The Sym Blog

Three Trends with AWS IAM

There have been a dozen IAM-related announcements in the AWS What’s New Feed over ...

An Overview of Snowflake Access Controls

Snowflake offers many powerful tools to protect your data from unauthorized access...

Temporary Access to Postgres with Sym

Sym’s workflow engine lets you seamlessly manage access to hosted infrastructure a...

Tools That Use AWS Logs to Help with Least Privilege

One of the things we do at Sym is help customers replace risky permanent access wi...

Your On Call Rotation is Harmful (And Here’s How to Make it Better)

It’s 3:26 in the morning, and the cellphone on your nightstand is blaring the awfu...

Set up a Terraform Pipeline with GitHub Actions and GitHub OIDC for AWS

At Sym we often work with customers that run Terraform pipelines but don’t use Ter...

Single Sign On: Okta vs AWS

Single Sign-On (SSO) is an authentication method that allows users to log in to ...

VPN or VPC: Which One Do You Need?

When you first come across the concept of virtual private clouds (VPCs) and virtua...

Intro to Just-In-Time Access

In many applications, a user with a given access level has a fixed number of tasks...