Least Privilege as Code: Standardizing Management of Cloud Entitlements

Logo
Presented by

Adam Markert, Principal Solutions Architect, CyberArk

About this talk

Security at scale requires consistent controls. Cloud security and operations teams must be careful to consistently define processes for provisioning, reviewing, and removing IAM permissions. Otherwise, accelerating cloud adoption can lead to permissions sprawl and excessive access that can be manipulated by attackers. The tried-and-true principle of least privilege access – in which all identities have the minimum necessary permissions to function – can help. But without automated, efficient processes to map and manage permissions at scale, least privilege can be easier said than done. Join CyberArk Principal Solutions Engineer, Adam Markert for a breakdown of: - Recent growth in the landscape of possible permissions across AWS, Azure and GCP - Least privilege access – what it is and how to get there in the cloud - IAM best practices from governments, compliance frameworks and cloud providers - Strategies for building scalable, consistent controls and automation workflows to review and remove risky access
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (904)
Subscribers (65201)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa