Skip to content

Secure Sandbox Environments with IAM

Excalibur can secure access to sandbox environments — isolated environments used for testing, development, or running potentially untrusted applications.

Excalibur achieves this by:

  1. Brokering access — Excalibur manages and brokers all access to the resources within the sandbox.
  2. Connectivity — whether the sandbox is on a separate network segment (requiring an Excalibur tunnel for connectivity) or directly reachable by the Excalibur server, access can be managed.
  3. Policy enforcement — granular access policies specify which users or groups can access which sandbox resources.
  4. Credential abstraction — users are authenticated through Excalibur, and access is granted based on policies. The underlying credentials for the sandbox resources are never exposed to the end-user.
  5. Auditing — all access attempts and sessions are logged, providing a clear audit trail.

Only authorized personnel can access specific sandbox environments, and all interactions are controlled and auditable.