Shownotes
You can think of authentication as the key that lets you inside a house. Authorization allows you to enter a specific room, open the closet, turn on the TV, and look under the bed. Governance is the historical record of all activity that took place. In an enterprise environment, those interconnected “rooms” are core infrastructure, cloud platforms, and business applications. Authentication, authorization, and governance work together to protect the identity framework across them all. Frank Vukovits, chief security scientist at Delinea, joins Joe to break down how each of these elements contributes to effective identity security. An experienced auditor, Frank shares the importance of compliant user provisioning for critical business applications such as Oracle, SAP, Netsuite, and Microsoft Dynamics, especially as employees join, change roles, and ultimately leave an organization. You'll see why permissions in these systems must be carefully managed through authentication, authorization, and governance to shrink your attack surface, avoid toxic conflicts, and reduce the potential for fraud.
Connect with Delinea:
Delinea Website: https://delinea.com/
Delinea LinkedIn: https://www.linkedin.com/company/delinea/
Delinea Twitter: https://twitter.com/delineainc
Delinea Facebook: https://www.facebook.com/delineainc
Delinea YouTube: https://www.youtube.com/c/delinea