Skip to main content
All CollectionsQuestions on Security, Reliability, Data Protection, and IntegrationSecurity
How do technical administrators at legal-i access the infrastructure and systems? What methods are used for this purpose?
How do technical administrators at legal-i access the infrastructure and systems? What methods are used for this purpose?

Datenschutz

S
Written by Support legal-i
Updated over a week ago
  1. Monthly rotating user credentials.

  2. Multi-factor authentication for every access.

  3. Logging with audit trails of employee accesses (CloudTrail).

  4. Generally, minimal rights for employees on infrastructure components.

  5. Read-only access whenever possible.

  6. Automatic deployment with Infrastructure as Code, hence minimal manual access with personal devices to the infrastructure of the production system required.

Did this answer your question?