#52SECURITYPROTECT

Access Control

Authentication and authorization

Medium

Overview

Control who can access systems and what they can do. SSH keys, MFA, least privilege.

Why It Matters

Only authorized access. SSH key-only, firewall rules, fail2ban.

Implementation Pattern

  1. 1Use SSH keys only
  2. 2Implement MFA
  3. 3Apply least privilege
  4. 4Review permissions regularly

Pipeline Coverage

This continuous capability monitors and applies to the following pipeline phases:

DEVELOPSTAGERELEASE

Tool Examples

These are examples, not endorsements. Choose what fits your context.