Hi [[ session.user.profile.firstName ]]

Pillars of Cloud Security: Achieving and Maintaining Least Privilege

Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

• What is least privilege and how has it changed in the cloud?
• Why is it that least privilege cannot be achieved without knowing effective permissions?
• Why must maintaining least privilege configurations be automated?
• What are the risks and benefits?
Recorded May 28 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
Presentation preview: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
  • Channel
  • Channel profile
  • The CIA, Scripts, Hook-Ups: 2020's Worst Cloud Security Data Breaches Explained Dec 15 2020 7:00 pm UTC 60 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    2020 has been full of surprises - and cloud security data breaches have been no exception. From hotel chains to dating apps and video conferencing, misconfigurations and mistakes have left many organizations with exposed data. Knowing how data breaches happen and how to prevent them from happening is key when it comes to defending your identities and data access.

    In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Eric Kedrosky, CISO and Director of Cloud Research of Sonrai Security, countdown the top ten notorious cloud data breaches, breaking down how each was caused and how they could have been prevented. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and the preventative measures. The cloud is undeniably the future, and it can be secured with a bit of wisdom and some best practices that are newly evolving as this technology matures.

    Join us as we dissect the year’s most notorious cloud data breaches to share a bit of wisdom from our research, including:
    ○ Identity and authentication for data storage
    ○ Public cloud misconfiguration
    ○ Key and secret management
    ○ Overprivilege identities
    ○ Malicious Bad Actors
    ○ And more
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Dec 10 2020 3:30 pm UTC 57 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • Moving at Agile Speed: Improve Enterprise FinTech Cloud Security Recorded: Nov 17 2020 38 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The gap between moving to the cloud and implementing strong security has shrunk as new technologies accelerate the process. But there is a perceived trade between the objective of agile software development and the security that is meant to be achieved in fintech organizations.

    As organizations scale their public cloud implementation and the number of applications deployed, developers are slowed down as they are now forced to deal with security-related components to deploy and manage their application, which at scale, becomes complex. On the other side, the security team still has to maintain security and controls around all the applications, objects, and environments that are deployed.

    This webinar, presented by Dan Woods, a technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, will discuss how:

    ∙To effectively achieve the desired result of speed and security.
    ∙To identify the most critical risks and repercussions of following outdated governance policies when migrating to newer technologies.
    ∙To provide a five-step approach that all organizations can use to deliver governance and security across DevOps and security to reduce risk in their public clouds.
  • How CSPM Secures The Modern Healthcare Infrastructure Recorded: Oct 22 2020 46 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud computing has modernized the way healthcare and life science organizations build, operate, and manage infrastructure and applications. Cloud computing has helped healthcare cloud professionals to quickly spin up or spin down a resource to fulfill the increased demand of new healthcare application workloads. However, when working in a cloud environment, monitoring the security state of multiple workloads while meeting the growing number of Health Insurance Portability and Accountability Act (HIPAA) compliance requirements can be challenging. How do you know if your security posture across all workloads is at the highest-possible level?

    Many hospitals, clinics, nursing homes, and other healthcare providers can’t, and they have turned to Cloud Security Posture Management (CSPM) to help in their modern cloud environments. CSPM brings a new set of tools to bear on the challenge of understanding and managing security in a multi-cloud world. In an important way, CSPM helps security professionals continuously monitor the configuration of their cloud and then use workflows and automation to effectively secure their cloud platforms.

    In this webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, we’ll share how healthcare organizations are securing their modern cloud application workloads while maintaining control over their compliance and cloud posture. Come to this webinar to learn about:

    • The unique cloud security challenges of Healthcare and Life Sciences
    • Cloud security control patterns and best practices
    • How CSPM helps implement those patterns and best practices
    • How intelligent CSPM help solve complex security problems for Healthcare and Life Sciences
  • Secure Multi-Cloud Environments: Intelligent Cloud Security Posture Management Recorded: Sep 24 2020 51 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    An effective security program is rooted in a strong operational foundation. As evidenced by a number of high profile data breaches, successful attacks on cloud services were most commonly the result of customer misconfiguration, mismanagement, and mistakes according to Gartner. Without clean operations, your security operations model is destined to fail. As such, IT, Security, and Risk Management leaders must invest in Cloud Security Posture Management (CSPM) processes and tools to proactively and reactively identify and remediate risks.

