Security at scale requires consistent controls.
Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Otherwise, accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers.
The tried-and-true principle of least privilege access – in which all identities have the minimum necessary permissions to function – can help. But without automated, efficient processes to map and manage permissions at scale, least privilege can be easier said than done.
Join CyberArk Principal Solutions Engineer Adam Markert for a breakdown of:
- Recent growth in the landscape of possible permissions across AWS, Azure and GCP
- Least privilege access – what it is and how to get there in the cloud
- IAM best practices from governments, compliance frameworks and cloud providers
- Strategies for building scalable, consistent controls and automation workflows to review and remove risky access