Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration?
Join Jeremy Snyder, Senior Director of Solutions Engineering from DivvyCloud by Rapid7 as he discusses why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.
Key takeaways include understanding how to:
-Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
-Reduce access down to least privilege.
-Work to minimize cloud security blast radius.