Identities Are The New Perimeter For Securing Data In Public Cloud
Sandy Bird, CTO and Co-founder, Sonrai Security
About this talk
Organizations of all sizes are harnessing the operational and cost benefits of public cloud. Unfortunately, cloud platforms like AWS, Azure, and GCP provide a wide range of identity and access management (IAM) based configuration options, that can be disastrous if not properly architected. During this webinar, you will learn the benefits and risk trade-offs of multiple public cloud IAM configuration options including:
-Privilege delegation & escalation (by user or role)
-Service-based & in-line privilege
-Understanding of IAM policy best practices and conflict resolution
Enterprises building in public cloud must ensure their security programs tightly control trust relationships that can be configured from IAM options to ensure adherence to the principles of least privilege and the segregation of duties. Public cloud IAM capabilities can be highly effective to build secure applications when done well. However, they can lead to a disastrous breach when poorly configured.