Breaking glass access is a security practice that allows authorized individuals to gain emergency access to a system or resource in case of critical situations, suach as a security breach, data loss, or other high-impact incidents. This kind of access is highly restricted an monitored to prevent misuse.
Intended Outcome
Enable authorized personnel to swiftly and securely access critical systems and resources in emergency situations, bolstering security and mitigating high-impact incidents. This feature will serve as a crucial safety net, allowing for controlled access during emergencies while upholding strict security measures to prevent misuse.
How It Will Work
Defined Request Procedure: Authorized personnel can initiate a "break glass" access request following a specific procedure.
Request Submission and Approval: Users provide necessary details, including the reason for access, workspace, and resources, for approval.
Inspection and Troubleshooting: Authorized users access the system via a secure cloud shell for inspection and troubleshooting.
Real-time Activity Monitoring: An activities page is updated to reflect the status of the resource or application.
Safe Exit: The "Breaking Glass" mode is concluded by executing a command, ensuring the feature is deactivated.
Secure Logout: Users are automatically logged out, safeguarding the system.
Summary
Breaking glass access is a security practice that allows authorized individuals to gain emergency access to a system or resource in case of critical situations, suach as a security breach, data loss, or other high-impact incidents. This kind of access is highly restricted an monitored to prevent misuse.
Intended Outcome
Enable authorized personnel to swiftly and securely access critical systems and resources in emergency situations, bolstering security and mitigating high-impact incidents. This feature will serve as a crucial safety net, allowing for controlled access during emergencies while upholding strict security measures to prevent misuse.
How It Will Work