Port 22

Security begins with visibility: How IGA brings hidden access risks to light