning policy outlining the steps necessary to remove user access and safeguard company resources.</p><p>In today's fast-paced digital environment, staying on top of security protocols is essential for protecting company and customer data.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nm2h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nm2h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nm2h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nm2h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nm2h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nm2h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg" width="254" height="198" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:198,&quot;width&quot;:254,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is User Lifecycle Management?&quot;,&quot;title&quot;:&quot;What is User Lifecycle Management?&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is User Lifecycle Management?" title="What is User Lifecycle Management?" srcset="https://substackcdn.com/image/fetch/$s_!nm2h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 424w, https://substackcdn.com/image/fetch/$s_!nm2h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 848w, https://substackcdn.com/image/fetch/$s_!nm2h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!nm2h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F75094987-f042-46a8-88ef-6deb1d9a92f6_254x198.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Deprovisioning and provisioning working together</strong></h2><p>You have already understood precisely why it works. What's an excellent approach to achieving the best results? </p><p>Combined with a solid Identity and Access Management Solution enabling to automate user provisioning and deprovisioning within the customer's entire lifecycle management process. Here is some helpful advice on automating <strong><a href="https://www.rippling.com/blog/what-is-user-provisioning-and-deprovisioning">user provisioning and</a></strong> deprovisioning works as a critical tenant of Account and access Management solution.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xeSc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xeSc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 424w, https://substackcdn.com/image/fetch/$s_!xeSc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 848w, https://substackcdn.com/image/fetch/$s_!xeSc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 1272w, https://substackcdn.com/image/fetch/$s_!xeSc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xeSc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png" width="225" height="225" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:225,&quot;width&quot;:225,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What Is User Provisioning? Definition, Process and Best Practices -  Spiceworks&quot;,&quot;title&quot;:&quot;What Is User Provisioning? Definition, Process and Best Practices -  Spiceworks&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What Is User Provisioning? Definition, Process and Best Practices -  Spiceworks" title="What Is User Provisioning? Definition, Process and Best Practices -  Spiceworks" srcset="https://substackcdn.com/image/fetch/$s_!xeSc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 424w, https://substackcdn.com/image/fetch/$s_!xeSc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 848w, https://substackcdn.com/image/fetch/$s_!xeSc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 1272w, https://substackcdn.com/image/fetch/$s_!xeSc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9c47c745-3f21-4b38-8d8c-c7414194b9ae_225x225.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Implement the principle of least privilege (PoLP)</strong></h2><p>A <strong><a href="https://www.strongdm.com/blog/principle-of-least-privilege">principle called minimum rights</a></strong> is that a user should only receive access for doing a job. </p><p>The decrease in staff resources decreases the effectiveness if an employee leaves the organization. The rules apply for both user provisioning and re-provision. It must affect the employee's role in the provision as the user is entrusted with the tool and applications. It is also helpful for de-provisioning phases, where users move teams and don't need to have access to important information again. </p><p>Those who leave the accounts in the company may also have audited accounts at their disposal, accounts that they have yet to be able to use.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PDnX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PDnX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PDnX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PDnX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PDnX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PDnX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg" width="1260" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1260,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Identity and Access Management - CloudIBN - Cloud Security&quot;,&quot;title&quot;:&quot;Identity and Access Management - CloudIBN - Cloud Security&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Identity and Access Management - CloudIBN - Cloud Security" title="Identity and Access Management - CloudIBN - Cloud Security" srcset="https://substackcdn.com/image/fetch/$s_!PDnX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!PDnX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!PDnX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!PDnX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f892b86-5045-4520-af50-27726b2e784d_1260x600.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Enable automated provisioning and deprovisioning</strong></h2><p>Employee access demands develop when a person is promoted to a new position in another company, uses a new device, or adopts a new software tool. </p><p>The organizations may restructure or temporarily <strong><a href="https://www.okta.com/blog/2020/07/what-is-provisioning-and-deprovisioning/">collaborate with contractors</a></strong> or partner organizations needing limited systems and network operations access. Automation is vital for preventing mistakes when providing information. </p><p>This method is also a way for IT managers to save time by preventing human error, errors, and unneeded frustration.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zPSs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zPSs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 424w, https://substackcdn.com/image/fetch/$s_!zPSs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 848w, https://substackcdn.com/image/fetch/$s_!zPSs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 1272w, https://substackcdn.com/image/fetch/$s_!zPSs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zPSs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp" width="676" height="471" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:471,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Automated Provisioning | 4 main benefits of Automated User Provisioning&quot;,&quot;title&quot;:&quot;Automated Provisioning | 4 main benefits of Automated User Provisioning&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Automated Provisioning | 4 main benefits of Automated User Provisioning" title="Automated Provisioning | 4 main benefits of Automated User Provisioning" srcset="https://substackcdn.com/image/fetch/$s_!zPSs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 424w, https://substackcdn.com/image/fetch/$s_!zPSs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 848w, https://substackcdn.com/image/fetch/$s_!zPSs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 1272w, https://substackcdn.com/image/fetch/$s_!zPSs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e873e6c-5b29-4a91-80f5-673d8167245b_676x471.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>What is an identity and access management (IAM) tool?</strong></h2><p>Integrated ad networks (AADs), or <strong><a href="https://www.onelogin.com/learn/iam#:~:text=Identity%20and%20access%20management%20(IAM)%20ensures%20that%20the%20right%20people,each%20app%20as%20an%20administrator.">iAM</a></strong>, is a platform to provide security solutions for businesses that provide the necessary tools to work efficiently in an enterprise environment. It is used to manage user and access rights and identity. </p><p>This tool provides companies with the ability to control who has access rights to what systems and data, as well as a way to monitor and log user activity on their networks. With an IAM platform, businesses can ensure that employees have only the information they need when accessing resources or making changes in the system. </p><p>It also offers companies a way to detect suspicious activity and respond quickly to minimize any risk of security breaches.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FO8u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FO8u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 424w, https://substackcdn.com/image/fetch/$s_!FO8u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 848w, https://substackcdn.com/image/fetch/$s_!FO8u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 1272w, https://substackcdn.com/image/fetch/$s_!FO8u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FO8u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png" width="363" height="139" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:139,&quot;width&quot;:363,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Top 11 Identity &amp; Access Management Tools - Spectral&quot;,&quot;title&quot;:&quot;Top 11 Identity &amp; Access Management Tools - Spectral&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Top 11 Identity &amp; Access Management Tools - Spectral" title="Top 11 Identity &amp; Access Management Tools - Spectral" srcset="https://substackcdn.com/image/fetch/$s_!FO8u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 424w, https://substackcdn.com/image/fetch/$s_!FO8u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 848w, https://substackcdn.com/image/fetch/$s_!FO8u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 1272w, https://substackcdn.com/image/fetch/$s_!FO8u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e264eaa-d27c-496b-8b1e-b989cff12169_363x139.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Why user provisioning and deprovisioning matters</strong></h2><p>In hiring new workers, an organization can create records of their employees. </p><p>The employee records will include the following: The next step involves giving employees a free account with the software, services, and tools they need for their jobs. Users provide information in your HR systems, such as adding an employee as a team member, job change, promotions, department transfers, etc.</p><h2><strong>Best Practices for Secure User Access Control&nbsp;</strong></h2><p>Ensuring <strong><a href="https://www.beyondidentity.com/glossary/provisioning-and-deprovisioning">secure user access control</a></strong> is crucial to maintaining the integrity of any system or application.</p><p> In today's world, where data breaches and cyber-attacks are rampant, it has become more critical than ever to adopt the best practices for user and access management and control. These measures help keep your data secure and prevent unauthorized access. </p><p>One practical approach is to follow the principle of least privilege, which provides users with the minimal level of access necessary to perform their job functions. Additionally, implementing multi-factor authentication and regularly reviewing access permissions can help prevent unauthorized access to sensitive data. </p><p>Organizations can minimize risk and protect themselves from potential security breaches by prioritizing secure user access control.</p><h2><strong>Tips for Establishing a Robust Deprovisioning Strategy</strong></h2><p>Establishing a robust deprovisioning strategy is crucial to the security and management of any organization. </p><p>When an employee departs, it is crucial to instantly revoke their <strong><a href="https://cybeready.com/abcs-of-identity-and-access-management">access rights</a></strong> to sensitive information and systems. However, deprovisioning is not a one-time task. It requires careful planning and ongoing monitoring to ensure that former employees cannot gain access to company data after they have left. There are some tips to help establish a solid deprovisioning strategy, including developing a standard exit process, conducting regular reviews of access permissions, and implementing real-time monitoring tools. </p><p>By taking these steps, businesses can ensure that former employees do not threaten their cybersecurity or data integrity.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aDoF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aDoF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aDoF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aDoF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aDoF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aDoF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg" width="263" height="192" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:192,&quot;width&quot;:263,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Robust strategy implementation &#8211; 6 key factors! - Stradigo 2021&quot;,&quot;title&quot;:&quot;Robust strategy implementation &#8211; 6 key factors! - Stradigo 2021&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Robust strategy implementation &#8211; 6 key factors! - Stradigo 2021" title="Robust strategy implementation &#8211; 6 key factors! - Stradigo 2021" srcset="https://substackcdn.com/image/fetch/$s_!aDoF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aDoF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aDoF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aDoF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22dd9ee8-321b-46f1-b721-f6bc6a850d6e_263x192.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Utilizing advanced tools for secure access control&nbsp;</strong></h2><p>Maintaining security is a top priority for any organization. Fortunately, with the rise of <strong><a href="https://www.comparitech.com/net-admin/iam-tools/">advanced tools</a></strong> for secure access control, businesses can now protect their sensitive data from unwanted access. These tools allow administrators to control who has access to what data and when all while ensuring that data remains encrypted and secure. Moreover, with the ability to manage access control remotely, your organization can increase efficiency and productivity. The benefits of safe access control are numerous, making it a must-have for any company looking to safeguard its data and assets.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jaxW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jaxW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jaxW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jaxW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jaxW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jaxW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg" width="300" height="168" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/edb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:168,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Identity Access Management Tools, Security Protocols&quot;,&quot;title&quot;:&quot;Identity Access Management Tools, Security Protocols&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Identity Access Management Tools, Security Protocols" title="Identity Access Management Tools, Security Protocols" srcset="https://substackcdn.com/image/fetch/$s_!jaxW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 424w, https://substackcdn.com/image/fetch/$s_!jaxW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 848w, https://substackcdn.com/image/fetch/$s_!jaxW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!jaxW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fedb49cc2-8f73-4100-9806-f4c2e4324ca3_300x168.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Ensuring compliance with data security regulations</strong></h2><p>With the ever-growing threat posed by hackers, data security is more important than ever. </p><p>Ensuring compliance with<a href="https://hyperproof.io/resource/data-compliance/"> </a><strong><a href="https://hyperproof.io/resource/data-compliance/">data security</a></strong> regulations is critical to protecting sensitive information and preventing unauthorized access. A data breach or in data can have profound consequences that include financial setbacks, harm to reputation and legal penalties. Companies must proactively implement safeguards to prevent data breaches, including encryption, firewalls, and access controls. </p><p>As regulations evolve, keeping up-to-date and adapting to new requirements is essential. Companies can protect their customers and businesses from potential harm by prioritizing data security and compliance.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LBao!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LBao!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 424w, https://substackcdn.com/image/fetch/$s_!LBao!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 848w, https://substackcdn.com/image/fetch/$s_!LBao!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 1272w, https://substackcdn.com/image/fetch/$s_!LBao!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LBao!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png" width="236" height="214" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:214,&quot;width&quot;:236,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What is Data Governance | Frameworks, Tools &amp; Best Practices | Imperva&quot;,&quot;title&quot;:&quot;What is Data Governance | Frameworks, Tools &amp; Best Practices | Imperva&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What is Data Governance | Frameworks, Tools &amp; Best Practices | Imperva" title="What is Data Governance | Frameworks, Tools &amp; Best Practices | Imperva" srcset="https://substackcdn.com/image/fetch/$s_!LBao!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 424w, https://substackcdn.com/image/fetch/$s_!LBao!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 848w, https://substackcdn.com/image/fetch/$s_!LBao!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 1272w, https://substackcdn.com/image/fetch/$s_!LBao!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ea89e6d-baec-4143-a6f5-2031c4e3cc55_236x214.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Conclusion</strong></h2><p>Deprovisioning can significantly improve user access security and reduce the time and cost associated with insecure <strong><a href="https://www.okta.com/identity-101/user-access-management/">user access</a></strong>. Organizations can ensure that only authorized personnel can access sensitive information by automating deprovisioning processes, removing user access, and creating access expiration policies. Additionally, the risk of malicious actors gaining unauthorized access to secure systems is reduced through regular reviews of privileged users' activities and data protection tools. As cyber threats grow more complex, organizations should explore how deprovisioning works and automated deprovisioning really works, as a tool to strengthen their security and maintain digital security standards.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Keep Your Passwords Secure and Accessible with a Password Vault]]></title><description><![CDATA[Get the peace of mind that comes with secure, encrypted password storage. Learn how to easily manage multiple accounts without compromising safety with an online password vault.]]></description><link>https://cyberwow.com/p/what-is-password-vaulting</link><guid isPermaLink="false">https://cyberwow.com/p/what-is-password-vaulting</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Thu, 20 Apr 2023 11:10:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!c2vE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!c2vE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!c2vE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!c2vE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!c2vE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!c2vE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!c2vE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:194858,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!c2vE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!c2vE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!c2vE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!c2vE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb142dcc-73f4-47ed-859e-86b7bcdb4ef5_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>If you're a developer, you know how important it is to keep your passwords secure.</p><p>But remembering all those complex combinations can be challenging between multiple accounts across different services and on multiple devices. Fortunately, an efficient way to <strong><a href="https://www.descope.com/product">manage your passwords</a></strong> without sacrificing security is using a password vault!</p><p>Learn about the benefits of using a password vault for developers, why it's essential for securing access to your online accounts, and get tips on setting it up - all in the free version of this blog.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberwow.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2><strong>what is password vaulting?</strong></h2><p>A <strong><a href="https://www.techopedia.com/definition/31415/password-vault">password vault</a></strong>, also known as a password manager, is a secure online or offline application that stores and manages all passwords and login credentials in one place.</p><p>It provides a secure and encrypted environment for password storage, eliminating the need to remember multiple complex passwords. Password vaults use advanced security features, such as two-factor <strong><a href="https://www.descope.com/">authentication</a></strong> and encryption, to protect against hacking, phishing, and other security threats. Password vaults have the added benefit of several features including analyzing password strength, generating new passwords almost automatically, and sharing passwords amongst team members.</p><p>With most password managers and vaults, users can enjoy the convenience of saving and accessing passwords on different devices mobile apps and platforms with ease and without compromising cybersecurity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M6fv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M6fv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M6fv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M6fv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M6fv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M6fv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg" width="877" height="509" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/df5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:509,&quot;width&quot;:877,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Introducing Zoho Vault, Online Password Manager for Teams - Zoho Blog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Introducing Zoho Vault, Online Password Manager for Teams - Zoho Blog" title="Introducing Zoho Vault, Online Password Manager for Teams - Zoho Blog" srcset="https://substackcdn.com/image/fetch/$s_!M6fv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 424w, https://substackcdn.com/image/fetch/$s_!M6fv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 848w, https://substackcdn.com/image/fetch/$s_!M6fv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!M6fv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdf5b9433-ee00-466b-a8e6-97067e1bd0c3_877x509.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>What can you store?</strong></h2><p>When it comes to enterprise password management solutions, a variety of options are available to businesses.</p><p>In addition to storing passwords, many solutions also support the secure storage of other essential credentials, such share credentials such as SSH keys, SSL certificates, and API keys. This centralized storage helps provide a safer environment for businesses by reducing the possibility of these sensitive items being lost or misused.</p><p>Some solutions even go further by incorporating advanced features such as password sharing, password rotation policies, and automatic password generation to make the process of securely managing passwords and other credentials even easier. Additionally, many solutions support integration with popular identity and access management systems to provide a single, unified source of user <strong><a href="https://www.techtarget.com/searchsecurity/definition/authentication#:~:text=Authentication%20is%20the%20process%20of,in%20a%20data%20authentication%20server.">authentication</a></strong> across an organization.