Hi [[ session.user.profile.firstName ]]

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

• What is least privilege and how has it changed in the cloud?
• Why is it that least privilege cannot be achieved without knowing effective permissions?
• Why must maintaining least privilege configurations be automated?
• What are the risks and benefits?
Recorded May 28 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Presentation preview: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
  • Channel
  • Channel profile
  • Pillars of Cloud Security: Locking Down Crown Jewel Data in the Public Cloud Jun 25 2020 6:00 pm UTC 60 mins
    eric.kedrosky@sonraisecurity.com, dwoods@evolvedmedia.com
    Monitoring for publicly exposed data is very important but not enough. 90% of Sonrai Security customers deployed have found unintended and mistaken data exposures in their public cloud. A key best practice is to identify the most valuable and sensitive data, your crown jewel data, and then make sure it is secured and monitored with great precision. In this webinar we explore Sonrai Security’s second pillar of cloud security -- protecting your crown jewel data.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains best practices for identifying and locking down sensitive data, answering questions such as:

    • What is the best way to define and discover “crown jewel data”?
    • How can detailed classification of identities and data help?
    • What is the best way to “lockdown” access?
    • How can you extend monitoring to all data, resources, and microservices?
    • Which preventive controls help the most?
    • What are some real-world examples of success (and failure)?
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Recorded: May 28 2020 58 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • Why WFH and Cloud Will Permanently Change Security: 5 Changes You Can Make Now Recorded: Apr 23 2020 62 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Organizations around the world have recently been forced to rapidly shift to a mandatory work from home (WFH) arrangement. Even for those already operating with remote teams, this shift is causing disruption that likely changes how we approach information security moving forward. Join us as Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, pinpoint five areas that must be addressed so these security problems can be prevented.

    The webinar will address questions such as:
    • How WFH is built-in for companies who have properly implemented public cloud
    • How does remote working impact security practices and what has been learned so far?
    • Why have practices such as segregation of duties become more important?
    • Should remote working accelerate and broaden zero trust implementations?
    • What best practices companies can put into place to secure their infrastructure to make WFH seamless
  • Identity Governance & Secrets Management: Key to Unlocking Public Cloud Security Recorded: Apr 9 2020 43 mins
    Marshall Copeland, Partner Solutions Engineer, HashiCorp & Eric Kedrosky, Director of Cloud Security Research, Sonrai
    Gartner forecasts that the worldwide public cloud market will grow 17% in 2020 to total $266.4 billion, up from $227.8 billion this past year. As more and more businesses are moving their application workloads and critical data to the public cloud, it becomes even more important to rethink how these resources are protected, and how those protections are managed. Modern workloads, when protected with enhanced secrets management and least privilege, substantially reduce the risk of escalation attacks.
  • Preventing Catastrophic Data Loss in AWS, Azure, and Google Cloud Recorded: Mar 17 2020 51 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Public cloud has broken new ground with respect to the integration of data protection and security. As S3 buckets, queues, cloud-native databases, and dozens of other repositories hold more and more of our data, the cloud-native IAM services of AWS, Azure, and GCP have grown in power and scope. Each of these provides ways of enforcing permissions to protect data that were either impossible or quite difficult and complex to achieve in the on-premise world. This webinar, hosted by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research & CISO at Sonrai Security, will explore both what is better and harder about cloud data protection in today’s world including:

    * Why traditional data security tools and methods are not compatible in public cloud
    * Warnings about the much expanded range of risks related to cloud data in S3 buckets, databases, and other repositories, including both internal and external threats
    * Analysis of the implications of tight integration of identities, data access, and protection services
    * Specific steps for using policies on data assets such as buckets, storage accounts, queues, and other data services to prevent attacks and reduce the blast radius if an attack is successful
    * Suggestions for making best use of both cloud-native and external key management systems to encrypt data
    * Ways to use network controls to enhance data protection
  • Managing Non-people Identities in AWS and Azure Recorded: Feb 20 2020 59 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud-native application development and DevOps has led to an explosion of what are called non-people identities. Non-people identities (servers, VMs, serverless, applications, etc.) can be created manually and automatically, and like identities used for people, they can be the targets for security attacks. The methods and strategies for creating a workable and effective governance program for these identities are just beginning to be understood. In this webinar,, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, will look at the common mistakes made when managing non-people identities in AWS and Azure that lead to security vulnerabilities and the governance and management techniques needed to keep such identities safe. Topics covered:

    * Forces driving the explosion of non-people identities
    * Specific problems that occur in AWS and Azure
    * Security threats that often occur from mismanaged non-people identities
    * Governance and management to solve common problems in AWS, Azure, and across all clouds
  • Privilege Escalation Attacks in AWS: How They Work, How To Stop Them Recorded: Jan 28 2020 58 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    AWS, like every advanced cloud platform, has well-known security flaws that can lead to catastrophic problems if you are not paying careful attention. One of the most dangerous allows innocuous accounts usually granted to developers to be given admin access. Such attacks work because a sequence of seemingly unimportant missteps in configuring different parts of AWS allows the escalation to occur. This webinar will show how these attacks work and how to be diligent about monitoring to make sure such attacks never succeed on your watch.

