Ensure your access flows grant the least-privileged access to users
Managing unused permissions, resources, and roles is essential for improving security and streamlining access management, but it can often be a complex task.
The Right Sizing page simplifies this process by providing a consolidated view of access flow resources and usage insights. This feature helps teams enhance security by aligning with the principle of least privilege and optimizing resource allocations. Through actionable recommendations, users can identify and remove unused access, keeping workflows secure and efficient.
For example, you might discover a Kubernetes namespace that hasn’t been used for months. With this insight, you can confidently remove it from the access flow, minimizing overprivileged risks and simplifying operations.
Key Benefits:
Comprehensive Insights: Gain visibility into access flow usage, highlighting overprivileged or underutilized resources, permissions, and user roles
Actionable Recommendations: Receive data-driven suggestions to remove unused access, helping to reduce risks and improve security posture
Continuous Monitoring: Access current month (updated daily) and monthly trend reporting to track improvements over time
Item | Description |
---|---|
Follow these steps to right size an access flow:
On the Right Sizing tab, select an Access Flow from the dropdown menu. The right-sizing report for the current month-to-date appears.
You can also access the Right Sizing page for an access flow directly from your Apono dashboard. In the Right Sizing Insights tile, click More Details in the row of an access flow.
(Optional) Click the Period button to select a past month. Reviewing the report details for previous months enables you to identify usage trends.
(Optional) Filter the list of resources by one or several of the following filters.
Click Edit Access Flow. The Edit Access Flow page for the access flow appears.
Remove the unused resources, inactive users, or unused permissions from the access flow.
Click Save Access Flow to apply your changes.
Click to view the right-sizing recommendation details. A panel appears that lists the recommendation and relevant items.
Access flow
One or more dynamic permissions workflows to define access to resources
If you have not already, get started with access flows.