5 Ways Access Management Goes Awry in AWS

Logo
Presented by

Schuyler Brown, Co-Founder, StrongDM

About this talk

When following best practices for secure access in the cloud, things often seem to start off so simple. Least privilege makes sense. Enforcing credential rotation, strong passwords and the such all seem easy. But then you’re faced with fact that the vast majority of breaches today are access/identity-based, and that recent research shows that 85% of access grants were never used in a 90-day period. All of a sudden things aren’t so simple. Why exactly is there so much drift between access management best practices and the reality of access in the cloud? And how do you improve on your current privilege implementations? In this webinar, you’ll learn: • Access management best practices for AWS • Typical areas where organizations falter in those implementations • How to audit access in the cloud to measure success of least privilege efforts • Even better best practices for defense in depth for your cloud environments • How to implement Just-in-Time and Dynamic Access
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (901)
Subscribers (65590)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa