×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

State of Cloud Security: How do we get to Consistent Least Privilege?

March 25, 2021

IAM is a foundational cloud security control. For years, AWS, Azure and GCP have stressed that least privilege access for all human and machine identities is a security best practice.

Yet as Cloud Providers introduce new features and companies adopt more than one Cloud Provider, proper oversight of access to critical infrastructure and workloads grows more challenging. Recent breaches have made it clear even world-class security organizations can struggle with least privilege.

So what do organizations need to know as they look to address the visibility and configuration challenges of traditional cloud IAM tools?

Join Brandon Traffanstedt and Chris Maroun, Senior Directors from CyberArk’s Global Technology Office, as they explore the state of cloud security and discuss:

  • Lessons from recent breaches involving excessive permissions
  • Identifying and mapping risky, misconfigured and unused entitlements for all cloud entities
  • Right-sizing IAM policies to defend against external and insider threats
  • When to stick with cloud native IAM and when to turn to third party tools
  • Structuring a holistic, multi-level security plan that includes implementing and maintaining least privilege
Previous Article
Revelations About Securing Hybrid Cloud Environments Post-SolarWinds
Revelations About Securing Hybrid Cloud Environments Post-SolarWinds

In the early 1960s, J.C.R. Licklider, director of the Pentagon’s Information Processing Techniques Office (...

Next Article
Attacker Productivity: Exploit Misconfigured Identities in the Cloud
Attacker Productivity: Exploit Misconfigured Identities in the Cloud

“My goal is no longer to get more done, but rather to have less to do,” writes author Francine Jay. It’s a ...