Hi [[ session.user.profile.firstName ]]

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

• What is least privilege and how has it changed in the cloud?
• Why is it that least privilege cannot be achieved without knowing effective permissions?
• Why must maintaining least privilege configurations be automated?
• What are the risks and benefits?
Recorded May 28 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Presentation preview: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
  • Channel
  • Channel profile
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege May 26 2021 3:00 pm UTC 58 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • It’s Probably Your Fault: 2021’s Worst Cloud Data Breaches Explained Recorded: May 13 2021 29 mins
    Eric Kedrosky, CISO & Director of Cloud Security Research, Sonrai Security
    The past 12 months have been a year of shocking cloud security data breaches - shocking, in that they were preceded by a year of high-profile preventable breaches… which were preceded by a previous year of preventable breaches, which… well, you get the point.

    Gartner recently updated their evaluation of cloud security and concluded “Through 2025, 99% of cloud security failures will be the customer’s fault.” Why are well-informed, experienced cloud security experts getting hit with breach after breach, when cautionary examples are right in front of them?

    The answer is: it’s a complicated, hard job, growing more complex with every new cloud service and an ever-expanding multi-cloud footprint. You can’t prevent every bad thing from happening at once. Keeping up to date with the most common (and the most interesting) data breach paths and how to secure them is key when it comes to defending your identities and data access.

    Let’s get up to date on the latest breach tactics. (Un)luckily we have an abundance of examples to dissect from 2021. Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, as he breaks down the anatomy of 2021’s most notorious cloud data breaches and how they could’ve been avoided.

    We'll hit topics like:

    -AWS and Azure cloud misconfigurations
    -Key and secret management
    -Overprivileged identities
    -Malicious Bad Actors
    And more.
  • Enterprise Cloud Security: The Good, The Bad, The Ugly Recorded: Apr 20 2021 41 mins
    Michael Osterman, President of Osterman Research & Eric Kedrosky, CISO and Director of Cloud Research
    The Osterman Research white paper, "The State of Enterprise Cloud Security: The Good, The Bad, And The Ugly,” highlighted both the criticality and the challenges of security public clouds. Backed by Sonrai Security, the new cloud security research clearly illustrates the key contributors to cloud breaches -- many related to identity security, data security, misconfiguration, and executive strategy.

    We welcome back Michael Osterman, industry analyst and president of Osterman Research, and Eric Kedrosky, CISO and Director of Cloud Research for a 45-minute review of the State of Enterprise Cloud Security.

    Join our webinar on April 20 at 1:00 PM ET / 10:00 AM PT to get a firsthand view of research-based insights on the cloud security, identity risk, data challenges, and executive response posed by today’s complex cloud environments.

    Our experts and researchers will have an honest conversation about the state of enterprise cloud security. We will talk about the obvious risks and uncover some new challenges, including:

    - Overprivileged Identities: Identities with significantly more privileges and access than are required to carry out the duties assigned to them introduces a significant risk to the cloud.

    - Human Error: Human mistakes will happen and will not be deliberate at times, but these errors can still wreak havoc in an organization.

    - Unauthorized Access: Due to the complex nature of cloud environments, having visibility into which identities have access to data and resources is increasingly difficult. Organizations need to secure all crown jewel data and enforce policies to prevent unauthorized access to the cloud environment.

    - Executive Support & Spend: Our survey reveals spend and full-time resources dedicated to securing data, identities, and platforms. We uncovered big areas of executive risk in organizations' cloud strategy.
  • Identify and Eliminate Risks on AWS IAM and Secure Data Stores Using Sonrai Dig Recorded: Apr 13 2021 44 mins
    Adam Blackington, Partner Solutions Architect, Amazon Web Services and Jeff Moncrief, Director of Engineering, Sonrai
    In the effort to keep your cloud secure, are you looking at all your identities — human and non-human — and their effective permissions? It's likely you can’t, as end-to-end visibility is notoriously lacking in complex enterprise multi-cloud environments. And yet, that lack of visibility over identity access to your pieces of compute, data stores, containers, and assets is almost surely jeopardizing your crown-jewel data and cloud security posture.

