OPA + Styra DAS free up time and resources for a CRM solution

Let’s say you were going to plan a security project. (Almost any project, really.)  The following might be a pretty solid list of goals to aim for: 

  1. Fewer security gaps.
  2. Reduced app downtime.
  3. Elimination of load balancer costs and risks.
  4. Less opportunity for human error.
  5. Minimization of manual remediation efforts.

 

That’s a pretty solid list - and might even read like “too much to ask for.”  Yet, it’s exactly what SugarCRM received after deploying Styra DAS to manage Open Policy Agent (OPA) for Kubernetes guardrails. Together, Styra DAS and OPA delivered infrastructure security and compliance controls that work with SugarCRM’s modern, software-defined systems and can be tracked over time to prove compliance.

The customer already had a great platform teambut they were bogged down in manual reviews, and lots of one-off remediation due to upstream human error. Now that they’ve got automated guardrails in place, and have shifted compliance and security left, the platform team has the time to innovate and provide better, more available, more secure tools for their developers to build upon.

To learn exactly how Styra DAS and OPA made the  difference for SugarCRM, plus what the company says about the outcome, download the full case study here.

 Prev

Using OPA for multicloud policy and process portability

Next  

The Kubernetes authorization webhook

Subscribe

Open Policy Agent: The Top 5 Kubernetes Admission Control Policies

Kubernetes developers and platform..

May 4
Go

Why We Need to Rethink Authorization for Cloud Native

Companies have moved to cloud native..

April 27
Go

5 OPA Deployment Performance Models for Microservices

If you’re responsible for a microservices..

April 15
Go