InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

5 Ways Access Management Goes Awry in AWS

Presented by

Schuyler Brown, Co-Founder, StrongDM

About this talk

When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credential rotation, strong passwords and the such all seem easy. But then you’re faced with fact that the vast majority of breaches today are access/identity-based, and that recent research shows that 85% of access grants were never used in a 90-day period. All of a sudden things aren’t so simple. Why exactly is there so much drift between access management best practices and the reality of access in the cloud? And how do you improve on your current privilege implementations? In this webinar, you’ll learn: • Access management best practices for AWS • Typical areas where organizations falter in those implementations • How to audit access in the cloud to measure success of least privilege efforts • Even better best practices for defense in depth for your cloud environments • How to implement Just-in-Time and Dynamic Access
Cloud Security Alliance: CloudBytes

Cloud Security Alliance: CloudBytes

80436 subscribers1015 talks
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa
Related topics