</p><p>Choosing the right password management solution can help businesses protect their sensitive data better and improve overall security and compliance with industry regulations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RbzJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RbzJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!RbzJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!RbzJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!RbzJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RbzJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What Is Password Management? Definition, Components, and Best Practices -  Spiceworks&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What Is Password Management? Definition, Components, and Best Practices -  Spiceworks" title="What Is Password Management? Definition, Components, and Best Practices -  Spiceworks" srcset="https://substackcdn.com/image/fetch/$s_!RbzJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!RbzJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!RbzJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!RbzJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a1b5f56-24a7-4ef4-a12f-17f693fdbeea_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Benefits of Using a Password Vaulting</strong></h2><p>A password vault is a valuable tool that enables you to store and manage many unique passwords securely and conveniently. Here are <a href="https://www.passcamp.com/blog/what-is-password-vaulting-and-what-are-its-benefits/">some benefits</a> of using a password vault:</p><p><strong>1. Stronger Security:&nbsp;</strong>Password vaults offer a high level of security as they are designed with advanced encryption techniques to keep your passwords safe from hackers and cybercriminals. One password is all you need to access the vault, freeing you from worrying about where to store different and strong passwords for each account.</p><p><strong>2. Increased Productivity:&nbsp;</strong>With a password vault, you can save time and increase productivity by eliminating the need to manually enter usernames and passwords on different websites. What is password vaulting that can automatically fill in login details for privileged accounts for you, which saves you time and energy?</p><p><strong>3. Easy Access:&nbsp;</strong>A password vault allows you to access your passwords from anywhere, provided you have internet access. This is particularly useful when you need the same password to access your accounts from different devices or locations.</p><p><strong>4. Better Organization:&nbsp;</strong>Password vaults can help you organize your passwords more efficiently. You can categorize passwords based on the type of account, such as social media or banking, which can help you quickly locate the passwords when needed.</p><p><strong>5. Simplify Password Management:&nbsp;</strong>Password vaults simplify the management of passwords as you can create, edit, and delete passwords in one central location. You can use the password generator in the vault to effortlessly and create strong, complex, unique, and hard-to-guess passwords.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2VH2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2VH2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 424w, https://substackcdn.com/image/fetch/$s_!2VH2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 848w, https://substackcdn.com/image/fetch/$s_!2VH2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 1272w, https://substackcdn.com/image/fetch/$s_!2VH2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2VH2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png" width="341" height="148" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:148,&quot;width&quot;:341,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Benefits of a PAM Solution over Personal Password Managers&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Benefits of a PAM Solution over Personal Password Managers" title="Benefits of a PAM Solution over Personal Password Managers" srcset="https://substackcdn.com/image/fetch/$s_!2VH2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 424w, https://substackcdn.com/image/fetch/$s_!2VH2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 848w, https://substackcdn.com/image/fetch/$s_!2VH2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 1272w, https://substackcdn.com/image/fetch/$s_!2VH2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47e7dccd-93c3-42ea-9fd4-0e485dbb4c10_341x148.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><h2><strong>Drawbacks of Using a Password Vault?</strong></h2><p>A password vault is undoubtedly helpful for managing and storing many passwords. However, it also has certain drawbacks that should be considered.</p><p><strong>1. Single Point of Failure:&nbsp;</strong>Using a password vault means all your passwords are stored in one place. If your password vault is compromised or hacked, it can be compromised passwords and lead to a catastrophic security breach. This is a disadvantage compared to traditional password management methods, where passwords are distributed across multiple locations.</p><p><strong>2. Overreliance on Technology:&nbsp;</strong>Password vaults rely on technology to function. This means they are susceptible to technical difficulties, glitches, and bugs. If your password vault fails, it could mean losing access to all your passwords. You also risk losing your passwords if you forget your master password, which is required to access the other password hygiene vault.</p><p><strong>3. Complexity:&nbsp;</strong>Password vaults are inherently complex tools. They require users to create and manage multiple passwords, some highly sensitive, reused passwords such as the master password that unlocks the vault. This complexity can lead to user error, such as forgetting passwords or using weak passwords that are easy to guess.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yT4q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yT4q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 424w, https://substackcdn.com/image/fetch/$s_!yT4q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 848w, https://substackcdn.com/image/fetch/$s_!yT4q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 1272w, https://substackcdn.com/image/fetch/$s_!yT4q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yT4q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png" width="1050" height="797" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:797,&quot;width&quot;:1050,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Is this vault-less password manager/generator design safe? - Information  Security Stack Exchange&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Is this vault-less password manager/generator design safe? - Information  Security Stack Exchange" title="Is this vault-less password manager/generator design safe? - Information  Security Stack Exchange" srcset="https://substackcdn.com/image/fetch/$s_!yT4q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 424w, https://substackcdn.com/image/fetch/$s_!yT4q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 848w, https://substackcdn.com/image/fetch/$s_!yT4q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 1272w, https://substackcdn.com/image/fetch/$s_!yT4q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07c2c688-0cb2-4e48-871a-cc080341085e_1050x797.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Why is Password Vaulting Necessary?</strong></h2><p>Providing an unmatched level of security in this era of rampant cyber-attacks and identity theft by prioritizing online security is paramount. </p><p>A <strong><a href="https://www.keepersecurity.com/blog/2022/08/03/what-is-a-password-vault-and-how-does-it-work/">password vault</a></strong> offers a secure solution that is easy to use. It saves you from the hassle of memorizing complex passwords and can even generate new passwords while automatically updating them, guaranteeing maximum protection for all your accounts. If you choose not to use a password manager, you could be at risk of being hacked by using weak, easy-to-guess passwords. </p><p>Take advantage of password vaulting for a stress-free secure online presence.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wrU2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wrU2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 424w, https://substackcdn.com/image/fetch/$s_!wrU2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 848w, https://substackcdn.com/image/fetch/$s_!wrU2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 1272w, https://substackcdn.com/image/fetch/$s_!wrU2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wrU2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png" width="1456" height="492" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:492,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Password Vault Support&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Password Vault Support" title="Password Vault Support" srcset="https://substackcdn.com/image/fetch/$s_!wrU2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 424w, https://substackcdn.com/image/fetch/$s_!wrU2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 848w, https://substackcdn.com/image/fetch/$s_!wrU2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 1272w, https://substackcdn.com/image/fetch/$s_!wrU2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc482b8ed-c776-4431-853d-ad5bc534903c_2606x880.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Why Do I Need a Password Vault?</strong></h2><p>In today's world, where digital devices are used more than ever, a solid and unique password is crucial to protect your online identity and privacy. </p><p>Remembering dozens of complex passwords can be overwhelming, but that's where password vaults come in. A password vault is a tool that helps you generate, store, and manage all your passwords in one secure location. It eliminates the need to memorize multiple passwords and provides an added layer of security by encrypting your saved passwords along with top-notch security measures. </p><p>With a password vault, you can simplify logging into your online accounts and rest easy knowing that your information is safe from cyber-attacks.</p><div data-attrs="{&quot;url&quot;:&quot;https://media.cybernews.com/2022/02/online-password-manager.png&quot;}" data-component-name="AssetErrorToDOM"><picture><img src="/img/missing-image.png" height="455" width="728"></picture></div><h2><strong>When to Upgrade From Password Vaulting to SSO?</strong></h2><p>In cybersecurity, it's imperative to constantly evaluate and upgrade your measures to keep your company's information secure. </p><p>Password vaulting has long been a popular choice for managing and safeguarding passwords. However, with the rise of Single Sign-On (SSO) technology, many businesses wonder when to make the switch. Upgrading to a secure solution with SSO has many benefits, such as reducing the need for multiple passwords and streamlining the login process. But when is the right time to make the leap? </p><p>The answer ultimately depends on the unique needs and circumstances of your business. Still, it's crucial to stay informed and proactive about the latest cybersecurity developments to ensure your data's safety and confidentiality.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lmI_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lmI_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lmI_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lmI_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lmI_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lmI_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;ITOM Practitioner Portal&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="ITOM Practitioner Portal" title="ITOM Practitioner Portal" srcset="https://substackcdn.com/image/fetch/$s_!lmI_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!lmI_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!lmI_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!lmI_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2130562d-1d12-4bf9-8079-edb34ac1c0db_1280x720.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Can Password Vaults be Hacked?</strong></h2><p>The use of password vaults, also known as password managers, has exploded in recent years. </p><p>The convenience of storing all your passwords in one place, behind a strong master password you need to remember, is a massive appeal to many. However, with the rise in popularity of these tools comes the question: can they be hacked? While no system is 100% foolproof, password vaults are the safest way to store your passwords. </p><p>Complex encryption, two-factor authentication, and constantly evolving security measures make it difficult for hackers to access your information. Of course, nothing is impossible, but the the added security protection provided by password vaults is undoubtedly worth the investment.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JkN6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JkN6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JkN6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JkN6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JkN6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JkN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg" width="480" height="498" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:498,&quot;width&quot;:480,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Password management with KeyPass - Niall Best's Blog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Password management with KeyPass - Niall Best's Blog" title="Password management with KeyPass - Niall Best's Blog" srcset="https://substackcdn.com/image/fetch/$s_!JkN6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JkN6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JkN6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JkN6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef738daa-c6d6-4987-847e-dd93e5f1554d_480x498.