Are Cloud Service Provider Tools Enough to Secure Your Identities?

On Demand

Identities and permissions are your cloud infrastructure’s greatest risk factor [Gartner]. Yet a recent survey found that 71% of organizations are using commercial cloud provider security tools [IDC]. Are native tools enough to successfully prevent excessive and risky entitlements?

In a word, no. While they offer some control over identities and access to resources, native tools fall short, with significant limitations in granularity, scope, and remediation. The stakes are high: just one over-privileged identity can severely jeopardize an organization’s security. Ongoing analysis of all identities, configurations and activity logs is the only way to expose risk, let alone mitigate at scale. 

Hosts:

SANS Instructor, Roger O'Farril &  Lior Zatlavi, Sr. Cloud Security Archtect, Ermetic

Watch this SANS - Ermetic workshop for an overview of CSP tools - and using an automated analysis platform to manage identities and permissions at multi-cloud scale. We will cover:

  • AWS and Azure tools for controlling identities and governing access 
  • How to structure cloud resources and protect sensitive resources 
  • Using least privilege policies 

Register for Workshop