The Automation DevOps Wants, Controls InfoSec Requires & Convenience Staff Crave
How strongDM Works
Client on the user’s workstation listens on dedicated localhost ports then tunnels all queries, ssh & RDP commands through a single TLS 1.2 secured TCP connection to the proxy.
Gateway decrypts, logs, and conveys all requests to the database or server using its native protocol.
strongDM logs consist of four components:
- Database queries
- SSH captures
- Windows Remote Desktop captures
- Web UI activities
If the gateway cannot communicate directly with the target database or server, a relay can create a reverse tunnel that permits ingress into secured networks where inbound traffic is not allowed.
“The effort to achieve SOC 2 without strongDM would have been monumental.”