    Join Sonrai Security and AWS to discover how to strengthen your identity and data security by understanding how to govern identities -human and non-human - effectively. We understand that managing risk across the ephemeral cloud means gaining control over users, data, identities, and access for secure infrastructure governance. The sheer number of interlocking entities, permissions, roles, and privileges presents many opportunities for unintentional paths to data via compromised identities. You will also learn how to manage effective permissions to prevent privilege escalations, toxic identity combinations, improper separation of duties, and other identity abuse concepts.

    In this virtual discussion, AWS and Sonrai Security will provide actionable insights for redefining your identity strategy. Presenters will cover the following key insights:

    ● Review abuse concepts and prevention of identity security risks like privilege escalations, toxic identity combinations, improper separation of duties, and more
    ● Learn how to continuously monitor for data and identity mistakes that make identity escalation attacks possible
    ● Understand how to use Sonrai Security to automate and prevent these attacks
    ● See live examples of identity exploits, like escalation attacks, permission chaining, and identity risks
  • Securing Non-Human Identities Part 3: Azure Recorded: Apr 7 2021 30 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are numerous and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    Azure has given us tools to help govern access, but rapid innovation breeds complexity. Governance requires a new approach that meets this reality of ephemeral compute and complex webs of permission combinations.

    This is the third in a multi-part series on nonhuman identities. This session focuses on Azure but touches elements of multicloud management as well. We'll discuss:
    -Recap of what non-human identities are
    -Examples of Azure-specific risks
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • Live Hack- Common Paths to Breach from One Compromised AWS Identity Recorded: Mar 30 2021 60 mins
    Jeff Moncrief, Director Solutions Sonrai; Dave Shackleford, Principal, Voodoo Security
    The greatest risk to data security in the public cloud is its own complexity and scale. Breach tactics remain, on the whole, mundane: bad actors simply take advantage of the labyrinth of identity structures within the public cloud infrastructure. The sheer number of interlocking entities, permissions, roles, and privileges in a modern enterprise cloud presents many opportunities for unintentional paths to data via compromised identities.

    The best way to visualize this is to actually see it from a hacker’s perspective - so we’re doing this live in the cloud to show the most common paths to a data breach in AWS. We’re using simple command-line arguments to compromise an identity in a typical s3 bucket and make our way to sensitive data. We’ll go through how bad actors can easily abuse concepts like:
    •Privilege escalations
    •Trust relationships
    •Toxic identity combinations
    •Improper separation of duties

    *This webinar was originally broadcast in partnership with SANS.*
  • Azure Security Checklist: Governance, Identities, and Compliance Priorities Recorded: Mar 23 2021 43 mins
    Eric Kedrosky, CISO, Sonrai Security & Jeff Moncrief, Director of Sales Engineering at Sonrai Security
    Deploying an application on Azure is fast, easy, and cost-effective, leading many organizations to rapidly increase their Azure footprint in recent months. Throw in the forced adoption of work from home we saw in 2020 and many organizations are facing digital chaos with much larger clouds than before. The good news is that this chaos is manageable if you know what to look for.

    How do you manage security, compliance, and access risk in a scalable way within the Azure environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    This checklist is intended to help enterprises think through various operational security considerations as they deploy sophisticated enterprise applications on Azure. It can also be used to help you build a secure cloud migration and operation strategy for your organization.
    Join Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security, to learn more about the security risks, compliance considerations, and access considerations in Azure.

    Key Takeaways:

    - Understand the common security and access risks associated with Azure
    - Learn how to ensure security for identities and data in your Azure environment
    - Best practices for compliance to protect critical data and identity access
  • Securing Non-Human Identities Part 2: AWS and Privilege Escalation Recorded: Mar 17 2021 30 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are numerous and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    AWS has given us tools to help govern access, but rapid innovation breeds complexity. Governance requires a new approach that meets this reality of ephemeral compute and complex webs of permission combinations.

    This is the second in a multi-part series on nonhuman identities. This session focuses on AWS but touches elements of multicloud management as well. We'll discuss:
    -Recap of what non-human identities are
    -Examples of AWS-specific risks
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • Compliance Risks in the Shared Responsibility Model: Solutions for AWS & Azure Recorded: Feb 23 2021 45 mins
    Michael Osterman, President of Osterman Research
    How does the AWS Shared Responsibility Model change under compliance regulations? The short answer – it doesn’t. AWS is responsible for securing the underlying infrastructure that supports the cloud and the services provided, while AWS customers are responsible for any data they put in the cloud. This shared model can help relieve the IT operational burden, but if you aren’t aware of your responsibility, it can create compliance chaos.

    In this webinar, Michael Osterman, President of Osterman Research, will cover what it means to share the responsibility of data in the cloud - including the certifications, regulations, and frameworks AWS aligns with to support compliance - like GDPR, PCI DSS, HIPAA, SOC, and other regulatory requirements.

    Key Takeaways:

    ∙ Review the shared responsibility model and data compliance issues
    ∙ Understand how to act as a data controller or data processor within AWS environment
    ∙ Help you realize data protection by avoiding the common security and data access risks
    ∙ Find ways to meet your compliance goals on AWS
    ∙ Review data governance, like data retention, data classification, defensible deletion, and more.
  • Securing Non-Human Identities in AWS and Azure: Part 1 Recorded: Feb 17 2021 19 mins
    Sandy Bird, CTO, Sonrai Security & Eric Kedrosky, Director of Cloud Security Research, Sonrai Security
    Identities in a modern enterprise public cloud deployment are innumerate and critical to securing your data. Non-human identities - like servers, VMs, serverless functions, applications, etc. - are being created at a rapid pace, sometimes by services without a person ever involved.

    Cloud providers like Azure, AWS, and GCP have given us tools to help govern access, but they can be made insecure by simple configuration errors or omissions - and they're very different approaches, creating complexity for multicloud deployments. Governance requires a new approach that meets this new reality of ephemeral compute and complex webs of permission combinations.

    This is the first in a two part series on nonhuman identities. this session, we discuss:
    -What we mean by non-human identities
    -What problems these identities cause
    -Best practices for managing them
    -Immediate steps anyone can take today to secure the identities
  • AWS Checklist for 2021: Expert Advice on Security and Risk Priorities Recorded: Jan 26 2021 39 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Michael Osterman, Principal Analyst, Osterman Research
    Many organizations have accelerated their digital transformation in recent months, often out of necessity to keep operations running from rapid WFH growth. In turn, this transformation has seen AWS adoption grow exponentially.

    There are many benefits to using AWS, but how do you manage security, compliance, and access risk within the AWS environment? Ignoring security gaps and relying on a single vendor dramatically increases risk, but with many cloud and security teams being asked to reduce costs in the challenging economic climate, taking a single vendor approach can be tempting.

    Join this webinar to learn more about the security risks, compliance considerations, and access considerations in AWS and how you can implement strategies to mitigate them.

    Key Takeaways:

    - Understand the common security and access risks associated with AWS
    - Learn how to ensure security for identities and data in your AWS environment
    - Best practices for compliance to protect critical data and identity access
  • Privilege Escalation Attacks in AWS: How They Work, How To Stop Them Recorded: Jan 21 2021 57 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    AWS, like every advanced cloud platform, has well-known security flaws that can lead to catastrophic problems if you are not paying careful attention. One of the most dangerous allows innocuous accounts usually granted to developers to be given admin access. Such attacks work because a sequence of seemingly unimportant missteps in configuring different parts of AWS allows the escalation to occur. This webinar will show how these attacks work and how to be diligent about monitoring to make sure such attacks never succeed on your watch.

