- 1 Minute to read
- 1 Minute to read
Splashtop Secure Workspace offers a robust Secrets Policy feature that enhances the security and control over secret access. A Secrets Policy allows administrators to enforce access conditions and ensure the confidentiality of sensitive information.
Unlike the unified policy, which is global and cannot be assigned to specific secrets, the Secrets Policy is designed to be assigned to individual secrets or folders containing multiple secrets. Each Secrets Policy is given a name, which serves as a reference when assigning it to a specific secret or folder, whether it's for a group of users or an individual.
A Secrets Policy consists of three controls:
- Secret Read: This control evaluates the access condition when a secret is being read. It ensures that the appropriate security measures are in place for secret access.
- Secret Write: When a secret is being written or modified, this control comes into play, evaluating the conditions set to maintain the integrity and security of the secret.
- Secret Permission: This control is triggered when there is an update to the permissions associated with a secret. It ensures that the correct access rights are maintained and enforced.
Within each control (Read, Write, and Permission), administrators can add specific conditions to further tailor the access requirements. These conditions include date and time considerations such as time zone, time of day, and day of the week. Location-based conditions, such as country restrictions, network conditions like IP addresses, browser type, and the presence of the Splashtop Secure Workspace browser extension, can also be included. Additionally, operating system conditions can be specified.
When a user attempts to access a secret, all the controls defined in the Secrets Policy associated with that secret are evaluated. This evaluation process ensures that the appropriate access conditions are met, guaranteeing secure and controlled access to sensitive information.
With Secrets Policies in place, organizations can maintain a heightened level of security over their secrets, implementing customized access conditions that align with their specific security requirements.