Cloud identity and access management resources such as AWS IAM are powerful infrastructure tools that are more akin to cloud-based networks. But the complex layers of cloud IAM configurations creates security challenges, and IAM misconfigurations are common in enterprise cloud environments. These vulnerabilities are now a primary attack vector for hackers and are often missed by compliance checks.
In this session, Fugue co-founder Josh Stella will simplify how to think critically about IAM security in your cloud infrastructure environment. You’ll understand how to identify dangerous and overly-permissive IAM misconfigurations—and how hackers leverage these vulnerabilities to access your environment, discover resources, move laterally, and extract data without detection.
Attendees will walk away with a clear understanding of:
How cloud IAM resources work and how to simplify your approach to IAM security
How to spot dangerous IAM misconfiguration vulnerabilities in your cloud environment
Where compliance often misses with IAM security and how hackers exploit it