To complete this tutorial, you should install Terraform, and make sure you have a working install of Python 3.
Here's what you'll be doing:
- Setting up the
- Installing the Sym Slack app
- Deploying and testing out your first Flow
This guide is also available as a pre-baked repo
Check out our starter code here to follow along.
Once you're in, just configure a few variables in
terraform.tfvarsand you're on your way!
For the full list of available guides and repos, see our Quickstart Guides.
Before we dive in, let's take a quick peek at what we'll be improving.
If you're anything like us, you've got a dozen different services you're managing access to. Every organization handles that access management differently, but in its most basic form, it might look something like this:
That process might work for a while, but will inevitably break down in its:
- Governance: manual processes often rely on unwritten, or hard-to-discover rules for who is allowed to make or approve requests
- Day-to-day use: after approval, access must be granted, tracked, and revoked manually
- Ease of audit: anyone handling a security audit must read through unstructured Slack messages for evidence
Even in the case of processes being lifted from Slack and into systems like Jira, uncertainly is simply replaced with toil, ticketing queues, and lost context.
The good news is that process can be completely replaced by the Flow you're about to implement! Instead, that process will look something like this:
In the Sym solution:
- Your governance is encoded via Sym's Python SDK. You already have a robust SDLC, so let's leverage it to create and maintain sensible access policies.
- Your day-to-day is simplified: Sym handles both grant + time-based revoke, so every integration with Sym is one more thing you don't need to worry about.
- Your audit is an automatic byproduct of using Sym. Simply connect a Reporting destination and say "goodbye" to scraping Slack channels for context.
Updated 23 days ago