#52SECURITYPROTECT
Access Control
Authentication and authorization
Medium
Overview
Control who can access systems and what they can do. SSH keys, MFA, least privilege.
Why It Matters
Only authorized access. SSH key-only, firewall rules, fail2ban.
Implementation Pattern
- 1Use SSH keys only
- 2Implement MFA
- 3Apply least privilege
- 4Review permissions regularly
Pipeline Coverage
This continuous capability monitors and applies to the following pipeline phases:
DEVELOPSTAGERELEASE
Tool Examples
These are examples, not endorsements. Choose what fits your context.
Dependencies
Enables (unlocks)
Same Layer
Other capabilities in this continuous layer
- •#44 Database Backups
- •#45 System/App Backups
- •#46 Restore Verification
- •#47 Restore Drills
- •#48 Host Hardening
+5 more