    This webinar will cover:

    The general nature of escalation attacks
    * How AWS is specifically vulnerable
    * What to do to monitor for mistakes that make these escalation attacks possible
    * How to use Sonrai Security to automate such monitoring
  • The CIA, Scripts, Hook-Ups: 2020's Worst Cloud Security Data Breaches Explained Recorded: Dec 15 2020 52 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    2020 has been full of surprises - and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.

    In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Eric Kedrosky, CISO and Director of Cloud Research of Sonrai Security, countdown the top ten notorious cloud data breaches, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and the preventative measures. The cloud is undeniably the future, and it can be secured with a bit of wisdom and some best practices that are newly evolving as this technology matures.

    Join us as we dissect the year’s most notorious cloud data breaches to share a bit of wisdom from our research, including:
    ○ Identity and authentication for data storage
    ○ Public cloud misconfiguration
    ○ Key and secret management
    ○ Overprivilege identities
    ○ Malicious Bad Actors
    ○ And more
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Recorded: Dec 10 2020 57 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • Moving at Agile Speed: Improve Enterprise FinTech Cloud Security Recorded: Nov 17 2020 38 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The gap between moving to the cloud and implementing strong security has shrunk as new technologies accelerate the process. But there is a perceived trade between the objective of agile software development and the security that is meant to be achieved in fintech organizations.

    As organizations scale their public cloud implementation and the number of applications deployed, developers are slowed down as they are now forced to deal with security-related components to deploy and manage their application, which at scale, becomes complex. On the other side, the security team still has to maintain security and controls around all the applications, objects, and environments that are deployed.

    This webinar, presented by Dan Woods, a technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, will discuss how:

    ∙To effectively achieve the desired result of speed and security.
    ∙To identify the most critical risks and repercussions of following outdated governance policies when migrating to newer technologies.
    ∙To provide a five-step approach that all organizations can use to deliver governance and security across DevOps and security to reduce risk in their public clouds.
  • How CSPM Secures The Modern Healthcare Infrastructure Recorded: Oct 22 2020 46 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud computing has modernized the way healthcare and life science organizations build, operate, and manage infrastructure and applications. Cloud computing has helped healthcare cloud professionals to quickly spin up or spin down a resource to fulfill the increased demand of new healthcare application workloads. However, when working in a cloud environment, monitoring the security state of multiple workloads while meeting the growing number of Health Insurance Portability and Accountability Act (HIPAA) compliance requirements can be challenging. How do you know if your security posture across all workloads is at the highest-possible level?

    Many hospitals, clinics, nursing homes, and other healthcare providers can’t, and they have turned to Cloud Security Posture Management (CSPM) to help in their modern cloud environments. CSPM brings a new set of tools to bear on the challenge of understanding and managing security in a multi-cloud world. In an important way, CSPM helps security professionals continuously monitor the configuration of their cloud and then use workflows and automation to effectively secure their cloud platforms.

    In this webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, we’ll share how healthcare organizations are securing their modern cloud application workloads while maintaining control over their compliance and cloud posture. Come to this webinar to learn about:

    • The unique cloud security challenges of Healthcare and Life Sciences
    • Cloud security control patterns and best practices
    • How CSPM helps implement those patterns and best practices
    • How intelligent CSPM help solve complex security problems for Healthcare and Life Sciences
  • Secure Multi-Cloud Environments: Intelligent Cloud Security Posture Management Recorded: Sep 24 2020 51 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    An effective security program is rooted in a strong operational foundation. As evidenced by a number of high profile data breaches, successful attacks on cloud services were most commonly the result of customer misconfiguration, mismanagement, and mistakes according to Gartner. Without clean operations, your security operations model is destined to fail. As such, IT, Security, and Risk Management leaders must invest in Cloud Security Posture Management (CSPM) processes and tools to proactively and reactively identify and remediate risks.