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>What is an Enterprise Password Manager?</strong></h2><p>An <strong><a href="https://www.ssh.com/academy/secrets-management/password-vault">Enterprise Password Manager</a></strong> (EPM) is designed to manage an entire organization's passwords efficiently. </p><p>With the increasing number of security threats, secure passwords are becoming essential. EPMs streamline password management by providing a central hub for administrators to create policies that ensure strong passwords meet security standards. EPMs enable secure password sharing and can generate complex passwords automatically. </p><p>An EPM frees individual users from the burden of password management while ensuring security best practices are enforced.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NnGp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NnGp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 424w, https://substackcdn.com/image/fetch/$s_!NnGp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 848w, https://substackcdn.com/image/fetch/$s_!NnGp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!NnGp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NnGp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png" width="1456" height="935" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:935,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Password Manager Architecture | Password Vault for Enterprises&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Password Manager Architecture | Password Vault for Enterprises" title="Password Manager Architecture | Password Vault for Enterprises" srcset="https://substackcdn.com/image/fetch/$s_!NnGp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 424w, https://substackcdn.com/image/fetch/$s_!NnGp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 848w, https://substackcdn.com/image/fetch/$s_!NnGp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!NnGp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2a371894-dd3a-4311-a12c-ba5afdeb0cec_2242x1440.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>How Do Password Managers Work?</strong></h2><p>Need more passwords and help to remember them all? Enter password managers, the digital tool that can help secure and store all your login credentials. </p><p>But how do they work? Essentially, password managers create a master password that encrypts all your existing passwords and login information, making it almost impossible for hackers to access your accounts. The encrypted data is then stored in a secure vault, which can be accessed across all your devices or synced with cloud storage. </p><p>With password managers, you can quickly generate complex and unique passwords for all your accounts without worrying about remembering them. Plus, they often offer additional features such as two-factor authentication and dark web monitoring to give you even more peace of mind. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!KOTh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KOTh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 424w, https://substackcdn.com/image/fetch/$s_!KOTh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 848w, https://substackcdn.com/image/fetch/$s_!KOTh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 1272w, https://substackcdn.com/image/fetch/$s_!KOTh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KOTh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png" width="1456" height="948" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:948,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Privileged Access Management - Devolutions Server&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Privileged Access Management - Devolutions Server" title="Privileged Access Management - Devolutions Server" srcset="https://substackcdn.com/image/fetch/$s_!KOTh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 424w, https://substackcdn.com/image/fetch/$s_!KOTh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 848w, https://substackcdn.com/image/fetch/$s_!KOTh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 1272w, https://substackcdn.com/image/fetch/$s_!KOTh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F304f5d65-a2f9-4dc7-8b5b-52468edcf033_1512x984.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What is master password?</h2><p>A password vault is a highly secure solution for password management. </p><p>By using a single master key, customers can access different passwords for various websites and services. Password managers, such as the password vault, are essential tools for businesses and individual users to track, store, and manage their passwords, while also protecting them from being compromised or hacked. When passwords are safeguarded through a password vault, security and privacy of customers' online accounts are enhanced. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UB7n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UB7n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 424w, https://substackcdn.com/image/fetch/$s_!UB7n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 848w, https://substackcdn.com/image/fetch/$s_!UB7n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 1272w, https://substackcdn.com/image/fetch/$s_!UB7n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UB7n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png" width="561" height="362" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:362,&quot;width&quot;:561,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;TuM'Fatig - Self-host a password manager on OpenBSD&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="TuM'Fatig - Self-host a password manager on OpenBSD" title="TuM'Fatig - Self-host a password manager on OpenBSD" srcset="https://substackcdn.com/image/fetch/$s_!UB7n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 424w, https://substackcdn.com/image/fetch/$s_!UB7n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 848w, https://substackcdn.com/image/fetch/$s_!UB7n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 1272w, https://substackcdn.com/image/fetch/$s_!UB7n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa09b7093-3c37-42fc-a7e2-9f2d343b7db2_561x362.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Conclusion</h2><p>Password vaults are a great way to keep your online passwords safe without sacrificing convenience. They protect you from any potential data breaches if hackers get access to one of your accounts and from the mental exhaustion of keeping track of an ever-growing list of complex passwords. You must never reuse passwords across different accounts and use a reliable password vault to create and manage strong passwords for all those who demand access. With these tips, you can ensure the security and safety of your sensitive information while maintaining easy accessibility.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Best Identity Lifecycle Management software of 2023]]></title><description><![CDATA[If you are looking for an identity lifecycle management software, look no further. In this blog post, we will show you the best software of 2023.]]></description><link>https://cyberwow.com/p/best-identity-lifecycle-management</link><guid isPermaLink="false">https://cyberwow.com/p/best-identity-lifecycle-management</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Sun, 12 Feb 2023 15:54:05 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;person in black long sleeve shirt using macbook pro&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="person in black long sleeve shirt using macbook pro" title="person in black long sleeve shirt using macbook pro" srcset="https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1624969862644-791f3dc98927?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxwYXNzd29yZHxlbnwwfHx8fDE2NzYyMTY4OTg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@towfiqu999999">Towfiqu barbhuiya</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>Next year is going to be a big one for identity and access management (IAM) software. Experts are predicting that the market for IAM tools will continue to grow,with spending reaching $11.7 billion by 2023.</p><p>There are a lot of IAM solutions out there, so how do you know which one is right for you? To help you decide, we've put together a list of the best identitylifecycle management software of 2023. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p><strong>This list includes both commercial and open source options, so there's something for everyone. So read on to find the perfect solution for your organization!</strong></p><h2><strong>1. <a href="https://www.okta.com/">Okta&nbsp;</a></strong></h2><p>Okta is a developer platform that makes it easy to manage the identity lifecycle of your users. With Okta, you can easily add and remove users from your app, as well as track their activity and monitor their login history. Additionally, Okta provides a variety of tools to help you secure your app and protect your users' data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="675" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjc2MjE2OTA1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@entrpswn">Volodymyr Kondriianenko</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>2. <a href="https://docs.aws.amazon.com/cognito/index.html">Amazon Cognito&nbsp;</a></strong></h2><p>Amazon Cognito is a developer platform that makes it easy to manage user identities for your web and mobile apps. With Amazon Cognito, you can easily add and remove users from your app, as well as track their activity and monitor their login history. Additionally, Amazon Cognito provides a variety of tools to help you secure your app and protect your users' data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="810" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:810,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1603899122634-f086ca5f5ddd?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw2fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTU&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/es/@franckinjapan">Franck</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>3. <a href="https://auth0.com/">Auth0&nbsp;</a></strong></h2><p>Auth0 is a developer platform that makes it easy to manage user identities for your web and mobile apps. With Auth0, you can easily add and remove users from your app, as well as track their activity and monitor their login history. Additionally, Auth0 provides a variety of tools to help you secure your app and protect your users' data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="721" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:721,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;teal LED panel&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="teal LED panel" title="teal LED panel" srcset="https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1550751827-4bd374c3f58b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxzZWN1cml0eXxlbnwwfHx8fDE2NzYxOTk5OTQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@adigold1">Adi Goldstein</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>4. <a href="https://azure.microsoft.com/en-us/products/active-directory">Microsoft Azure Active Directory&nbsp;</a></strong></h2><p>Microsoft Azure Active Directory is a developer platform that makes it easy to manage user identities for your web and mobile apps. With Azure Active Directory, you can easily add and remove users from your app, as well as track their activity and monitor their login history. Additionally, Azure Active Directory provides a variety of tools to help you secure your app and protect your users' data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;purple and pink light illustration&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="purple and pink light illustration" title="purple and pink light illustration" srcset="https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1614064548237-096f735f344f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@flyd2069">FLY:D</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>5. <a href="https://www.onelogin.com/">OneLogin&nbsp;</a></strong></h2><p>OneLogin is a developer platform that makes it easy to manage user identities for your web and mobile apps. With OneLogin, you can easily add and remove users from your app, as well as track their activity and monitor their login history. Additionally, OneLogin provides a variety of tools to help you secure your app and protect your users' data.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;shallow focus photography of computer codes&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="shallow focus photography of computer codes" title="shallow focus photography of computer codes" srcset="https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyMHx8c2VjdXJpdHl8ZW58MHx8fHwxNjc2MTk5OTk2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@hishahadat">Shahadat Rahman</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>The Developer's Challenge</strong></h2><p>As a developer, you're tasked with creating applications that are secure, scalable, and reliable. </p><p>But in today's world, where users have multiple devices and access to a variety of apps, it's becoming increasingly difficult to manage identities and keep track of user data. </p><p><strong>This is where identity lifecycle management (ILM) comes in. So if you're looking for a new identity lifecycle management solution, now is the time to do your research.</strong></p><h2><strong>What is ILM?</strong></h2><p>Identity lifecycle management (ILM) is the process of managing the lifecycle of user identities from creation to deletion. </p><p>This includes creating and maintaining user accounts, managing passwords and permissions, and ensuring that only authorized users have access to the system.</p><h2><strong>Benefits of ILM</strong></h2><p>There are many benefits to using ILM in your applications. ILM can help to improve security by ensuring that only authorized users have access to the system. </p><p>Additionally, ILM can help to improve scalability by allowing you to easily add or remove users as needed. </p><p>Finally, ILM can help to improve reliability by ensuring that user data is accurate and up-to-date.</p><h2><strong>Implementing ILM</strong></h2><p>There are a few different ways that you can implement ILM in your applications. One way is to use a third-party service such as Okta or Auth0. </p><p>These services provide an easy way to manage user accounts and permissions without having to build your own solution from scratch.</p><p> Another way is to build your own ILM system using a framework such as <a href="https://firebase.google.com/">Firebase</a> or AWS Cognito. This option gives you more control over the user experience, but requires more effort and resources to build and maintain.</p><p>No matter which method you choose, it's important to ensure that all user data is secure. Make sure that passwords are encrypted and that authentication protocols are in place. </p><p>Additionally, it's wise to regularly monitor user activity and perform audits to check for any suspicious activity. By taking these steps, you can ensure the reliability of your ILM system and keep your users&#8217; data safe from malicious attackers or unauthorized access.</p><p>Another way to implement ILM is to use an open-source solution such as <a href="https://www.keycloak.org/">Keycloak</a> or FreeIPA. These solutions give you more control over the implementation but may require more work to set up and maintain.</p><h2><strong>Best Practices for ILM</strong></h2><p><strong>When implementing ILM in your applications, there are a few best practices that you should follow:</strong></p><ol><li><p><strong>Use strong authentication methods: </strong>When authenticating users, be sure to use strong methods such as two-factor authentication or biometric authentication. This will help to ensure that only authorized users have access to the system.</p></li><li><p><strong>Store sensitive data securely: </strong>Any sensitive data such as passwords or financial information should be stored securely using encryption or hashing algorithms. This will help to protect the data if the system is compromised.</p></li><li><p><strong>Audit user activity: </strong>Be sure to audit all user activity in the system so that you can detect any suspicious activity.</p></li></ol><p>Making sure that your identity management process is as smooth and efficient as possible is critical to the success of your business. By using the best identity lifecycle management software on the market, you can minimize security risks, improve customer service, and save time and money. </p><p>When choosing a product, make sure to consider your specific needs and requirements. The top five products listed above are some of the best options currently available, but there are many other great products out there as well. Choose wisely, and enjoy the benefits of a well-run identity lifecycle management system!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[SDK vs API: What's the difference?]]></title><description><![CDATA[As a developer, you've probably come across the terms "SDK" and "API". But what exactly is the difference between these two tools? In this blog post, we'll take a look at the SDK vs API debate and exp]]></description><link>https://cyberwow.com/p/adk-vs-api</link><guid isPermaLink="false">https://cyberwow.com/p/adk-vs-api</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Thu, 19 Jan 2023 16:08:14 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1623282033815-40b05d96c903?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxhcGl8ZW58MHx8fHwxNjc0MTQ0MTc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@douglasamarelo">Douglas Lopes</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>As a developer, you've probably come across the terms "SDK" and "API". But what exactly is the difference between these two tools? In this blog post, we'll take a look at the SDK vs API debate and explore the pros and cons of each approach. Stay tuned to find out which one is right for your next project! </p><h2><strong>What is an SDK and what is an API?</strong></h2><p>SDKs and APIs are often confused, but they serve different purposes. An SDK (Software Development Kit) is a package which includes pre-written code to help developers build applications faster, while an API (Application Programming Interface) acts as a bridge between two different software applications. </p><p>An API lets two programs exchange information and carry out certain tasks, such as retrieving data from a database. SDKs on the other hand provide access to the programming language used by a product so that developers can easily work with it and build powerful applications. </p><p>They can also include tools such as debugging software or libraries of reusable code, meaning developing with an SDK can potentially be a much more efficient process than coding from scratch every time.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="705" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:705,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;CAPTCHA&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="CAPTCHA" title="CAPTCHA" srcset="https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1516259762381-22954d7d3ad2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyfHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/ja/@markusspiske">Markus Spiske</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberwow.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>How do SDKs and APIs differ from one another?</strong></h2><p>SDKs and APIs are two related but distinct technologies that are used in various software applications. SDKs, or Software Development Kits, provide a set of tools and files that developers can use to build and configure a given application. </p><p>An API, or Application Programming Interface, is an interface through which two pieces of software can communicate with each other, allowing for the exchange of data between them. </p><p>In both cases, developers need to understand how these technologies work in order to design their applications correctly and ensure they are running efficiently. </p><p><strong>As such, understanding the differences between SDKs and APIs is key to creating successful software applications.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;man in black long sleeve shirt wearing black headphones sitting on chair&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="man in black long sleeve shirt wearing black headphones sitting on chair" title="man in black long sleeve shirt wearing black headphones sitting on chair" srcset="https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1602992708529-c9fdb12905c9?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxNnx8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/es/@nublson">Nubelson Fernandes</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>Which one should you use for your project - an SDK or an API?</strong></h2><p>Deciding which type of technology to use for your project can be an incredibly daunting task. When it comes to SDKs and APIs, understanding the difference between the two is key in making the right decision. An SDK, or software development kit, is a set of tools necessary for developing applications. It includes a library of pre-constructed programs that makes developing easy and efficient. </p><p>Meanwhile, an API (Application Programming Interface) is a set of protocols used for communication between different components in a system. Typically, APIs are used for more specific development tasks such as working with databases or integrating third-party software. </p><p>Depending on the requirements of your project, either an SDK or an API may be more suitable for you; if you&#8217;re looking to create new apps from scratch, an SDK may be your best bet while APIs allow you to unlock powerful features in existing applications. </p><p><strong>Either way, both technologies can help you bring your project to life!</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="608" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black laptop computer turned on on table&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black laptop computer turned on on table" title="black laptop computer turned on on table" srcset="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxjb2RlfGVufDB8fHx8MTY3NDA5ODk3Mg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jstrippa">James Harrison</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>How to get started with using either an SDK or an API</strong></h2><p>Choosing between using an SDK or API can be a daunting task, but with the right background knowledge it doesn&#8217;t need to be. An SDK (Software Development Kit) is usually pre-packaged and provides access to several APIs (Application Programming Interfaces). It is well suited for developers that want a comprehensive toolbox they can tailor to their specific needs. </p><p>On the other hand, an API is aimed at providing an easier way to connect with web services as it contains only what you need and nothing more. Before getting started make sure you know what technology stack you will be building on and consider anything else that might help bring your application together faster. </p><p><strong>Taking these steps will get you prepared and make navigating the world of SDKs and APls more efficient.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="608" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;turned on flat screen television&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="turned on flat screen television" title="turned on flat screen television" srcset="https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1503437313881-503a91226402?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxN3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzY&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@martinshreder">Martin Shreder</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2><strong>Tips for working with SDKs and APIs</strong></h2><p>Working with SDKs and APIs can feel intimidating as you start to develop, but it doesn't have to be. </p><p>For example, getting familiar with the language it is written in, the environment you'll be running it in, and any other existing tools involved will help immensely. It's also best practice to properly document your work as you go, and break down tasks into their smallest parts so that debugging is made easy. </p><p>Finally, not being afraid to experiment and ask questions can be incredibly helpful when tackling a new SDK or API project. <strong>Keeping these tips in mind as you work away can help make the process much more manageable.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="545" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:545,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;gray laptop computer turned-on&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="gray laptop computer turned-on" title="gray laptop computer turned-on" srcset="https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1546900703-cf06143d1239?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8Y29kZXxlbnwwfHx8fDE2NzQwOTg5NzI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@goshua13">Joshua Aragon</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>Conclusion</strong></h2><p>With this information, you should have a better understanding of what an SDK is, what an API is, how they differ from one another, and which one you should use for your project. If you're ready to get started with using either an SDK or an API, check out the resources in the Getting Started section. And finally, here are some tips to keep in mind when working with SDKs and APIs:</p>]]></content:encoded></item><item><title><![CDATA[What is the difference between SOC 1 and SOC 2?]]></title><description><![CDATA[In this article, we will discuss the key differences between SOC 1 and SOC 2 reports. We'll explain what each report is used for and how they can benefit your organization.]]></description><link>https://cyberwow.com/p/soc-1-vs-soc-2</link><guid isPermaLink="false">https://cyberwow.com/p/soc-1-vs-soc-2</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Mon, 26 Dec 2022 20:42:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2BiW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2BiW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2BiW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!2BiW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!2BiW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!2BiW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2BiW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/bb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:739232,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2BiW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 424w, https://substackcdn.com/image/fetch/$s_!2BiW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 848w, https://substackcdn.com/image/fetch/$s_!2BiW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 1272w, https://substackcdn.com/image/fetch/$s_!2BiW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fbb69a246-588e-4f94-9b53-c94e4734b017_2240x1260.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>SOC 1 and SOC 2 are two different types of reports that organizations can use to provide information about their controls and processes. SOC 1 reports are used for financial reporting purposes, while SOC 2 reports are used to assess an organization's compliance with security standards. While both types of reports can be useful for organizations, they serve different purposes and should be used accordingly.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberwow.com/subscribe?"><span>Subscribe now</span></a></p><h2><strong>SOC 1 vs. SOC 2 - what's the difference between these two types of compliance audits?</strong></h2><p>SOC 1 and SOC 2 compliance audits are two critical security compliance standards that organizations need to understand and adhere to. SOC 1 is focused on a service organization's internal controls relating to financial reporting, while SOC 2 evaluates the security, availability, confidentiality, processing integrity and privacy of a service provider's systems. By making sure a company or organization meets these two standards, they are helping ensure their customer data is kept safe and secure. Depending on the needs of the organization, both types of audits may be needed in order to protect and secure sensitive customer data. The differences between these two compliance audits can be confusing at times, but understanding which one applies in your situation will help ensure customers have peace of mind when dealing with your company or organization.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JFt_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JFt_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 424w, https://substackcdn.com/image/fetch/$s_!JFt_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 848w, https://substackcdn.com/image/fetch/$s_!JFt_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 1272w, https://substackcdn.com/image/fetch/$s_!JFt_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JFt_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png" width="560" height="315" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:315,&quot;width&quot;:560,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;soc1 vs soc2&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="soc1 vs soc2" title="soc1 vs soc2" srcset="https://substackcdn.com/image/fetch/$s_!JFt_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 424w, https://substackcdn.com/image/fetch/$s_!JFt_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 848w, https://substackcdn.com/image/fetch/$s_!JFt_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 1272w, https://substackcdn.com/image/fetch/$s_!JFt_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F3c6d8b9a-2cba-45ad-b194-93e18915e8b0_560x315.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Eyal Katz ON <a href="https://blog.exigence.io/soc1-vs-soc2">exigence</a>...</figcaption></figure></div><h2><strong>Why do companies need to be compliant with SOC 1 and SOC 2 standards?</strong></h2><p><strong>Companies need to be compliant with SOC 1 and SOC 2 standards in order to ensure the safety of their operations and maintain the trust of their customers.</strong></p><p>The SOC 1 standard requires companies to Implement controls for sensitive financial reporting, meaning companies must have a reliable system that protects against unauthorized access or use of data that could affect reported financial results. This helps build customer trust by ensuring their personal information will remain safe from cyberattacks.</p><p>Additionally, the SOC 2 standard requires companies to operate within certain security protocols and activities, which involve protection for collection, access, use and disposal of customer information. Companies meeting this standard must have demonstrable data HIPAA compliance initiatives as well as comprehensive logging capabilities that allow auditors to examine an entity's resource utilization over a given period. Compliance with SOC 1 and SOC 2 standards is essential in order to protect customers' personal data and create an environment of trust between the company and its clients.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vk3D!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vk3D!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Vk3D!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Vk3D!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Vk3D!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vk3D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg" width="584" height="329" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:329,&quot;width&quot;:584,&quot;resizeWidth&quot;:584,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Service Organization Control (SOC)&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Service Organization Control (SOC)" title="Service Organization Control (SOC)" srcset="https://substackcdn.com/image/fetch/$s_!Vk3D!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Vk3D!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Vk3D!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Vk3D!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F954a357a-7f2b-4226-95dc-8136987d726e_584x329.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://i0.wp.com/wentzwu.com/wp-content/uploads/2020/08/Service-Organization-Control-SOC.jpg?ssl=1">Wentz Wu</a></figcaption></figure></div><h2><strong>What are the benefits of being compliant with SOC 1 and SOC 2 standards?</strong></h2><p>For organizations handling the data of their customers and clients, SOC 1 and SOC 2 compliance is becoming increasingly important. Adhering to these standards not only ensures the highest level of account security and data protection, but it also provides many other benefits as well.</p><p>Organizations that are compliant demonstrate a commitment to customer satisfaction since SOC 1 and SOC 2 set a gold standard for operational efficiency and trustworthiness. Furthermore, contracts may require compliance to a specific standard in order to proceed with negotiations; this means companies that are compliant have access to a greater number of possible collaborations.</p><p>Finally, organizations will be kept up-to-date with industry best practices by remaining SOC 1 and SOC 2 compliant, resulting in more stable and secure systems. The bottom line is that compliance checks all the boxes when it comes to providing organizations with secure operations&#8211;and also gives them peace of mind knowing they&#8217;re prepared for any eventuality.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lSxw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lSxw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 424w, https://substackcdn.com/image/fetch/$s_!lSxw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 848w, https://substackcdn.com/image/fetch/$s_!lSxw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 1272w, https://substackcdn.com/image/fetch/$s_!lSxw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lSxw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png" width="823" height="595" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:823,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;SOC 1 Compliance | SSAE 18 | SOC 2 compliance | SOC 2 compliance&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="SOC 1 Compliance | SSAE 18 | SOC 2 compliance | SOC 2 compliance" title="SOC 1 Compliance | SSAE 18 | SOC 2 compliance | SOC 2 compliance" srcset="https://substackcdn.com/image/fetch/$s_!lSxw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 424w, https://substackcdn.com/image/fetch/$s_!lSxw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 848w, https://substackcdn.com/image/fetch/$s_!lSxw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 1272w, https://substackcdn.com/image/fetch/$s_!lSxw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2ff9358a-95bf-46a6-9c8a-ac0453403bfc_823x595.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>How can companies ensure they are compliant with SOC 1 and SOC 2 standards?</strong></h2><p>Companies need to be aware of the standards set by SOC 1 and SOC 2 in order to ensure they are adhering to rules, regulations, and best practices. To meet these requirements, it&#8217;s important to have a comprehensive understanding of the standards. Companies should focus on information security risk management processes and continually assess their environment to identify changes that need to be made that would lead to compliance.</p><p>Periodic audits and reviews can help verify the company&#8217;s compliance with all related policies. Companies should also have written procedures in place so staff can easily refer back and double-check requirements. Ultimately, thorough communication and documentation will allow companies to demonstrate they are compliant with SOC 1 and SOC 2 standards.</p><h2><strong>What are the consequences of not being compliant with SOC 1 and/or SOC 2 standards?</strong></h2><p>Not adhering to SOC 1 and/or SOC 2 standards can be a costly mistake for companies in the technology sector. Compliance with these standards is essential to ensure that customers' sensitive data and information are managed appropriately and securely. If a company's system or processes do not meet the requirements of these standards, they may face regulatory penalties or legal action as well as reputational damage which could have a serious impact on its operations.</p><p>Additionally, organizations that fail to comply with SOC 1 and/or SOC 2 requirements may find it difficult to attract new customers, who can be wary of any organization that fails to make the necessary investments in protecting their valuable data. Therefore, organizations should take the steps needed to ensure compliance with these standards in order to protect themselves from potential risks associated with non-compliance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;man facing three computer monitors while sitting&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="man facing three computer monitors while sitting" title="man facing three computer monitors while sitting" srcset="https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1550439062-609e1531270e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0Nnx8Y29kZXxlbnwwfHx8fDE2NzIwODY0ODg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@max_duz">Max Duzij</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>Conclusion</strong></h2><p>SOC 1 and SOC 2 compliance audits are essential for businesses because they ensure that the company is adhering to industry best practices. Not being compliant with SOC 1 and/or SOC 2 standards can result in significant fines, business loss, and reputation damage. Therefore, companies must ensure they are compliant with both SOC 1 and SOC 2 standards.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Container as a Service 101: What You Need to Know (CaaS)]]></title><description><![CDATA[Containers are revolutionizing how businesses operate, but what is Container as a Service (CaaS) and how can it benefit your business?]]