Segregation of Duties (SoD) is a fundamental internal control principle that aims to reduce the risk of fraud, errors, and conflicts of interest within an organization by dividing critical tasks and responsibilities among different individuals or departments. By...
AWS infrastructure security: Top 6 must-know best practices
Over the last few years, several high-profile data breaches have rocked the tech industry, specifically targeting cloud infrastructure. Many of these attacks started on servers hosted in Amazon Web Services (AWS) and successfully bypassed all the security controls. In...
Unlock the secrets of identity governance and administration
Identity governance and administration (IGA) is a critical part of any organization's security posture. Monitoring, controlling, and managing user access to ensure that only authorized personnel have access to sensitive information or resources is an integral part of...
Protect your organization from software supply chain attacks
On April 1, 2021, San Francisco-based technology company CodeCov discovered that attackers had compromised its software platform, which over 29,000 customers use worldwide to test software code. While that was troubling enough, the tampering reportedly started back in...
What Is the principle of least privilege?
The principle of least privilege (POLP) security concept requires that users, processes, and systems only have the minimum access rights necessary to perform their designated function. This principle reduces the risk of security breaches and unauthorized access by...
IAM – what is identity and access management?
Identity and access management (IAM) is a discipline concerned with managing electronic or digital identities. The IAM function allows information technology (IT) managers to control access of users, devices, and applications to information within their...





