How are you managing access for remote or third-party developers who have access to your code, servers, and potential databases? What frameworks do you have in place to safeguard against third-party data breaches or insider data theft?

894 views1 Upvote3 Comments
Sort By:
Oldest
ceo in Software2 months ago
I'd use an SDP/ZTNA solution.  We offer that at NVIS AI, where you're able to quickly and securely provision and de-provision a contract workforce.  Feel free to connect if you're interested in learning more.
1
ceo in Software2 months ago
I also see that it may be in the mfg context.  It also can connect the OT to the cloud securely without needing an IT/OT DMZ. 

Also, for OEMs to remote in securely to their equipment to conduct troubleshooting or run data analytics.  This can be 1-way or 2-way as well.
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Global Chief Cybersecurity Strategist & CISO in Healthcare and Biotech2 months ago
I agree with using VPN/A and like Zscaler's solution. It includes MFA, tracking, VDI use, etc. Ensure that you also check with legal to ensure that you are not in breach of contract if you use developers, for example, outside your country's borders.
3

Content you might like

Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes