Upgrade Your Identity Management: Minimize Risk and Leverage Cloud Opportunities
John Morton - Britive, Dr. Chase Cunningham - Ericom Software and Sameer Patwardhan - Forbes
About this talk
We know identity is the new perimeter in the cloud. But what does that mean, and how does it affect business security?
It means identities – human and non-human users – touch every element of your cloud environment. So it’s critical to enforce security best practices not just for CSPs, but across mission-critical cloud apps like Salesforce, Workforce, Snowflake, Okta, and others.
Cloud infrastructure is built for speed and scale. Human users, Service and Machine IDs, and Workloads interact constantly to deliver products 24x7x365. To meet access demands, businesses often grant over-privileged permissions to identities that are authenticated and authorized simultaneously.
Bad actors are attempting to breach cloud environments via phished credentials that are exploited during the authentication and authorization process. To minimize threats, businesses should add an extra layer of security with Just-In-Time (JIT) authorization. When JIT complements strong authentication, it protects identities and cloud environments, and enforces a Defense-in-Depth security model that lets businesses focus on meeting demand for their products and services.
Join our panel of experts for a master class discussion in cloud identity management that unpacks the best practices DevSecOps can leverage to meet business priorities in the cloud.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa…