Vector handprints and five fingerprints

Wrangling control of your security groups

Author:  Paul Reiner, Kalles Group As a long time Identity & Access Management (IAM) consultant, I routinely hear IT departments bemoaning the cost and complexity of managing security groups. It seems that over the course of time, the company has lost track of a security group’s purpose and owner so they no longer can determine …

Wrangling control of your security groups Read More »