Secure Sandbox Environments with IAM¶
Excalibur can secure access to sandbox environments — isolated environments used for testing, development, or running potentially untrusted applications.
Excalibur achieves this by:
- Brokering access — Excalibur manages and brokers all access to the resources within the sandbox.
- Connectivity — whether the sandbox is on a separate network segment (requiring an Excalibur tunnel for connectivity) or directly reachable by the Excalibur server, access can be managed.
- Policy enforcement — granular access policies specify which users or groups can access which sandbox resources.
- Credential abstraction — users are authenticated through Excalibur, and access is granted based on policies. The underlying credentials for the sandbox resources are never exposed to the end-user.
- Auditing — all access attempts and sessions are logged, providing a clear audit trail.
Only authorized personnel can access specific sandbox environments, and all interactions are controlled and auditable.