<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
blog /
Understanding the Difference Between IAM Roles and Policies in AWS

Understanding the Difference Between IAM Roles and Policies in AWS

In this article, you’ll learn the difference between AWS roles vs. policies and see examples of each. By the end of this article, you’ll have a clear understanding of what distinguishes an AWS role from a policy, in addition to understanding the difference between IAM roles, users, and groups.
When Old-School Isn't Cool: Sluggish and Untenable Access

When Old-School Isn't Cool: Sluggish and Untenable Access

Sluggish access is more than an inconvenience. The workarounds people take to ease friction can lead to security gaps and compliance problems, plus a lot of pain for users and admins alike.
Understanding GCP IAM Roles

Understanding GCP IAM Roles

In this article, you’ll learn about how GCP IAM works and the different types of roles that can be delegated to users as well as when those roles are most appropriate in the GCP environment. By the end of this article, you’ll have a clear understanding of the pros and cons of each different role type as well as their limitations.
Why Access Management Is Overdue for Innovation

Why Access Management Is Overdue for Innovation

Tech teams report: infrastructure has gotten complicated & access control has not kept up. Learn why access management is overdue for innovation.
Identity and Access Management (IAM) Best Practices

Identity and Access Management (IAM) Best Practices

In this article, we'll list eleven Identity and Access Management (IAM) best practices and describe each one of them in detail. You'll also learn how to make these best practices standard in your organization.
Infrastructure Access Management 101: Tracking and Managing

Infrastructure Access Management 101: Tracking and Managing

When it comes to Access Management, taking inventory of your systems is just one of the tasks you need to tackle. Watch the course on Access Roles & Discovery to learn why taking inventory of your employees and their required access is just as important.
You Can't Have Zero Trust Without Identity and Access Management

You Can't Have Zero Trust Without Identity and Access Management

In a recent podcast, Gartner described the starting point for Zero Trust: Identity and Access.
Identity Access Management (IAM) vs. Privileged Access Management (PAM): Why IAM Alone Won’t Cut It

Identity Access Management (IAM) vs. Privileged Access Management (PAM): Why IAM Alone Won’t Cut It

Access management matters. These days, large-scale data breaches make news headlines more often than celebrity breakups, and 61% of those breaches involve credential data. That’s clearly a problem, and the search for a solution is likely to leave you in a sea of acronyms. PIM, PAM, IAM… what’s the difference? And what matters for your organization?
Access Management 101: Understanding Roles & Access

Access Management 101: Understanding Roles & Access

Here’s the scenario: On one side, you’re inundated with requests to provide access to critical infrastructure in order to enable teams to do their jobs; on the other side, you’re tasked with auditing access and ensuring that security to those systems is solid.
StrongDM app UI showing available infrastructure resources
Connect your first server or database in 5 minutes. No kidding.