    Digital transformation is putting pressure on every function inside the enterprise – especially IT, Security, and Cloud Operations Teams. Whether it’s utilizing short-lived technology like containers, assessing the state of public cloud environments, or maintaining the security of applications, the modern attack surface presents a growing challenge to security and cloud leaders looking to accurately understand and reduce identity and data risk.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, will be an informative session on how enterprises can secure their public cloud with an identity approach. The webcast will answer the following topics:
    ∙ How does CSPM provide enterprises with visibility into the state of public cloud infrastructure?
    ∙ What specific steps are being used to create effective operations and security programs to identify and reduce risk across cloud environments?
    ∙ What are best practices and tips for utilizing CSPM in the public cloud?
    ∙ What ways can you use controls to enhance identity and data governance?
    ∙ Where does CSPM fit into a cloud security model? And what else is needed?
  • Pillars of Cloud Security: Prevent Problems or Fix Them Fast Recorded: Aug 18 2020 34 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The best cloud security teams have a clear categorization of their environments, craft policies and controls appropriate to each, and then handle the alerts that come when controls detect problems. The idea of “Prevent Problems or Fix Them Fast” is to add as much automation as possible to both to remediate problems that are detected or prevent them from occurring in the first place. Just as the controls are adapted to each swimlane of activity, so must the remediation or prevention.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains how to expand automation of both prevention and remediation so that the impact of vulnerabilities is minimized or even eliminated.

    ∙ What is the ideal process to speed up remediations and maximize prevention
    ∙ What does a high level security operations model look like?
    ∙ How best to apply different policies and frameworks to the categories of your cloud?
    ∙ What new forms of automation for remediation and prevention are being adopted?
    ∙ How do Remediation, Prevention, and Block Code bots work?
    ∙ What mechanisms are used in the development and staging process to block code promotion?
    ∙ Why would your company benefit from a “prevent problems or fix it fast” mindset?
    ∙ What tactics can help prevent problems or fix them fast?
  • Pillars of Cloud Security: How “Shift-Left” Enhances a Secure SDLC Recorded: Jul 21 2020 39 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Security can be made better and more resilient the earlier it is integrated into the development process. When creating a new system, a security architect should be in the room. The idea of “shift-left,” moving the responsibility for designing and implementing security as early as possible in the software development and system design process, has proven to be an integral benefit to improving security. In addition, doing things this way for resolving problems makes sure they are fixed permanently. One unexpected benefit of shift-left is the way it promotes security education and awareness in every part of an organization.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the benefits of adopting a shift-left approach to the software development lifecycle (SDLC) and suggests tactics that can bring the practice to life. Here are the questions and topics that will be addressed.


    • Where does the shift-left idea come from and how does it apply to security?
    • How can you tell if your company would benefit from a shift-left methodology?
    • How do you bake security into your secure SDLC and why hasn’t this happened already?What tactics work for adopting shift-left thinking?
    • How does shift-left work for promoting security awareness and education?
  • Pillars of Cloud Security: Locking Down Crown Jewel Data in the Public Cloud Recorded: Jun 25 2020 55 mins
    eric.kedrosky@sonraisecurity.com, dwoods@evolvedmedia.com
    Monitoring for publicly exposed data is very important but not enough. 90% of Sonrai Security customers deployed have found unintended and mistaken data exposures in their public cloud. A key best practice is to identify the most valuable and sensitive data, your crown jewel data, and then make sure it is secured and monitored with great precision. In this webinar we explore Sonrai Security’s second pillar of cloud security -- protecting your crown jewel data.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains best practices for identifying and locking down sensitive data, answering questions such as:

    • What is the best way to define and discover “crown jewel data”?
    • How can detailed classification of identities and data help?
    • What is the best way to “lockdown” access?
    • How can you extend monitoring to all data, resources, and microservices?
    • Which preventive controls help the most?
    • What are some real-world examples of success (and failure)?
  • Pillars of Cloud Security: Achieving and Maintaining Least Privilege Recorded: May 28 2020 58 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Least privilege, the state in which identities have access to only what they need and no more, is the ideal state for a cloud security environment. This goal is more complex and requires deeper analysis than most people realize. Taking a data-driven approach is fundamental to monitor IAM permissions as well as data access to achieve and maintain least privilege. The key is being able to determine the effective permissions completely, including all direct and indirect access paths from both people and non-people identities.

    This webinar, presented by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, explains the latest methods for bringing least privilege to life, answering questions such as:

    • What is least privilege and how has it changed in the cloud?
    • Why is it that least privilege cannot be achieved without knowing effective permissions?
    • Why must maintaining least privilege configurations be automated?
    • What are the risks and benefits?
  • Why WFH and Cloud Will Permanently Change Security: 5 Changes You Can Make Now Recorded: Apr 23 2020 62 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Organizations around the world have recently been forced to rapidly shift to a mandatory work from home (WFH) arrangement. Even for those already operating with remote teams, this shift is causing disruption that likely changes how we approach information security moving forward. Join us as Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research and CISO of Sonrai Security, pinpoint five areas that must be addressed so these security problems can be prevented.

    The webinar will address questions such as:
    • How WFH is built-in for companies who have properly implemented public cloud
    • How does remote working impact security practices and what has been learned so far?
    • Why have practices such as segregation of duties become more important?
    • Should remote working accelerate and broaden zero trust implementations?
    • What best practices companies can put into place to secure their infrastructure to make WFH seamless
  • Identity Governance & Secrets Management: Key to Unlocking Public Cloud Security Recorded: Apr 9 2020 43 mins
    Marshall Copeland, Partner Solutions Engineer, HashiCorp & Eric Kedrosky, Director of Cloud Security Research, Sonrai
    Gartner forecasts that the worldwide public cloud market will grow 17% in 2020 to total $266.4 billion, up from $227.8 billion this past year. As more and more businesses are moving their application workloads and critical data to the public cloud, it becomes even more important to rethink how these resources are protected, and how those protections are managed. Modern workloads, when protected with enhanced secrets management and least privilege, substantially reduce the risk of escalation attacks.
  • Preventing Catastrophic Data Loss in AWS, Azure, and Google Cloud Recorded: Mar 17 2020 51 mins
    Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Public cloud has broken new ground with respect to the integration of data protection and security. As S3 buckets, queues, cloud-native databases, and dozens of other repositories hold more and more of our data, the cloud-native IAM services of AWS, Azure, and GCP have grown in power and scope. Each of these provides ways of enforcing permissions to protect data that were either impossible or quite difficult and complex to achieve in the on-premise world. This webinar, hosted by Dan Woods, technology analyst and founder of Early Adopter Research, and Eric Kedrosky, Director of Cloud Security Research & CISO at Sonrai Security, will explore both what is better and harder about cloud data protection in today’s world including:

    * Why traditional data security tools and methods are not compatible in public cloud
    * Warnings about the much expanded range of risks related to cloud data in S3 buckets, databases, and other repositories, including both internal and external threats
    * Analysis of the implications of tight integration of identities, data access, and protection services
    * Specific steps for using policies on data assets such as buckets, storage accounts, queues, and other data services to prevent attacks and reduce the blast radius if an attack is successful
    * Suggestions for making best use of both cloud-native and external key management systems to encrypt data
    * Ways to use network controls to enhance data protection
  • Managing Non-people Identities in AWS and Azure Recorded: Feb 20 2020 59 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud-native application development and DevOps has led to an explosion of what are called non-people identities. Non-people identities (servers, VMs, serverless, applications, etc.) can be created manually and automatically, and like identities used for people, they can be the targets for security attacks. The methods and strategies for creating a workable and effective governance program for these identities are just beginning to be understood. In this webinar,, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, will look at the common mistakes made when managing non-people identities in AWS and Azure that lead to security vulnerabilities and the governance and management techniques needed to keep such identities safe. Topics covered:

    * Forces driving the explosion of non-people identities
    * Specific problems that occur in AWS and Azure
    * Security threats that often occur from mismanaged non-people identities
    * Governance and management to solve common problems in AWS, Azure, and across all clouds
  • Privilege Escalation Attacks in AWS: How They Work, How To Stop Them Recorded: Jan 28 2020 58 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    AWS, like every advanced cloud platform, has well-known security flaws that can lead to catastrophic problems if you are not paying careful attention. One of the most dangerous allows innocuous accounts usually granted to developers to be given admin access. Such attacks work because a sequence of seemingly unimportant missteps in configuring different parts of AWS allows the escalation to occur. This webinar will show how these attacks work and how to be diligent about monitoring to make sure such attacks never succeed on your watch.

    This webinar will cover:

    The general nature of escalation attacks
    * How AWS is specifically vulnerable
    * What to do to monitor for mistakes that make these escalation attacks possible
    * How to use Sonrai Security to automate such monitoring
  • How Public Cloud Changes Cybersecurity for the Better Recorded: Dec 17 2019 56 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    While many basic security controls are enduring, public cloud (AWS, Azure, and Google Cloud) has introduced a wave of new practices, tactics, and forms of automation to implement those controls. In total, these capabilities are going to make cloud security better than on-premise methods. The elasticity and scale of public cloud has led to more integrations of cybersecurity in the creation of computing assets. The abundant data available has led to new forms of automated configuration and monitoring for breaches. Software-defined everything and APIs have given cybersecurity systems a wider range of power and opened the way for declarative methods of implementing security in the cloud. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, will look at how public cloud is changing cybersecurity for the better and the long term impact of these new capabilities. One key impact is that soon on-prem data centers will be recognized as less secure than cloud data centers.