    Digital transformation is putting pressure on every function inside the enterprise – especially IT, Security, and Cloud Operations Teams. Whether it’s utilizing short-lived technology like containers, assessing the state of public cloud environments, or maintaining the security of applications, the modern attack surface presents a growing challenge to security and cloud leaders looking to accurately understand and reduce identity and data risk.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, will be an informative session on how enterprises can secure their public cloud with an identity approach. The webcast will answer the following topics:
    ∙ How does CSPM provide enterprises with visibility into the state of public cloud infrastructure?
    ∙ What specific steps are being used to create effective operations and security programs to identify and reduce risk across cloud environments?
    ∙ What are best practices and tips for utilizing CSPM in the public cloud?
    ∙ What ways can you use controls to enhance identity and data governance?
    ∙ Where does CSPM fit into a cloud security model? And what else is needed?
  • Pillars of Cloud Security: Prevent Problems or Fix Them Fast Recorded: Aug 18 2020 34 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The best cloud security teams have a clear categorization of their environments, craft policies and controls appropriate to each, and then handle the alerts that come when controls detect problems. The idea of “Prevent Problems or Fix Them Fast” is to add as much automation as possible to both to remediate problems that are detected or prevent them from occurring in the first place. Just as the controls are adapted to each swimlane of activity, so must the remediation or prevention.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains how to expand automation of both prevention and remediation so that the impact of vulnerabilities is minimized or even eliminated.

    ∙ What is the ideal process to speed up remediations and maximize prevention
    ∙ What does a high level security operations model look like?
    ∙ How best to apply different policies and frameworks to the categories of your cloud?
    ∙ What new forms of automation for remediation and prevention are being adopted?
    ∙ How do Remediation, Prevention, and Block Code bots work?
    ∙ What mechanisms are used in the development and staging process to block code promotion?
    ∙ Why would your company benefit from a “prevent problems or fix it fast” mindset?
    ∙ What tactics can help prevent problems or fix them fast?
  • Pillars of Cloud Security: How “Shift-Left” Enhances a Secure SDLC Recorded: Jul 21 2020 39 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Security can be made better and more resilient the earlier it is integrated into the development process. When creating a new system, a security architect should be in the room. The idea of “shift-left,” moving the responsibility for designing and implementing security as early as possible in the software development and system design process, has proven to be an integral benefit to improving security. In addition, doing things this way for resolving problems makes sure they are fixed permanently. One unexpected benefit of shift-left is the way it promotes security education and awareness in every part of an organization.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the benefits of adopting a shift-left approach to the software development lifecycle (SDLC) and suggests tactics that can bring the practice to life. Here are the questions and topics that will be addressed.


    • Where does the shift-left idea come from and how does it apply to security?
    • How can you tell if your company would benefit from a shift-left methodology?
    • How do you bake security into your secure SDLC and why hasn’t this happened already?What tactics work for adopting shift-left thinking?
    • How does shift-left work for promoting security awareness and education?
  • Pillars of Cloud Security: Locking Down Crown Jewel Data in the Public Cloud Recorded: Jun 25 2020 55 mins
    eric.kedrosky@sonraisecurity.com, dwoods@evolvedmedia.com
    Monitoring for publicly exposed data is very important but not enough. 90% of Sonrai Security customers deployed have found unintended and mistaken data exposures in their public cloud. A key best practice is to identify the most valuable and sensitive data, your crown jewel data, and then make sure it is secured and monitored with great precision. In this webinar we explore Sonrai Security’s second pillar of cloud security -- protecting your crown jewel data.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains best practices for identifying and locking down sensitive data, answering questions such as:

    • What is the best way to define and discover “crown jewel data”?
    • How can detailed classification of identities and data help?
    • What is the best way to “lockdown” access?
    • How can you extend monitoring to all data, resources, and microservices?
    • Which preventive controls help the most?
    • What are some real-world examples of success (and failure)?
Live monthly webcasts on Public Cloud security and risks.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
  • Live at: May 28 2020 6:00 pm
  • Presented by: Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
  • From:
Your email has been sent.
or close