    This webinar will cover:

    The general nature of escalation attacks
    * How AWS is specifically vulnerable
    * What to do to monitor for mistakes that make these escalation attacks possible
    * How to use Sonrai Security to automate such monitoring
  • How Public Cloud Changes Cybersecurity for the Better Recorded: Dec 17 2019 56 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    While many basic security controls are enduring, public cloud (AWS, Azure, and Google Cloud) has introduced a wave of new practices, tactics, and forms of automation to implement those controls. In total, these capabilities are going to make cloud security better than on-premise methods. The elasticity and scale of public cloud has led to more integrations of cybersecurity in the creation of computing assets. The abundant data available has led to new forms of automated configuration and monitoring for breaches. Software-defined everything and APIs have given cybersecurity systems a wider range of power and opened the way for declarative methods of implementing security in the cloud. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, will look at how public cloud is changing cybersecurity for the better and the long term impact of these new capabilities. One key impact is that soon on-prem data centers will be recognized as less secure than cloud data centers.

    Key questions:
    * What are the core differences between cloud security and on-premise methods?
    * How has abundant data opened up new possibilities for monitoring and automation?
    * What is the impact of software-defined infrastructure?
    * Why is identity central to security in public cloud?
    * How has public cloud security broken new ground in managing complexity?
    * What new forms of automation of security are emerging in the cloud?
    * Are AI and ML being implemented faster in the cloud?
  • Anatomy of 5 Notorious Cloud Data Breaches Recorded: Nov 20 2019 56 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud data breaches follow distinct patterns that can be studied and learned from. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, dissect five notorious and distinct types of cloud data breaches, breaking down how each was caused and how they could have been prevented. Each of these five is an archetype of a family of breaches. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and preventative measures.

    Breakdown of the 5 breaches:

    * Identity and authentication for data storage
    * Public cloud misconfiguration
    * Key and secret management
    * Overprivilege
    * Insider threats
  • Comparing Public Cloud Security Across AWS, Azure, and GCP: Lessons for Security Recorded: Oct 24 2019 61 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The cybersecurity infrastructure for each of the major public clouds is a work in progress. But for all of them, it has become obvious that identity and data access is effectively the new perimeter. By examining what is the same and what is different about each public cloud’s identity and access management mechanisms, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, explain how the shift to public cloud is changing the rules for security. We identify the different principles each public cloud vendor is using as well as the different approaches to account organization and how resources are protected.


    Questions:
    -Why are identity and data access the new perimeter?

    -Why has zero-trust become the default organizing principle for cloud security?

    -What are the crucial requirements for cloud data security?

    -How are these requirements implemented in each cloud?

    -What are the differences in security practices between AWS, Azure, and Google Cloud?

    -What burdens does the new cloud model put upon cloud users?

    -What goes wrong when these burdens are not properly managed?
  • Identities Are The New Perimeter For Securing Data In Public Cloud Recorded: Sep 30 2019 34 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security
    Organizations of all sizes are harnessing the operational and cost benefits of public cloud. Unfortunately, cloud platforms like AWS, Azure, and GCP provide a wide range of identity and access management (IAM) based configuration options, that can be disastrous if not properly architected. During this webinar, you will learn the benefits and risk trade-offs of multiple public cloud IAM configuration options including:

    -Organization/Account-wide privilege
    -Privilege delegation & escalation (by user or role)
    -Service-based & in-line privilege
    -Understanding of IAM policy best practices and conflict resolution

    Enterprises building in public cloud must ensure their security programs tightly control trust relationships that can be configured from IAM options to ensure adherence to the principles of least privilege and the segregation of duties. Public cloud IAM capabilities can be highly effective to build secure applications when done well. However, they can lead to a disastrous breach when poorly configured.
  • Preventing Data Loss in Public Clouds Recorded: Aug 27 2019 49 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security
    The Capital One loss of credit card applications for 106 million people is a sobering reminder that complexity stifles even the most sophisticated cloud teams. However, this will not deter the unstoppable growth of public cloud. We firmly believe that public cloud will be more secure than enterprise data centers. But only by using a unique approach.

    During this webinar you will learn :

    -The anatomy of the Capital One breach
    -How to minimize privilege and access
    -How to minimize access paths
    -The importance of baseline trust
    -How to continuously monitor (beyond S3)
    -Why configuration checks are not good enough
  • 10 Foundational "Public Cloud Security Principles" for Securing Data Recorded: Aug 9 2019 34 mins
    Sandy Bird, CTO & Co-Founder
    As Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) have exploded, the complexity of securing your data in public clouds has also exploded. While networking controls remain essential, these controls are insufficient in the new world of public cloud. Working with customers, Sonrai Security has developed the “Public Cloud Security Principles” to help guide your path for public cloud security.

    During this webinar you will learn:

    - An overview of the Sonrai Security “Public Cloud Security Principles”
    - An overview of why key principles around cloud identity and data access trust relationships should be monitored and managed at very granular levels to reduce potential breach blast radius
    - Considerations around the automation of 3 manifesto principles to reduce risk of breach of data resident in the public cloud
    - How Sonrai Security is helping companies automate critical cloud security control policies to address key public cloud security principles.
Live monthly webcasts on Public Cloud security and risks.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
  • Live at: May 28 2020 6:00 pm
  • Presented by: Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
  • From:
Your email has been sent.
or close