Border0 Access policy
Create access control rules based on: SSO Identity, Location, IP, dates, time of day. Pagerduty, or custom policy integrations
Access
SSH Access to your EC2 instances. Using SSH or Session manager as upstream protocols.
Audit & Visibility
- Session logs
(who accessed the ec2 instance, when and from where) - Detailed session replay: recording of complete terminal session