<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
LAUNCH WEEK 🚀 Enable continuous, contextual + granular authorization. Learn more.
strongDM logo

blog

Cloud Privileged Access Management (PAM) Migration Guide

Cloud Privileged Access Management (PAM) Migration Guide

You’re moving to the cloud, but your PAM solution won’t migrate. Everyone needs access. It’s time to rethink your access management strategy.
‘As Code’ in the Wild: How This FinTech Embraced Zero-Friction Infrastructure Access

‘As Code’ in the Wild: How This FinTech Embraced Zero-Friction Infrastructure Access

strongDM’s CTO and co-founder, Justin McCarthy, sat down with Drew Blas, Director of Internal Engineering at Betterment, to discuss sources of
4+ Kubernetes Authentication Methods (Proxy, OIDC & More)
4+ Kubernetes Authentication Methods (Proxy, OIDC & More)
Kubernetes authentication presents a unique challenge. While Kubernetes defines the concepts of both user accounts and service accounts natively, it doesn’t provide us with a single, built-in method for authenticating those accounts. Instead, we must choose from a variety of techniques involving third-party tools or resources to perform Kubernetes cluster authentication.
How to: MySQL Create User and Grant Permissions
How to: MySQL Create User and Grant Permissions
Find an easier way to manage access privileges and user credentials in MySQL databases. Reduce manual, repetitive efforts for provisioning and managing MySQL access and security with strongDM.
Change MySQL Root Password in Linux or Windows Step-By-Step
Change MySQL Root Password in Linux or Windows Step-By-Step
On an unmodified MySQL install, the root user account does not have a password. This is extremely insecure! As a systems administrator, we know that the easiest way to compromise a system is using the default unchanged password with admin privileges.
SSH Audit Made Simple
SSH Audit Made Simple
SSH audit logs allow you to determine, either retroactively or in real-time, when an unauthorized or destructive action was taken, and by whom.
What Would My SOC 2 Dashboard Look Like?
What Would My SOC 2 Dashboard Look Like?
As your organization pursues your SOC 2 certification, organization is critical. ‍You will be busy actively managing dozens of ongoing daily tasks, which can bury you in minutiae. But at the same time, you need to keep your high-level compliance goals in focus in order to successfully move your certification over the finish line.
Everything You Need to Know About SOC 2 Audits
Everything You Need to Know About SOC 2 Audits
Whether you’re looking to achieve SOC 2 compliance, or just want to learn more about it, your Googling is bound to lead you to a wealth of articles chock full of buzzwords and acronym soup. ‍In this post, we will provide a guide with definitions, links and resources to gain a solid understanding of everything you need to know about SOC 2 audits.
StrongDM app UI showing available infrastructure resources
Connect your first server or database, without any agents, in 5 minutes.