Access Management Theory: Difference between revisions
Jump to navigation
Jump to search
(Created page with "=About= This page covers access to assets, real and virtual, as to be practiced at OSE. This refers to password managers across multiple platforms at all scales from low secu...") |
|||
Line 8: | Line 8: | ||
=Virtual= | =Virtual= | ||
*Use Keepass to store everything. Do not save any passwords in any software, just open keepass any time wanting to log in. Keep logged in to things of low security, such as logged in to wiki on my cell phone. | *Use Keepass to store everything. Do not save any passwords in any software, just open keepass any time wanting to log in. Keep logged in to things of low security, such as logged in to wiki on my cell phone. | ||
*Veracrypt - encrypt archives. Currently, developers outside of IT admin do not use disk encryption. |
Revision as of 02:40, 6 March 2025
About
This page covers access to assets, real and virtual, as to be practiced at OSE.
This refers to password managers across multiple platforms at all scales from low security to 120 bit passphrases.
Physical
Virtual
- Use Keepass to store everything. Do not save any passwords in any software, just open keepass any time wanting to log in. Keep logged in to things of low security, such as logged in to wiki on my cell phone.
- Veracrypt - encrypt archives. Currently, developers outside of IT admin do not use disk encryption.