Problem Statement
A financial institute that provides loans to businesses faced a significant challenge: ensuring the security of sensitive customer financial data hosted on Google Cloud Platform (GCP). To mitigate risks, the institute chose to lock down GCP Project access, avoiding the need for standing permissions.
Since the financial institute handles a sensitive financial data, including personal and business loan information, they implemented Britive to provide just in time ephemeral access.
As you can see from the video below, Britive provided JIT ephemeral access to GCP Project. This access is controller by the application profile and a policy associated with it. To get privileged access, the admin has to request it from the UI or programmatically (CLI or Terraform).
Once the checkout process complete, admin could now access GCP Project directly from Britive UI, as you can see from following animated video
Following video shows access is now available to GCP project. This access will be expired in 59 minute automatically (this is configurable) or admin can also close the access directly from Britive UI when the task is complete.
Conclusion
By locking down GCP Project access, the financial institute significantly reduced the risk of unauthorized access and potential data breaches. Britive multicloud PAM is an excellent choice to provide JIT empherele access using a unified SaaS solution without deploying any agents and proxies.
To get to know more about the solution or see a product demo contact Brive here.
Comments are closed