Discover Who Can Access Your Sensitive Data in AWS
Anyone who has tried to manage access permissions in AWS knows how complicated it can be. So it’s no surprise that according to Gartner, by 2023, 99% of cloud security failures will be the customer’s fault, and 75% of those will result from inadequate management of identities, access and privileges.
In this virtual workshop, you'll get to see how to analyze the access permissions in your AWS environment and work toward least privilege. We’ll take the use-case of a sensitive S3 bucket and answer the question - who has access, and is it necessary?
Through an interactive demo, you’ll learn about:
- The interaction between managed policies, inline policies, resource-based policies, and ACLs
- How to use AWS tools including Access Advisor and Cloud Trail to understand the access available to users, applications and resources
- The relationships between roles, groups, permission boundaries, and service control policies
- How to manage access and achieve least privilege automatically and at scale with a Cloud Infrastructure Entitlement Management platform
Speaker: Or Priel, VP Product Management, Ermetic.