Public IP addresses on development environments can be an unwanted security risk and adding access control lists (ACLs) or VPNs to manage that risk can prevent timely access, which in turn slows down development teams.
Challenges
- Development environments may be bespoke.
- Access requirements may be complex and dynamic.
- Developers want to move quickly.
- Automation is taking over.
- IT budgets are shrinking and teams are being squeezed.
How Enclave can help
- Grant development teams safe access to cloud resources.
- Least-privilege access to dev/test/prod environments on a need-to-know basis.
- Enable IT operations to be more agile, supporting business change rapidly and securely.
Automation
- Bake ZTNA connectivity directly into environment golden images.
- Use APIs to define policy and control access.
- Lower overheads for IT and DevSecOps teams to provision new environments.
Architecture and Security
- Pre-validate connections, systems, users, services and infrastructure.
- Automatic audit log of environment access.
- Block all public or unwanted access.
- Reduce attackable surface area.
- Remove VPN servers.
- Remove ACLs.
Zero Trust Network Access
Enclave’s Zero Trust Network Access architecture allows you build connectivity without ACLs or open ports, keeping firewalls closed. Without listening ports, visible IP addresses or DNS records, your infrastructure goes dark to attackers.
Need-to-know connectivity only links resources together after authentication and authorisation has taken place, so systems are protected from electronic observation and targeted cyber-attack.
- Serverless
Systems connect directly with one another. Data channels are peer-to-peer. No VPN servers. - Just-in-time access
Connections are only established on-demand, tunnels are not always on. - No public IP addresses
Removes the front door for malicious parties to knock on. - Unreachable
Works from behind NAT and closed firewalls (by design). - Dynamic IP tolerant
Digital certificates govern access decisions, not IP addresses. - Zero configuration
Works on the network you’ve already got, no changes needed. - Secure
All connectivity is mutually authenticated and end-to-end encrypted.