This video demonstrates how P0 Security replaces broad standing access to Kubernetes clusters with least privilege and short-lived access through fine-grained controls. The environment shown is configured in AWS using AWS EKS and IAM users for identity with access to NGINX. P0 also supports other Identity Providers (IDPs) such as Okta or Active Directory. P0 offers several ways to seamlessly request and manage access to K8 clusters within existing workflows, including a Slackbot, a web app, and the P0 Command Line Interface (CLI) tool. Administrators can review the request, modify the access duration, and, if approved, grant tightly scoped access.
Get a demo of P0 Security, the next-gen PAM platform built for every identity.