></description><link>https://cyberwow.com/p/container-as-a-service</link><guid isPermaLink="false">https://cyberwow.com/p/container-as-a-service</guid><pubDate>Wed, 09 Nov 2022 17:54:40 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1661956600684-97d3a4320e45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MXwxfHNlYXJjaHw4fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY4MDE1MTU3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@mailchimp">Mailchimp</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>A container as a Service, or CaaS, is a type of cloud computing that allows users to access and manage containers through a cloud platform. Containers are self-contained units of software that include all the necessary files and dependencies needed to run an application. CaaS provides users with on-demand access to container resources without worrying about the underlying infrastructure.&nbsp;</p><p>In this blog post, we'll give you a crash course in CaaS so that you can decide if it's the right solution for your needs. We'll cover what containers are, how CaaS works, the benefits of using CaaS, and some of the top CaaS platforms on the market. By the end of this post, you should have a good understanding of what CaaS is and whether or not it's right for you.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What are Containers?</h2><p>Containers are self-contained units of software that include all the necessary files and dependencies needed to run an application. Unlike virtual machines (VMs), which require their OS and can be quite resource-intensive, containers share a single OS kernel and can be spun up or down very quickly. This makes them much more efficient than VMs, which is why containers have become so popular in recent years.&nbsp;</p><h2>How Does CaaS Work?</h2><p>CaaS platforms provide users with on-demand access to container resources without worrying about the underlying infrastructure. Users can select the desired container size and type, and the CaaS platform will provide the resources automatically. This allows users to focus on their applications rather than worrying about managing infrastructure.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;turned on gray laptop computer&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="turned on gray laptop computer" title="turned on gray laptop computer" srcset="https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1488590528505-98d2b5aba04b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@lucabravo">Luca Bravo</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2>The Benefits of Caas</h2><p><strong>There are many benefits to using CaaS, including the following:&nbsp;</strong></p><ol><li><p>On-demand access to resources: With CaaS, you only pay for the resources you use. This makes it very cost-effective since you don't have to worry about overprovisioning or underutilizing resources.&nbsp;</p></li><li><p>Increased efficiency: Containers are much more efficient than VMs since they share a single OS kernel. This means you can spin up new containers very quickly, saving you time and money in the long run.&nbsp;</p></li><li><p>Improved scalability: With CaaS, it's easy to scale up or down as your needs change since you're not tied to any particular infrastructure. You can add or remove containers as needed without worrying about provisioning new servers or reconfiguring existing ones.&nbsp;</p></li><li><p>Reduced complexity: Since CaaS abstracts away the underlying infrastructure, it's simpler to use than traditional bare-metal or VM solutions. This can save you time and money by reducing complexity and increasing efficiency.&nbsp;</p></li></ol><h2>How to choose the right CaaS provider for your needs</h2><p>With so many cloud providers, selecting the right CaaS provider for your needs can be complicated. One crucial factor to consider is the provider's experience. Look for a provider with a proven track record of delivering reliable cloud services. Another vital factor to consider is the provider's cloud infrastructure. </p><p>Make sure the provider has a robust and scalable cloud infrastructure to meet your future needs. Finally, compare the pricing of different providers before making a decision. By taking the time to evaluate your options, you can be sure to select the best CaaS provider for your needs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="715" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:715,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;white ceramic mug beside black computer keyboard&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="white ceramic mug beside black computer keyboard" title="white ceramic mug beside black computer keyboard" srcset="https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1603468620905-8de7d86b781e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxM3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE1Nw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@ryland_dean">Ryland Dean</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2>The future of container orchestration technology and its impact on CaaS</h2><p>As infrastructure as a service (IaaS) becomes increasingly common, organizations are looking for ways to streamline their operations and reduce costs. One promising solution is containerization, which involves packaging applications in lightweight containers that can be easily deployed on any IaaS platform. This approach has already significantly impacted how enterprises manage their IT infrastructure, and it is likely to become even more critical in the coming years.</p><p>Container technology makes it possible to rapidly provision new services and scale them up or down as needed without reconfiguring the underlying infrastructure. This makes it an ideal solution for organizations that need to be able to respond quickly to changes in demand. </p><p>In addition, containers are highly portable and can be easily moved between different IaaS providers. This gives organizations the flexibility to choose the provider that best meets their needs without being locked into a single vendor. The rise of container technology is likely to significantly impact how organizations consume IT infrastructure, and it is already starting to reshape the landscape of the cloud computing industry.</p><h2>Top 5 CaaS Platforms&nbsp;</h2><p>1) Amazon Elastic Container Service (ECS): Amazon ECS is a managed container service that makes it easy to run and manage containerized applications at scale on AWS.&nbsp;</p><p>2) Azure Container Instances (ACI): Azure Container Instances is a serverless solution that allows you to deploy containers without worrying about server management.&nbsp;</p><p>3) Google Cloud Run: Google Cloud Run is a managed computing platform enabling you to run stateless containers invocable via HTTP requests.&nbsp;</p><p>4) Docker Enterprise Edition (EE): Docker EE is a commercial offering from Docker that provides advanced capabilities for managing and running containerized applications at scale.&nbsp;</p><p>5) Kubernetes Engine (GKE): Google Kubernetes Engine is a managed Kubernetes service that makes it easy to deploy and manage containerized applications at scale on the Google Cloud Platform (GCP).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;persons hand on black computer keyboard&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="persons hand on black computer keyboard" title="persons hand on black computer keyboard" srcset="https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1617900906639-cab7adceb499?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0M3x8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTU3OA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/es/@nublson">Nubelson Fernandes</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2>What is Container as a Service (CaaS)?</h2><p>A container as a Service (CaaS) is a type of cloud computing that allows users to run applications in containers. Containers are isolated instances that can run multiple copies of an application on a single server. CaaS provides a platform for running containerized applications, typically in a public or private cloud environment. CaaS services often include additional features such as container orchestration, storage, and networking. </p><p>By using CaaS, organizations can benefit from the flexibility and scalability of containerized applications without managing the underlying infrastructure. In addition, CaaS can help to reduce the costs associated with running containers by sharing resources across multiple users.</p><h2>Why use CaaS for your business or enterprise applications?</h2><p>There are many reasons to use CaaS, or Cloud-based application services, for your business or enterprise applications. One of the essential advantages of using CaaS is that it can help you save time and money. </p><p>By using Caas, you can avoid purchasing, installing, and maintaining expensive hardware and software. In addition, CaaS can provide you with the flexibility to scale your applications up or down as needed without incurring additional costs. </p><p>CaaS can also help improve your applications' performance by providing access to more powerful hardware and software resources. Finally, CaaS can provide you with a higher level of security for your data and applications. When you use Caas, your data and applications are stored in the cloud, which provides an extra layer of protection from potential threats.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;man using black laptop computer&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="man using black laptop computer" title="man using black laptop computer" srcset="https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1528901166007-3784c7dd3653?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyOHx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2ODAxNTE3Mw&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@disruptxn">X</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p></p><h2>How does CaaS work, and what are its benefits over traditional virtualization or public cloud services models?"</h2><p>CaaS, or Cloud-as-a-Service, is a type of cloud computing that delivers software, infrastructure, and other resources through a pay-as-you-go subscription model. CaaS providers manage the underlying hardware and software resources, freeing customers to focus on their applications and business needs. Because CaaS providers collect and maintain cloud resources, customers can benefit from lower costs and simplified operations. </p><p>In addition, CaaS offers greater flexibility than traditional virtualization or public cloud services models, allowing customers to scale up or down as needed quickly. As a result, CaaS is an attractive option for businesses that want to take advantage of the benefits of cloud computing without the hassle and expense of managing their infrastructure.</p><h2>The different types of CaaS providers and what to look for when choosing one</h2><p>When choosing a CaaS provider, there are a few things to remember. First, you'll want to consider the type of service that you need. Are you looking for a simple CRM system, or do you need something more complex? </p><p>There are two main types of CaaS providers: software-as-a-service (SaaS) and platform-as-a-service (PaaS). SaaS providers offer pre-built applications that can be easily integrated into your existing infrastructure. On the other hand, PaaS providers offer a more flexible solution that allows you to build and customize your applications.</p><p>Next, you'll want to consider the price. CaaS solutions can vary widely in price, so it's crucial to find one that fits your budget. Additionally, you'll want to ensure that the provider offers a flexible pricing model that allows you to scale up or down as needed.</p><p>Finally, you'll want to consider the level of support you need. Some providers offer 24/7 support, while others only provide limited support during business hours. You'll also want to ensure that the provider has a good reputation for providing timely and responsive support. With so many CaaS providers, doing your research upfront will help you find the best solution for your business.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black flat screen computer monitors&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black flat screen computer monitors" title="black flat screen computer monitors" srcset="https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1519241047957-be31d7379a5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw0fHxkZXZ8ZW58MHx8fHwxNjY4MDE2MDE3&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@hackcapital">Hack Capital</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h1>Case studies of how CaaS has been successfully implemented by businesses and enterprises</h1><p>The cloud-native approach to application development and deployment, CaaS (Containers as a Service), is gaining popularity among businesses and enterprises. CaaS allows developers to package their applications into self-contained units called containers, which can then be deployed on any infrastructure, whether on-premise or in the cloud. This flexibility and portability have made CaaS an attractive option for businesses that want to modernize their applications without being tied to a specific platform.