Learn how to configure the password vault in the Cloud Identity Engine.
| Where Can I Use This? | What Do I Need? |
|
| The Cloud Identity Engine service is free; however, the
enforcement points utilizing directory data may require specific
licenses. Click here for more
information. |
Early in computing history, sensitive information (such as passwords and
cryptographic keys) was usually stored in easily accessible locations, such as
plaintext files or in the code itself. In addition, passwords were often reused in
multiple locations and shared with colleagues using unencrypted methods. These
behaviors could expose organizations to significant security risks by leaving
sensitive data vulnerable to theft and misuse. When cyberattacks such as data
breaches and hacking became more advanced and frequent, organizations needed to
provide better security measures to protect their data.
One method of protecting this critical information is by using secrets vaults. A
secrets vault:
Using secrets vaults helps organizations reduce their attack surface, ensure
compliance with regulations, and manage sensitive information more easily.