Least Privilege Reality Check: Refining Cloud Access and Permissions

Logo
Presented by

Jeff Moncrief, Field CTO, Sonrai Security

About this talk

Tackling least privilege in cloud environments is complex; with over 42,000 permissions to manage, tens of accounts, and thousands of identities to create policies for, traditional least privilege is not only impractical, but feels hopeless. Not to mention, the majority of those 42,000 permissions are mundane; so why are we asking DevOps to spend cycles securing low-risk permissions? In this session, we’re talking all about action and securing what is most critical. Because, let’s be honest, we’re all looking to maximize risk reduction without frustrating our dev teams by limiting access. In this webinar, we’ll explore: • Why you should focus on sensitive vs non-sensitive permissions • 5 risky permissions you should look at right now • Challenges of implementing least privilege with native tooling • How to build least privilege that scales alongside your cloud • Implementing global policies that support both security and DevOps efficiency Join us to learn how your organization can navigate the complexities of cloud security, achieve operational efficiency, and secure your cloud environments with our trailblazing approach to least privilege.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (929)
Subscribers (70994)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa