Comment by kubectl_h

Comment by kubectl_h 2 days ago

0 replies

If you've ever worked in an org that has to be SOX (Sarbanes-Oxley Act) compliant, then you are familiar with a bunch of what's happening in this video. So much of your data, infra, and internal tools have to be gated by authorization and access logging tools -- so employees are constantly requesting access to the tools they need to get their work done.

These requests can be granted manually or automatically but they need to be logged and stored. Sometimes requests are required for every single access of a tool and sometimes it's time period based (24 hour access to Redshift or whatever) -- usually this depends on your role in an org. There isn't a coherent out-of-the-box way to provide the authorization and access gateways across all the different tools a business relies on -- so there is a big business opportunity for companies to basically provide turnkey identity and access management tools for companies.

Or, occasionally, an engineer loses their mind with the inefficiencies of these systems and processes and goes off on a jag to create the perfect internal tool to solve all these problems. That rarely (if ever) works, hence the video.