</p><p>There are many examples of businesses that have successfully implemented CaaS. One notable example is Netflix, which migrated its entire video streaming platform to Amazon Web Services (AWS) containers. By using CaaS, Netflix was able to improve the efficiency of its application development process and reduce the time it took to deploy new features and updates.</p><p>Another company that has benefited from CaaS is Yelp, which used containers to simplify its development process and speed up deployments. As a result, Yelp was able to release new features faster and achieve shorter average downtime periods. These are just a few examples of how CaaS can be used successfully by businesses and enterprises. With its benefits of flexibility, portability, and ease of use, CaaS will continue gaining popularity in the future.</p><h1>Conclusion</h1><p>CaaS is quickly becoming the go-to solution for businesses and enterprises needing to deploy rapidly, efficiently, and scalable applications. By choosing a reputable CaaS provider, you can be sure that your applications will be up and running in no time without any of the hassle or headaches typically associated with traditional virtualization or public cloud service models. Are you ready to take your business to the next level? Contact us today to learn more about how our CaaS solutions can help you achieve your goals.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CYBER WOW! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[DevOps Security: Why You Need It and How to Implement It]]></title><description><![CDATA[Learn about the benefits of DevOps security and how you can easily implement it into your organization.]]></description><link>https://cyberwow.com/p/devops-security-why-you-need-it-and</link><guid isPermaLink="false">https://cyberwow.com/p/devops-security-why-you-need-it-and</guid><pubDate>Tue, 01 Nov 2022 15:59:21 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black Android smartphone&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black Android smartphone" title="black Android smartphone" srcset="https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1564865878688-9a244444042a?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxfHxjb2RlfGVufDB8fHx8MTY2NzMxODAyMg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@synkevych">Roman Synkevych &#127482;&#127462;</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>DevOps security is the practice of securing the software development process from start to finish. By applying security controls throughout the development process, DevOps teams can reduce the risk of vulnerabilities and exploits in their applications.</p><p>DevOps teams often use various tools and techniques to automate the software development process. This includes using continuous integration (CI) and continuous delivery (CD) to build, test, and deploy code changes automatically. Applying security controls at each development stage can help ensure that only authorized changes are made to production systems.</p><p>In addition to automated tools, DevOps teams also need to follow secure coding practices. This includes writing code that is secure by default and following best practices for securing data and access control. DevOps teams should also consider using application security testing tools to scan for vulnerabilities in their code before it is deployed to production.</p><h2><strong>What Is DevOps Security?</strong></h2><p>DevOps security is the practice of securing software development, testing, and deployment. By integrating security into the DevOps process, organizations can reduce the risk of vulnerabilities and ensure that their software is safe and compliant.&nbsp;</p><h2><strong>Why Is DevOps Security Important?</strong></h2><p>As organizations rely increasingly on software to run their businesses, the need for DevOps security has never been greater. With so much riding on the stability and security of software, it's essential that development and operations teams work together to ensure that code is properly tested and secure before it's deployed.&nbsp;</p><p><strong>There are many benefits to using DevOps</strong></p><p><strong> for security, including:</strong></p><p>&#8226; Improved communication and collaboration between development and operations teams</p><p>&#8226; Greater visibility into the application development process</p><p>&#8226; Faster identification and resolution of security issues</p><p>&#8226; Reduced risk of human error</p><p>&#8226; Increased efficiency and productivity</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="720" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black flat screen computer monitor&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black flat screen computer monitor" title="black flat screen computer monitor" srcset="https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1592609931095-54a2168ae893?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNXx8ZGV2ZWxvcGVyfGVufDB8fHx8MTY2NzMxODA3MQ&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@gamell">Joan Gamell</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>Implementing DevOps Security Measures</strong></h2><p>There are several steps businesses can take to secure their applications and services using DevOps, including:</p><h3><strong>1. Adopt a culture of security:</strong></h3><p>Security should be a top priority for every team member, from developers to ops professionals. Everyone should be aware of the potential risks and vulnerabilities associated with the applications they&#8217;re working on and clearly understand the steps they need to take to mitigate those risks.&nbsp;</p><h3><strong>2. Automate security testing:</strong></h3><p>By automating security testing, you can ensure that all your applications and services are thoroughly tested for vulnerabilities before they&#8217;re deployed. This will help you avoid costly delays and disruptions down the road.&nbsp;</p><h3><strong>3. Implement role-based access control:</strong></h3><p>Role-based access control (RBAC) is vital to any DevOps security strategy. RBAC ensures that only authorized users have access to sensitive information and systems. 4. Monitor activity in real-time. By monitoring activity in real-time, you can quickly identify suspicious behavior and take action to mitigate any potential threats. This includes monitoring both internal activity (e.g., user activity) and external activity (e.g., network traffic).&nbsp;</p><h3><strong>5. Invest in training and education:</strong></h3><p>Investing in training and education is important so your team members have the knowledge and skills they need to implement effective DevOps security measures. This will help ensure that your business can keep up with the ever-changing landscape of cyber threats.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="692" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:692,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black remote control on red table&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black remote control on red table" title="black remote control on red table" srcset="https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1605379399642-870262d3d051?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw1fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@ffstop">Fotis Fotopoulos</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>How to Implement DevOps Security</strong></h2><p>There are a number of ways to implement DevOps security, but some of the most common methods include incorporating security into the software development life cycle (SDLC), using security testing tools, and implementing automation.&nbsp;</p><h2><strong>The Need for DevOps Security</strong></h2><p>As organizations move to adopt DevOps practices, it's important to consider security at every stage of the software development process. In the past, security was often an afterthought in software development. But in today's world, with cyberattacks becoming more sophisticated and frequent, that's no longer good enough. Organizations need to shift left and bake security into their DevOps processes from the beginning.</p><h2><strong>There are a number of benefits to adopting DevOps security practices, including:</strong></h2><ol><li><p><strong>Faster delivery of secure software: </strong>By integrating security into the software development process, organizations can speed up the delivery of secure software without sacrificing quality or security.</p></li><li><p><strong>Improved visibility and collaboration: </strong>DevOps security practices improve visibility into the entire software development process, which makes it easier to identify and fix security issues early on. Additionally, because DevOps security is a collaborative effort between developers and operations teams, it leads to better communication and collaboration around security concerns.</p></li><li><p><strong>Reduced risk: </strong>Adopting DevOps security practices helps identify and address potential security threats early in the development process.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="608" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;black laptop computer turned on on table&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="black laptop computer turned on on table" title="black laptop computer turned on on table" srcset="https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1587620962725-abab7fe55159?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHw3fHxkZXZlbG9wZXJ8ZW58MHx8fHwxNjY3MzE4MDY2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@jstrippa">James Harrison</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>Common DevOps Security Practices</strong></h2><p>There are a number of common DevOps security practices that organizations can adopt to improve their overall security posture. These include:</p><ol><li><p><strong>Implementing a secure coding policy: </strong>A secure coding policy outlines the standards that developers should follow when writing code. This includes things like using strong passwords, avoiding hard-coded secrets, and properly handling sensitive data.</p></li><li><p><strong>Automating vulnerability scans:</strong> Vulnerability scans should be run automatically as part of the continuous integration/continuous deployment (CI/CD) pipeline. This will help identify potential vulnerabilities early on so they can be fixed before production deployments.</p></li><li><p><strong>Using secrets management: </strong>Secrets management is a way of securely storing and managing sensitive information, such as passwords and API keys. This is important because it helps prevent hard-coded secrets from ending up in source code repositories where they could be leaked or stolen.</p></li><li><p><strong>Enforcing least privilege: </strong>Least privilege is a principle of access control that states that users should only have the permissions they need to perform their job duties&#8212;no more, no less. Enforcing the least privilege helps reduce the attack surface by ensuring that users only have access to the resources they need.&nbsp;</p></li></ol><h2><strong>Conclusion:&nbsp;</strong></h2><p>DevOps has revolutionized the way organizations develop and deploy software. By automating processes and integrating communication between development and operations teams, DevOps has helped organizations release software faster and more efficiently. However, as with any powerful tool, there are potential risks involved with using DevOps. That's why DevOps security is so important. By incorporating security into the DevOps process, organizations can reduce the risk of vulnerabilities and ensure that their software is safe and compliant.</p>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is CYBER WOW, a newsletter about Trending Security Tips.]]></description><link>https://cyberwow.com/p/coming-soon</link><guid isPermaLink="false">https://cyberwow.com/p/coming-soon</guid><dc:creator><![CDATA[Ron Fybish]]></dc:creator><pubDate>Wed, 20 Apr 2022 15:10:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!95Sn!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5dfebd9d-9be9-435f-ab20-21b8cfa34ede_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>This is CYBER WOW</strong>, a newsletter about Trending Security Tips.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberwow.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberwow.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>