<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
ALL USE CASES > CONNECT

StrongDM Policy Playbook:
Permit Connections to Production Kubernetes Clusters

This policy allows connection to production Kubernetes clusters with an MFA.

Code Sample

Loading...
Copied to clipboard!

Video Demo

Why It Matters? 

A common technique during an attack is to use stolen credentials to find areas where an attacker can elevate their privilege. This is done to obtain access to compute resources to establish command and control (C2) channel, lateral movement, or execute malicious actions such as lateral movement or deploy malware or back doors.


What Exactly Does This Policy Do?

This policy helps contain an attack and persistent threats by enforcing an MFA prompt for privileged users before they are allowed to connect to production Kubernetes resources. This requirement ensures that users must prove their identity, helping to prevent unauthorized access and reduce the risk of compromise from stolen credentials.

new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