    Key questions:
    * What are the core differences between cloud security and on-premise methods?
    * How has abundant data opened up new possibilities for monitoring and automation?
    * What is the impact of software-defined infrastructure?
    * Why is identity central to security in public cloud?
    * How has public cloud security broken new ground in managing complexity?
    * What new forms of automation of security are emerging in the cloud?
    * Are AI and ML being implemented faster in the cloud?
  • Anatomy of 5 Notorious Cloud Data Breaches Recorded: Nov 20 2019 56 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    Cloud data breaches follow distinct patterns that can be studied and learned from. In this webinar, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, dissect five notorious and distinct types of cloud data breaches, breaking down how each was caused and how they could have been prevented. Each of these five is an archetype of a family of breaches. This webinar will detail the anatomy of each type of breach, what we can learn, what allowed the breach to happen, and preventative measures.

    Breakdown of the 5 breaches:

    * Identity and authentication for data storage
    * Public cloud misconfiguration
    * Key and secret management
    * Overprivilege
    * Insider threats
  • Comparing Public Cloud Security Across AWS, Azure, and GCP: Lessons for Security Recorded: Oct 24 2019 61 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
    The cybersecurity infrastructure for each of the major public clouds is a work in progress. But for all of them, it has become obvious that identity and data access is effectively the new perimeter. By examining what is the same and what is different about each public cloud’s identity and access management mechanisms, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, explain how the shift to public cloud is changing the rules for security. We identify the different principles each public cloud vendor is using as well as the different approaches to account organization and how resources are protected.


    Questions:
    -Why are identity and data access the new perimeter?

    -Why has zero-trust become the default organizing principle for cloud security?

    -What are the crucial requirements for cloud data security?

    -How are these requirements implemented in each cloud?

    -What are the differences in security practices between AWS, Azure, and Google Cloud?

    -What burdens does the new cloud model put upon cloud users?

    -What goes wrong when these burdens are not properly managed?
  • Identities Are The New Perimeter For Securing Data In Public Cloud Recorded: Sep 30 2019 34 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security
    Organizations of all sizes are harnessing the operational and cost benefits of public cloud. Unfortunately, cloud platforms like AWS, Azure, and GCP provide a wide range of identity and access management (IAM) based configuration options, that can be disastrous if not properly architected. During this webinar, you will learn the benefits and risk trade-offs of multiple public cloud IAM configuration options including:

    -Organization/Account-wide privilege
    -Privilege delegation & escalation (by user or role)
    -Service-based & in-line privilege
    -Understanding of IAM policy best practices and conflict resolution

    Enterprises building in public cloud must ensure their security programs tightly control trust relationships that can be configured from IAM options to ensure adherence to the principles of least privilege and the segregation of duties. Public cloud IAM capabilities can be highly effective to build secure applications when done well. However, they can lead to a disastrous breach when poorly configured.
  • Preventing Data Loss in Public Clouds Recorded: Aug 27 2019 49 mins
    Sandy Bird, CTO and Co-founder, Sonrai Security
    The Capital One loss of credit card applications for 106 million people is a sobering reminder that complexity stifles even the most sophisticated cloud teams. However, this will not deter the unstoppable growth of public cloud. We firmly believe that public cloud will be more secure than enterprise data centers. But only by using a unique approach.

    During this webinar you will learn :

    -The anatomy of the Capital One breach
    -How to minimize privilege and access
    -How to minimize access paths
    -The importance of baseline trust
    -How to continuously monitor (beyond S3)
    -Why configuration checks are not good enough
  • 10 Foundational "Public Cloud Security Principles" for Securing Data Recorded: Aug 9 2019 34 mins
    Sandy Bird, CTO & Co-Founder
    As Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) have exploded, the complexity of securing your data in public clouds has also exploded. While networking controls remain essential, these controls are insufficient in the new world of public cloud. Working with customers, Sonrai Security has developed the “Public Cloud Security Principles” to help guide your path for public cloud security.

    During this webinar you will learn:

    - An overview of the Sonrai Security “Public Cloud Security Principles”
    - An overview of why key principles around cloud identity and data access trust relationships should be monitored and managed at very granular levels to reduce potential breach blast radius
    - Considerations around the automation of 3 manifesto principles to reduce risk of breach of data resident in the public cloud
    - How Sonrai Security is helping companies automate critical cloud security control policies to address key public cloud security principles.
Live monthly webcasts on Public Cloud security and risks.
Sonrai Security delivers an enterprise identity and data governance platform for AWS, Azure, Google Cloud, and Kubernetes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Pillars of Cloud Security: Achieving and Maintaining Least Privilege
  • Live at: May 28 2020 6:00 pm
  • Presented by: Eric Kedrosky, Director of Cloud Security Research, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research
  • From:
Your email has been sent.
or close